Mock Version: 1.1.41 ENTER do(['bash', '--login', '-c', 'rpmbuild -bs --target armv7hl --nodeps builddir/build/SPECS/nss.spec'], False, '/var/lib/mock/c71511-1-armhfp-b58a646a8b64748cbd45941ac23a3ec9f2509efe/root/', None, 0, True, False, 993, 135, None, False, {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'PROMPT_COMMAND': 'echo -n ""', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin'}, logger=) Executing command: ['bash', '--login', '-c', 'rpmbuild -bs --target armv7hl --nodeps builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'PROMPT_COMMAND': 'echo -n ""', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin'} Building target platforms: armv7hl Building for target armv7hl Wrote: /builddir/build/SRPMS/nss-3.19.1-19.el7.src.rpm Child return code was: 0 LEAVE do --> ENTER do(['bash', '--login', '-c', 'rpmbuild -bb --target armv7hl --nodeps builddir/build/SPECS/nss.spec'], False, '/var/lib/mock/c71511-1-armhfp-b58a646a8b64748cbd45941ac23a3ec9f2509efe/root/', None, 0, True, False, 993, 135, None, False, {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'PROMPT_COMMAND': 'echo -n ""', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin'}, logger=) Executing command: ['bash', '--login', '-c', 'rpmbuild -bb --target armv7hl --nodeps builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'PROMPT_COMMAND': 'echo -n ""', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin'} Building target platforms: armv7hl Building for target armv7hl Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.NOgWue + umask 022 + cd /builddir/build/BUILD + cd /builddir/build/BUILD + rm -rf nss-3.19.1 + /usr/bin/gzip -dc /builddir/build/SOURCES/nss-3.19.1.tar.gz + /usr/bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + cd nss-3.19.1 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + /usr/bin/cp /builddir/build/SOURCES/PayPalEE.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/TestCA.ca.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/TestUser50.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/TestUser51.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/PayPalRootCA.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/PayPalICA.cert -f ./nss/tests/libpkix/certs + cd /builddir/build/BUILD + cd nss-3.19.1 + /usr/bin/bzip2 -dc /builddir/build/SOURCES/nss-pem-20140125.tar.bz2 + /usr/bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . Patch #2 (add-relro-linker-option.patch): + echo 'Patch #2 (add-relro-linker-option.patch):' + /usr/bin/cat /builddir/build/SOURCES/add-relro-linker-option.patch + /usr/bin/patch -p0 -b --suffix .relro --fuzz=0 patching file nss/coreconf/Linux.mk Hunk #1 succeeded at 176 (offset 2 lines). Patch #3 (renegotiate-transitional.patch): + echo 'Patch #3 (renegotiate-transitional.patch):' + /usr/bin/patch -p0 -b --suffix .transitional --fuzz=0 + /usr/bin/cat /builddir/build/SOURCES/renegotiate-transitional.patch patching file nss/lib/ssl/sslsock.c Hunk #1 succeeded at 74 (offset -75 lines). Patch #6 (nss-enable-pem.patch): + echo 'Patch #6 (nss-enable-pem.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-enable-pem.patch + /usr/bin/patch -p0 -b --suffix .libpem --fuzz=0 patching file nss/lib/ckfw/manifest.mn Patch #16 (nss-539183.patch): + echo 'Patch #16 (nss-539183.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-539183.patch + /usr/bin/patch -p0 -b --suffix .539183 --fuzz=0 patching file nss/cmd/httpserv/httpserv.c Hunk #1 succeeded at 938 (offset 277 lines). patching file nss/cmd/selfserv/selfserv.c ~/build/BUILD/nss-3.19.1/nss ~/build/BUILD/nss-3.19.1 Patch #18 (nss-646045.patch): + pushd nss + echo 'Patch #18 (nss-646045.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-646045.patch + /usr/bin/patch -p1 -b --suffix .646045 --fuzz=0 patching file tests/dbtests/dbtests.sh ~/build/BUILD/nss-3.19.1 Patch #25 (nsspem-use-system-freebl.patch): + popd + echo 'Patch #25 (nsspem-use-system-freebl.patch):' + /usr/bin/cat /builddir/build/SOURCES/nsspem-use-system-freebl.patch + /usr/bin/patch -p0 -b --suffix .systemfreebl --fuzz=0 patching file nss/lib/ckfw/pem/config.mk patching file nss/lib/ckfw/pem/Makefile patching file nss/lib/ckfw/pem/manifest.mn Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch): + echo 'Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.14.0.0-disble-ocsp-test.patch + /usr/bin/patch -p0 -b --suffix .noocsptest --fuzz=0 patching file nss/tests/chains/scenarios/scenarios Hunk #1 succeeded at 18 (offset -32 lines). Patch #47 (utilwrap-include-templates.patch): + echo 'Patch #47 (utilwrap-include-templates.patch):' + /usr/bin/cat /builddir/build/SOURCES/utilwrap-include-templates.patch + /usr/bin/patch -p0 -b --suffix .templates --fuzz=0 patching file nss/lib/nss/config.mk Patch #49 (nss-skip-bltest-and-fipstest.patch): + echo 'Patch #49 (nss-skip-bltest-and-fipstest.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-bltest-and-fipstest.patch + /usr/bin/patch -p0 -b --suffix .skipthem --fuzz=0 patching file nss/cmd/Makefile Patch #50 (iquote.patch): + echo 'Patch #50 (iquote.patch):' + /usr/bin/cat /builddir/build/SOURCES/iquote.patch + /usr/bin/patch -p0 -b --suffix .iquote --fuzz=0 patching file ./nss/cmd/bltest/Makefile patching file ./nss/cmd/certutil/Makefile patching file ./nss/cmd/httpserv/Makefile patching file ./nss/cmd/lib/Makefile patching file ./nss/cmd/modutil/Makefile patching file ./nss/cmd/selfserv/Makefile patching file ./nss/cmd/ssltap/Makefile patching file ./nss/cmd/strsclnt/Makefile patching file ./nss/cmd/tstclnt/Makefile patching file ./nss/cmd/vfyserv/Makefile patching file ./nss/coreconf/location.mk patching file ./nss/lib/certhigh/Makefile patching file ./nss/lib/cryptohi/Makefile patching file ./nss/lib/libpkix/pkix/checker/Makefile patching file ./nss/lib/nss/Makefile patching file ./nss/lib/ssl/Makefile ~/build/BUILD/nss-3.19.1/nss ~/build/BUILD/nss-3.19.1 Patch #52 (Bug-1001841-disable-sslv2-libssl.patch): + pushd nss + echo 'Patch #52 (Bug-1001841-disable-sslv2-libssl.patch):' + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-libssl.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2libssl --fuzz=0 patching file lib/ssl/config.mk patching file lib/ssl/sslsock.c Patch #53 (Bug-1001841-disable-sslv2-tests.patch): + echo 'Patch #53 (Bug-1001841-disable-sslv2-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-tests.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2tests --fuzz=0 patching file tests/ssl/ssl.sh + popd ~/build/BUILD/nss-3.19.1 + echo 'Patch #55 (enable-fips-when-system-is-in-fips-mode.patch):' Patch #55 (enable-fips-when-system-is-in-fips-mode.patch): + /usr/bin/cat /builddir/build/SOURCES/enable-fips-when-system-is-in-fips-mode.patch + /usr/bin/patch -p0 -b --suffix .852023 --fuzz=0 patching file nss/lib/pk11wrap/pk11pars.c patching file nss/lib/pk11wrap/pk11util.c patching file nss/lib/pk11wrap/secmodi.h Hunk #1 succeeded at 113 (offset -3 lines). + echo 'Patch #56 (p-ignore-setpolicy.patch):' Patch #56 (p-ignore-setpolicy.patch): + /usr/bin/cat /builddir/build/SOURCES/p-ignore-setpolicy.patch + /usr/bin/patch -p0 -b --suffix .1026677 --fuzz=0 patching file ./nss/lib/ssl/sslsock.c Hunk #1 succeeded at 1348 (offset 33 lines). + echo 'Patch #99 (ssl-server-min-key-sizes.patch):' Patch #99 (ssl-server-min-key-sizes.patch): + /usr/bin/cat /builddir/build/SOURCES/ssl-server-min-key-sizes.patch + /usr/bin/patch -p0 -b --suffix .min_key_sizes --fuzz=0 patching file nss/lib/ssl/ssl3con.c patching file nss/lib/ssl/sslimpl.h + pushd nss ~/build/BUILD/nss-3.19.1/nss ~/build/BUILD/nss-3.19.1 + echo 'Patch #101 (dhe-sha384-dss-support.patch):' Patch #101 (dhe-sha384-dss-support.patch): + /usr/bin/cat /builddir/build/SOURCES/dhe-sha384-dss-support.patch + /usr/bin/patch -p1 -b --suffix .dhe_and_sha384 --fuzz=0 patching file cmd/certutil/keystuff.c patching file cmd/selfserv/selfserv.c patching file cmd/tstclnt/tstclnt.c patching file lib/ssl/dhe-param.c patching file lib/ssl/ssl3con.c patching file lib/ssl/ssl3ecc.c patching file lib/ssl/ssl3ext.c patching file lib/ssl/ssl.def patching file lib/ssl/sslenum.c patching file lib/ssl/ssl.h patching file lib/ssl/sslimpl.h patching file lib/ssl/sslinfo.c patching file lib/ssl/sslproto.h patching file lib/ssl/sslsecur.c patching file lib/ssl/sslsock.c patching file lib/ssl/sslt.h patching file tests/cert/cert.sh patching file tests/ssl/sslcov.txt patching file tests/ssl/ssl.sh patching file tests/ssl/sslstress.txt Patch #102 (prfnonsha256.patch): + echo 'Patch #102 (prfnonsha256.patch):' + /usr/bin/cat /builddir/build/SOURCES/prfnonsha256.patch + /usr/bin/patch -p1 -b --suffix .prfnonsha256 --fuzz=0 patching file lib/ssl/ssl3con.c Patch #103 (sha384-client-verify.patch): + echo 'Patch #103 (sha384-client-verify.patch):' + /usr/bin/cat /builddir/build/SOURCES/sha384-client-verify.patch + /usr/bin/patch -p1 -b --suffix .sha384_client_verify --fuzz=0 patching file cmd/strsclnt/strsclnt.c patching file lib/ssl/ssl3con.c patching file lib/ssl/ssl3prot.h patching file tests/ssl/ssl.sh patching file tests/ssl/sslcov.txt ~/build/BUILD/nss-3.19.1 Patch #104 (fix-disable-sslv2-tests.patch): + popd + echo 'Patch #104 (fix-disable-sslv2-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/fix-disable-sslv2-tests.patch + /usr/bin/patch -p0 -b --suffix .fix_skipping --fuzz=0 patching file ./nss/tests/ssl/ssl.sh + echo 'Patch #105 (fix-disable-sslv2-libssl.patch):' Patch #105 (fix-disable-sslv2-libssl.patch): + /usr/bin/cat /builddir/build/SOURCES/fix-disable-sslv2-libssl.patch + /usr/bin/patch -p0 -b --suffix .null_ciphers --fuzz=0 patching file ./nss/lib/ssl/sslsock.c + echo 'Patch #106 (additional-cipher-suites-enabled-by-default.patch):' Patch #106 (additional-cipher-suites-enabled-by-default.patch): + /usr/bin/cat /builddir/build/SOURCES/additional-cipher-suites-enabled-by-default.patch + /usr/bin/patch -p0 -b --suffix .1245627 --fuzz=0 patching file ./nss/lib/ssl/ssl3con.c patching file ./nss/lib/ssl/sslenum.c + echo 'Patch #107 (sslinfo-fix-info.patch):' Patch #107 (sslinfo-fix-info.patch): + /usr/bin/cat /builddir/build/SOURCES/sslinfo-fix-info.patch + /usr/bin/patch -p0 -b --suffix .fix_info --fuzz=0 patching file ./nss/lib/ssl/sslinfo.c + echo 'Patch #108 (fix-min-library-version-in-SSLVersionRange.patch):' Patch #108 (fix-min-library-version-in-SSLVersionRange.patch): + /usr/bin/cat /builddir/build/SOURCES/fix-min-library-version-in-SSLVersionRange.patch + /usr/bin/patch -p0 -b --suffix .1171318 --fuzz=0 patching file ./nss/lib/ssl/sslsock.c + echo 'Patch #109 (enable-ecdsa-ciphers-by-default.patch):' Patch #109 (enable-ecdsa-ciphers-by-default.patch): + /usr/bin/cat /builddir/build/SOURCES/enable-ecdsa-ciphers-by-default.patch + /usr/bin/patch -p0 -b --suffix .enable_ecdsa --fuzz=0 patching file ./nss/lib/ssl/ssl3con.c + echo 'Patch #110 (reorder-cipher-suites.patch):' Patch #110 (reorder-cipher-suites.patch): + /usr/bin/cat /builddir/build/SOURCES/reorder-cipher-suites.patch + /usr/bin/patch -p0 -b --suffix .order --fuzz=0 patching file ./nss/lib/ssl/ssl3con.c patching file ./nss/lib/ssl/sslenum.c + echo 'Patch #111 (ocsp_stapling_sslauth_sni_tests_client_side_fixes.patch):' Patch #111 (ocsp_stapling_sslauth_sni_tests_client_side_fixes.patch): + /usr/bin/cat /builddir/build/SOURCES/ocsp_stapling_sslauth_sni_tests_client_side_fixes.patch + /usr/bin/patch -p0 -b --suffix .ocsp_sni --fuzz=0 patching file ./nss/tests/ssl/sslauth.txt patching file ./nss/tests/ssl/ssl.sh + pushd nss ~/build/BUILD/nss-3.19.1/nss ~/build/BUILD/nss-3.19.1 + echo 'Patch #112 (rh1238290.patch):' Patch #112 (rh1238290.patch): + /usr/bin/cat /builddir/build/SOURCES/rh1238290.patch + /usr/bin/patch -p1 -b --suffix .1238290 --fuzz=0 patching file lib/cryptohi/seckey.c + echo 'Patch #113 (cve-2015-7575-minimal.patch):' Patch #113 (cve-2015-7575-minimal.patch): + /usr/bin/cat /builddir/build/SOURCES/cve-2015-7575-minimal.patch + /usr/bin/patch -p1 -b --suffix .cve-2015-7575 --fuzz=0 patching file lib/ssl/ssl3con.c Hunk #1 succeeded at 4452 (offset 107 lines). + popd ~/build/BUILD/nss-3.19.1 + pemNeedsFromSoftoken='lowkeyi lowkeyti softoken softoknt' + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/lowkeyi.h ./nss/lib/ckfw/pem/ + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/lowkeyti.h ./nss/lib/ckfw/pem/ + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/softoken.h ./nss/lib/ckfw/pem/ + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/softoknt.h ./nss/lib/ckfw/pem/ + /usr/bin/cp ./nss/lib/softoken/lowkeyi.h ./nss/cmd/rsaperf + /usr/bin/cp ./nss/lib/softoken/lowkeyti.h ./nss/cmd/rsaperf + /usr/bin/rm -rf ./nss/lib/freebl + /usr/bin/rm -rf ./nss/lib/softoken + /usr/bin/rm -rf ./nss/lib/util + /usr/bin/rm -rf ./nss/cmd/bltest + /usr/bin/rm -rf ./nss/cmd/fipstest + /usr/bin/rm -rf ./nss/cmd/rsaperf_low ~/build/BUILD/nss-3.19.1/nss/tests/ssl ~/build/BUILD/nss-3.19.1 + pushd nss/tests/ssl + cat sslcov.txt + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' + cat sslstress.txt + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' + popd ~/build/BUILD/nss-3.19.1 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.HotZaT + exit 0 + umask 022 + cd /builddir/build/BUILD + cd nss-3.19.1 + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + NSS_NO_PKCS11_BYPASS=1 + export NSS_NO_PKCS11_BYPASS + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + BUILD_OPT=1 + export BUILD_OPT + XCFLAGS='-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard' + export XCFLAGS + PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + export PKG_CONFIG_ALLOW_SYSTEM_LIBS + export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS ++ /usr/bin/pkg-config --cflags-only-I nspr ++ sed s/-I// + NSPR_INCLUDE_DIR='/usr/include/nspr4 ' + NSPR_LIB_DIR=/usr/lib + export NSPR_INCLUDE_DIR + export NSPR_LIB_DIR ++ /usr/bin/pkg-config --cflags-only-I nss-util ++ sed s/-I// + export 'NSSUTIL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + NSSUTIL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export NSSUTIL_LIB_DIR=/usr/lib + NSSUTIL_LIB_DIR=/usr/lib ++ /usr/bin/pkg-config --cflags-only-I nss-softokn ++ sed s/-I// + export 'FREEBL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + FREEBL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export FREEBL_LIB_DIR=/usr/lib + FREEBL_LIB_DIR=/usr/lib + export USE_SYSTEM_FREEBL=1 + USE_SYSTEM_FREEBL=1 + export NSS_USE_SYSTEM_FREEBL=1 + NSS_USE_SYSTEM_FREEBL=1 ++ /usr/bin/pkg-config --libs nss-softokn + export 'FREEBL_LIBS=-L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + FREEBL_LIBS='-L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + export SOFTOKEN_LIB_DIR=/usr/lib + SOFTOKEN_LIB_DIR=/usr/lib + export USE_SYSTEM_NSSUTIL=1 + USE_SYSTEM_NSSUTIL=1 + export USE_SYSTEM_SOFTOKEN=1 + USE_SYSTEM_SOFTOKEN=1 + export NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_USE_SYSTEM_SQLITE=1 + export NSS_USE_SYSTEM_SQLITE + export IN_TREE_FREEBL_HEADERS_FIRST=1 + IN_TREE_FREEBL_HEADERS_FIRST=1 + NSS_ENABLE_ECC=1 + export NSS_ENABLE_ECC + NSS_ECC_MORE_THAN_SUITE_B=1 + export NSS_ECC_MORE_THAN_SUITE_B + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + /usr/bin/make -C ./nss/coreconf make: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf' cd nsinstall; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nsinstall.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pathsub.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pathsub.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pathsub.o -Wl,-z,relro -lpthread -ldl -lc true -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' make: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf' + /usr/bin/make -C ./nss/lib/dbm make: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm' cd include; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' Creating ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cdefs.h mcom_db.h ncompat.h winfile.h ../../../../dist/public/dbm Creating ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h page.h extern.h queue.h hash.h mpool.h search.h ../../../../dist/private/dbm make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' cd src; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' cd include; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' make[1]: Nothing to be done for `libs'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' cd src; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/db.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard db.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_bigkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_bigkey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_func.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_func.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_log2.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_log2.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_page.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_page.c h_page.c: In function 'new_lseek': h_page.c:165:15: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] write(fd, (char*)&buffer, (size_t)(1024 > len ? len : 1024)); ^ h_page.c: In function 'overflow_page': h_page.c:1002:4: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] (void)write(STDERR_FILENO, OVMSG, sizeof(OVMSG) - 1); ^ h_page.c:1017:4: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] (void)write(STDERR_FILENO, OVMSG, sizeof(OVMSG) - 1); ^ h_page.c:1043:5: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] (void)write(STDERR_FILENO, OVMSG, ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash_buf.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash_buf.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mktemp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mktemp.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dirent.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dirent.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a Linux3.19_arm_glibc_PTH_OPT.OBJ/db.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_bigkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_func.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_log2.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_page.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash_buf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/mktemp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dirent.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' make: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm' + /usr/bin/make -C ./nss make: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss' cd coreconf; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf' cd nsinstall; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' true -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf' cd lib; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib' cd dbm; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm' cd include; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cdefs.h mcom_db.h ncompat.h winfile.h ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h page.h extern.h queue.h hash.h mpool.h search.h ../../../../dist/private/dbm make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' cd src; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm' cd base; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/base' Creating ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../dist/public/nss Creating ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/base' cd dev; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dev' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dev' cd pki; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pki' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pki' cd libpkix; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix' cd include; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/include' ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/include' cd pkix; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss' cd include; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/include' ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/include' cd pkix; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss' There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix' cd certdb; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certdb' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certdb' cd certhigh; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certhigh' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certhigh' cd pk11wrap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pk11wrap' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h secmodt.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/cryptohi' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h sechash.h ../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/cryptohi' cd nss; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/nss' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/nss' cd ssl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ssl' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ssl' cd pkcs12; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs12' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs12' cd pkcs7; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs7' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs7' cd smime; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/smime' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/smime' cd crmf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/crmf' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/crmf' cd jar; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/jar' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/jar' cd ckfw; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw' cd builtins; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/builtins' ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/builtins' cd pem; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsspem.h ../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/pem' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../dist/public/nss cd builtins; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/builtins' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/builtins' cd pem; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/pem' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/pem' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw' cd sysinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/sysinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib' cd cmd; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd' cd lib; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/lib' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 basicutil.h secutil.h pk11table.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/lib' cd addbuiltin; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/addbuiltin' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/addbuiltin' cd atob; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/atob' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/atob' cd btoa; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/btoa' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/btoa' cd certcgi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certcgi' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certcgi' cd certutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certutil' cd checkcert; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/checkcert' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/checkcert' cd chktest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/chktest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/chktest' cd crlutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crlutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crlutil' cd crmftest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crmftest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crmftest' cd dbtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/dbtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/dbtest' cd derdump; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/derdump' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/derdump' cd digest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/digest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/digest' cd httpserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/httpserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/httpserv' cd listsuites; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/listsuites' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/listsuites' cd makepqg; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/makepqg' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/makepqg' cd multinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/multinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/multinit' cd ocspclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspclnt' cd ocspresp; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspresp' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspresp' cd oidcalc; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/oidcalc' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/oidcalc' cd p7content; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7content' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7content' cd p7env; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7env' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7env' cd p7sign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7sign' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7sign' cd p7verify; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7verify' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7verify' cd pk12util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk12util' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk12util' cd pk11gcmtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11gcmtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11gcmtest' cd pk11mode; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11mode' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11mode' cd pk1sign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk1sign' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk1sign' cd pkix-errcodes; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pkix-errcodes' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pkix-errcodes' cd pp; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pp' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pp' cd pwdecrypt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pwdecrypt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pwdecrypt' cd rsaperf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/rsaperf' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/sdrtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/sdrtest' cd selfserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/selfserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/selfserv' cd signtool; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signtool' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signtool' cd signver; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signver' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signver' cd shlibsign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign' cd mangle; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign/mangle' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign/mangle' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign' cd smimetools; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/smimetools' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/smimetools' cd ssltap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ssltap' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ssltap' cd strsclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/strsclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/symkeyutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/symkeyutil' cd tests; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tests' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tests' cd tstclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tstclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tstclnt' cd vfychain; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfychain' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfychain' cd vfyserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfyserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfyserv' cd modutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/modutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd' cd coreconf; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf' cd nsinstall; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' true -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf' cd lib; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib' cd dbm; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm' cd include; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' make[3]: Nothing to be done for `libs'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' cd src; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm' cd base; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/base' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/arena.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard arena.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/error.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard error.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/errorval.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard errorval.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hashops.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hashops.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libc.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard libc.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/tracker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tracker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/item.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard item.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/utf8.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard utf8.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard list.c list.c: In function 'nssList_Add': list.c:220:14: warning: variable 'nssrv' set but not used [-Wunused-but-set-variable] PRStatus nssrv; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssb.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssb.a Linux3.19_arm_glibc_PTH_OPT.OBJ/arena.o Linux3.19_arm_glibc_PTH_OPT.OBJ/error.o Linux3.19_arm_glibc_PTH_OPT.OBJ/errorval.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hashops.o Linux3.19_arm_glibc_PTH_OPT.OBJ/libc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/tracker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/item.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utf8.o Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssb.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssb.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/base' cd dev; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dev' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/devslot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devslot.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/devtoken.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devtoken.c devtoken.c: In function 'nssToken_TraverseCertificates': devtoken.c:1469:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] PRStatus status; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/devutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devutil.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckhelper.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckhelper.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdev.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdev.a Linux3.19_arm_glibc_PTH_OPT.OBJ/devslot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/devtoken.o Linux3.19_arm_glibc_PTH_OPT.OBJ/devutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckhelper.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdev.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdev.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dev' cd pki; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pki' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/asymmkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard asymmkey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certificate.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certificate.c certificate.c: In function 'nssCertificateList_DoCallback': certificate.c:898:14: warning: variable 'nssrv' set but not used [-Wunused-but-set-variable] PRStatus nssrv; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cryptocontext.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cryptocontext.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/symmkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard symmkey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/trustdomain.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard trustdomain.c trustdomain.c: In function 'NSSTrustDomain_TraverseCertificates': trustdomain.c:994:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] PRStatus status = PR_FAILURE; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/tdcache.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tdcache.c tdcache.c: In function 'add_cert_to_cache': tdcache.c:779:9: warning: variable 'handle' set but not used [-Wunused-but-set-variable] PRBool handle = PR_FALSE; ^ tdcache.c: In function 'nssTrustDomain_RemoveCertFromCacheLOCKED': tdcache.c:272:16: warning: 'nickname' may be used uninitialized in this function [-Wmaybe-uninitialized] nssHash_Remove(cache->nickname, nickname); ^ tdcache.c:332:14: note: 'nickname' was declared here NSSUTF8 *nickname; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdecode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certdecode.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkistore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkistore.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkibase.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkibase.c pkibase.c: In function 'nssPKIObjectCollection_Traverse': pkibase.c:906:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] PRStatus status; ^ pkibase.c: In function 'nssCertificateCollection_Create': pkibase.c:1060:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] PRStatus status; ^ pkibase.c: In function 'nssCRLCollection_Create': pkibase.c:1167:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] PRStatus status; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pki3hack.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pki3hack.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspki.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspki.a Linux3.19_arm_glibc_PTH_OPT.OBJ/asymmkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certificate.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cryptocontext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/symmkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/trustdomain.o Linux3.19_arm_glibc_PTH_OPT.OBJ/tdcache.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdecode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkistore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkibase.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pki3hack.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspki.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pki' cd libpkix; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix' cd include; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/include' make[3]: Nothing to be done for `libs'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/include' cd pkix; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_certselector.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_comcertselparams.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcertsel.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_crlselector.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_comcrlselparams.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_basicconstraintschecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_certchainchecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_crlchecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_ekuchecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_expirationchecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_namechainingchecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_nameconstraintschecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_ocspchecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_revocationmethod.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_revocationchecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_policychecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_signaturechecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_targetcertchecker.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixchecker.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_trustanchor.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_procparams.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_valparams.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_resourcelimits.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixparams.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixparams.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_buildresult.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_policynode.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_valresult.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_verifynode.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixresults.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixresults.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_verifynode.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_store.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_store.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixstore.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixstore.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_store.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_validate.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_validate.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_lifecycle.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_build.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_build.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixtop.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixtop.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_validate.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_build.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_tools.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_tools.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_error.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_error.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_logger.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_logger.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_list.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_list.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_errpaths.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixutil.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixutil.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_tools.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_error.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_logger.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_errpaths.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_basicconstraints.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_cert.c pkix_pl_cert.c: In function 'PKIX_PL_Cert_Create': pkix_pl_cert.c:1518:22: warning: variable 'copyDER' set but not used [-Wunused-but-set-variable] PKIX_Boolean copyDER; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicyinfo.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicymap.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicyqualifier.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crl.c pkix_pl_crl.c: In function 'pkix_pl_CRL_ToString': pkix_pl_crl.c:456:21: warning: 'crlVersion' may be used uninitialized in this function [-Wmaybe-uninitialized] (&crlString, ^ pkix_pl_crl.c:354:21: note: 'crlVersion' was declared here PKIX_UInt32 crlVersion; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crldp.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crlentry.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_date.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_generalname.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_infoaccess.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_nameconstraints.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocsprequest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocspresponse.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_publickey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_x500name.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocspcertid.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixpki.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixpki.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_bigint.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_bytearray.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_common.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_error.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_hashtable.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_lifecycle.c pkix_pl_lifecycle.c: In function 'PKIX_PL_Shutdown': pkix_pl_lifecycle.c:248:21: warning: variable 'numLeakedObjects' set but not used [-Wunused-but-set-variable] PKIX_UInt32 numLeakedObjects = 0; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_mem.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_monitorlock.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_mutex.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_object.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_oid.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_primhash.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_rwlock.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_string.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixsystem.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_string.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_aiamgr.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_colcertstore.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_httpcertstore.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_httpdefaultclient.c pkix_pl_httpdefaultclient.c: In function 'pkix_pl_HttpDefaultClient_Cancel': pkix_pl_httpdefaultclient.c:1483:36: warning: variable 'client' set but not used [-Wunused-but-set-variable] PKIX_PL_HttpDefaultClient *client = NULL; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldaptemplates.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapcertstore.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapresponse.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldaprequest.c pkix_pl_ldaprequest.c: In function 'pkix_pl_LdapRequest_Destroy': pkix_pl_ldaprequest.c:266:30: warning: variable 'ldapRq' set but not used [-Wunused-but-set-variable] PKIX_PL_LdapRequest *ldapRq = NULL; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapdefaultclient.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_nsscontext.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_pk11certstore.c pkix_pl_pk11certstore.c: In function 'NameCacheHasFetchedCrlInfo': pkix_pl_pk11certstore.c:382:22: warning: variable 'cert' set but not used [-Wunused-but-set-variable] CERTCertificate *cert; ^ pkix_pl_pk11certstore.c: In function 'DownloadCrl': pkix_pl_pk11certstore.c:782:16: warning: variable 'savedError' set but not used [-Wunused-but-set-variable] PKIX_Int32 savedError = -1; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_socket.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixmodule.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_socket.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix' cd certdb; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certdb' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/alg1485.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard alg1485.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdb.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certdb.c certdb.c: In function 'CERT_ImportCerts': certdb.c:2446:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ certdb.c: In function 'CERT_UnlockCertRefCount': certdb.c:2896:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] PRStatus prstat; ^ certdb.c: In function 'CERT_UnlockCertTrust': certdb.c:2976:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] PRStatus prstat; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certv3.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certv3.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certxutl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certxutl.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crl.c crl.c: In function 'crl_storeCRL': crl.c:630:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ crl.c: In function 'cert_CheckCertRevocationStatus': crl.c:2696:27: warning: unused variable 'rv2' [-Wunused-variable] SECStatus rv2 = CERT_FindCRLEntryReasonExten(entry, &reason); ^ crl.c: In function 'cert_CacheCRLByGeneralName': crl.c:3053:32: warning: variable 'rv2' set but not used [-Wunused-but-set-variable] SECStatus rv = SECSuccess, rv2; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/genname.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard genname.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard stanpcertdb.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/polcyxtn.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard polcyxtn.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secname.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secname.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/xauthkid.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xauthkid.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/xbsconst.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xbsconst.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/xconst.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xconst.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libcertdb.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libcertdb.a Linux3.19_arm_glibc_PTH_OPT.OBJ/alg1485.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certv3.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certxutl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/genname.o Linux3.19_arm_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/polcyxtn.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secname.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xauthkid.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xbsconst.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xconst.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libcertdb.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libcertdb.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certdb' cd certhigh; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certhigh' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certhtml.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certhtml.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certreq.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certreq.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlv2.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlv2.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocsp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocsp.c ocsp.c: In function 'ocsp_RemoveCacheItem': ocsp.c:562:12: warning: variable 'couldRemoveFromHashTable' set but not used [-Wunused-but-set-variable] PRBool couldRemoveFromHashTable; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspsig.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspsig.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certhigh.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certhigh.c certhigh.c: In function 'CERT_MatchNickname': certhigh.c:28:9: warning: variable 'len' set but not used [-Wunused-but-set-variable] int len; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certvfy.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfypkix.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certvfypkix.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/xcrldist.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xcrldist.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libcerthi.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libcerthi.a Linux3.19_arm_glibc_PTH_OPT.OBJ/certhtml.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certreq.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlv2.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocsp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspsig.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certhigh.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfypkix.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xcrldist.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libcerthi.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libcerthi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certhigh' cd pk11wrap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pk11wrap' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dev3hack.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dev3hack.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11akey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11akey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11auth.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11auth.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11cert.c pk11cert.c: In function 'pk11_fastCert': pk11cert.c:231:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] PRStatus status; ^ pk11cert.c: In function 'PK11_TraverseCertsForNicknameInSlot': pk11cert.c:2008:28: warning: variable 'pk11cb' set but not used [-Wunused-but-set-variable] struct nss3_cert_cbstr pk11cb; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cxt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11cxt.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11err.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11err.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11kea.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11kea.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11list.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11list.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11load.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11load.c pk11load.c: In function 'SECMOD_UnloadModule': pk11load.c:592:28: warning: unused variable 'status' [-Wunused-variable] PRStatus status = PR_UnloadLibrary(softokenLib); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mech.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11mech.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11merge.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11merge.c pk11merge.c: In function 'pk11_mergeByObjectIDs': pk11merge.c:852:15: warning: 'error' may be used uninitialized in this function [-Wmaybe-uninitialized] PORT_SetError(error); ^ pk11merge.c:753:9: note: 'error' was declared here int error; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11nobj.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11nobj.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11obj.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11obj.c pk11obj.c: In function 'PK11_MatchItem': pk11obj.c:1784:22: warning: variable 'parent' set but not used [-Wunused-but-set-variable] CK_OBJECT_HANDLE parent; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pars.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pars.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pbe.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pbe.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pk12.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pk12.c pk11pk12.c: In function 'PK11_ImportPrivateKeyInfoAndReturnKey': pk11pk12.c:425:17: warning: variable 'keyType' set but not used [-Wunused-but-set-variable] CK_KEY_TYPE keyType = CKK_RSA; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pqg.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pqg.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11sdr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11sdr.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11skey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11skey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11slot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11slot.c pk11slot.c: In function 'PK11_InitToken': pk11slot.c:1108:11: warning: variable 'tmp' set but not used [-Wunused-but-set-variable] char *tmp; ^ pk11slot.c: In function 'PK11_InitSlot': pk11slot.c:1352:11: warning: variable 'tmp' set but not used [-Wunused-but-set-variable] char *tmp; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11util.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11util.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpk11wrap.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux3.19_arm_glibc_PTH_OPT.OBJ/dev3hack.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11akey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11auth.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cxt.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11err.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11kea.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11load.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mech.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11merge.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11nobj.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11obj.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pars.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pbe.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pk12.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pqg.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11sdr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11skey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11slot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11util.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/cryptohi' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sechash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sechash.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/seckey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard seckey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secsign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secsign.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secvfy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secvfy.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dsautil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dsautil.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libcryptohi.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libcryptohi.a Linux3.19_arm_glibc_PTH_OPT.OBJ/sechash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/seckey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secsign.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secvfy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dsautil.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libcryptohi.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/cryptohi' cd nss; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/nss' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssinit.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssinit.c nssinit.c: In function 'NSS_VersionCheck': nssinit.c:1250:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] volatile char c; /* force a reference that won't get optimized away */ ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssver.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilwrap.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard utilwrap.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss.a Linux3.19_arm_glibc_PTH_OPT.OBJ/nssinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilwrap.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss.a grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/nss.def rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/nss.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss3.so Linux3.19_arm_glibc_PTH_OPT.OBJ/nssinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspsig.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux3.19_arm_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux3.19_arm_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux3.19_arm_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux3.19_arm_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/arena.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/error.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/libc.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/item.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss3.so ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss3.so ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/nss' cd ssl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ssl' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/derive.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derive.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dtlscon.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dtlscon.c dtlscon.c: In function 'ssl3_DisableNonDTLSSuites': dtlscon.c:107:19: warning: unused variable 'rv' [-Wunused-variable] SECStatus rv = ssl3_CipherPrefSet(ss, *suite, PR_FALSE); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/prelib.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard prelib.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3con.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3con.c ssl3con.c: In function 'ssl3_DeriveMasterSecret': ssl3con.c:3666:23: warning: variable 'master_params_len' set but not used [-Wunused-but-set-variable] unsigned int master_params_len; ^ ssl3con.c: In function 'ssl3_HandleRSAClientKeyExchange': ssl3con.c:9554:23: warning: variable 'pmsItem' set but not used [-Wunused-but-set-variable] SECItem pmsItem = {siBuffer, NULL, 0}; ^ ssl3con.c:9550:23: warning: variable 'isTLS' set but not used [-Wunused-but-set-variable] PRBool isTLS = PR_FALSE; ^ ssl3con.c: In function 'ssl3_HandleRecord': ssl3con.c:12019:21: warning: 'dtls_seq_num' may be used uninitialized in this function [-Wmaybe-uninitialized] dtls_RecordSetRecvd(&crSpec->recvdRecords, dtls_seq_num); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3gthr.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslauth.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslauth.c sslauth.c: In function 'SSL_AuthCertificate': sslauth.c:267:18: warning: unused variable 'error' [-Wunused-variable] PRErrorCode error = PR_GetError(); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslcon.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslcon.c sslcon.c: In function 'ssl2_HandleMessage': sslcon.c:2498:22: warning: variable 'rv2' set but not used [-Wunused-but-set-variable] int rv2; ^ sslcon.c: In function 'NSSSSL_VersionCheck': sslcon.c:3687:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] volatile char c; /* force a reference that won't get optimized away */ ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssldef.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssldef.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslenum.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslenum.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslerr.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslerrstrs.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinit.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslinit.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ext.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3ext.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslgathr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslgathr.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslmutex.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslmutex.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslnonce.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslnonce.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslreveal.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslreveal.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsecur.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsecur.c sslsecur.c: In function 'ssl_SecureRecv': sslsecur.c:1186:22: warning: variable 'sec' set but not used [-Wunused-but-set-variable] sslSecurityInfo *sec; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsnce.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsnce.c sslsnce.c: In function 'InitCache': sslsnce.c:1232:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->sidCacheLocks) += ptr; ^ sslsnce.c:1233:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->keyCacheLock ) += ptr; ^ sslsnce.c:1234:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->certCacheLock) += ptr; ^ sslsnce.c:1235:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->srvNameCacheLock) += ptr; ^ sslsnce.c:1236:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->sidCacheSets ) += ptr; ^ sslsnce.c:1237:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->sidCacheData ) += ptr; ^ sslsnce.c:1238:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->certCacheData) += ptr; ^ sslsnce.c:1239:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->keyCacheData ) += ptr; ^ sslsnce.c:1240:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketKeyNameSuffix) += ptr; ^ sslsnce.c:1241:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketEncKey ) += ptr; ^ sslsnce.c:1242:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketMacKey ) += ptr; ^ sslsnce.c:1243:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketKeysValid) += ptr; ^ sslsnce.c:1244:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->srvNameCacheData) += ptr; ^ sslsnce.c: In function 'SSL_InheritMPServerSIDCacheInstance': sslsnce.c:1584:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->sidCacheLocks) += ptr; ^ sslsnce.c:1585:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->keyCacheLock ) += ptr; ^ sslsnce.c:1586:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->certCacheLock) += ptr; ^ sslsnce.c:1587:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->srvNameCacheLock) += ptr; ^ sslsnce.c:1588:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->sidCacheSets ) += ptr; ^ sslsnce.c:1589:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->sidCacheData ) += ptr; ^ sslsnce.c:1590:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->certCacheData) += ptr; ^ sslsnce.c:1591:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->keyCacheData ) += ptr; ^ sslsnce.c:1592:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketKeyNameSuffix) += ptr; ^ sslsnce.c:1593:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketEncKey ) += ptr; ^ sslsnce.c:1594:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketMacKey ) += ptr; ^ sslsnce.c:1595:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketKeysValid) += ptr; ^ sslsnce.c:1596:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->srvNameCacheData) += ptr; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsock.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsock.c sslsock.c: In function 'NSS_SetDomesticPolicy': sslsock.c:1392:20: warning: unused variable 'status' [-Wunused-variable] SECStatus status = SECSuccess; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltrace.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssltrace.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslver.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/authcert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard authcert.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmpcert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmpcert.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslinfo.c sslinfo.c: In function 'SSL_DisableDefaultExportCipherSuites': sslinfo.c:264:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ sslinfo.c: In function 'SSL_DisableExportCipherSuites': sslinfo.c:285:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3ecc.c ssl3ecc.c: In function 'ssl3_DisableECCSuites': ssl3ecc.c:978:19: warning: unused variable 'rv' [-Wunused-variable] SECStatus rv = ssl3_CipherPrefSet(ss, *suite, PR_FALSE); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/unix_err.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard unix_err.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl.a Linux3.19_arm_glibc_PTH_OPT.OBJ/derive.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dtlscon.o Linux3.19_arm_glibc_PTH_OPT.OBJ/prelib.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3con.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslauth.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslcon.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssldef.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslenum.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslgathr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslmutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslnonce.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslreveal.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsecur.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsnce.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltrace.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/authcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmpcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/unix_err.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl.a grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl.def rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl3.so Linux3.19_arm_glibc_PTH_OPT.OBJ/derive.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dtlscon.o Linux3.19_arm_glibc_PTH_OPT.OBJ/prelib.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3con.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslauth.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslcon.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssldef.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslenum.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslgathr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslmutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslnonce.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslreveal.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsecur.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsnce.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltrace.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/authcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmpcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/unix_err.o -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl3.so ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl3.so ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ssl' cd pkcs12; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs12' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12local.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12local.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12creat.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12creat.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12dec.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12dec.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12plcy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12plcy.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12tmpl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12tmpl.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12e.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12e.c p12e.c: In function 'sec_PKCS12CreateSafeBag': p12e.c:698:12: warning: variable 'setName' set but not used [-Wunused-but-set-variable] PRBool setName = PR_TRUE; ^ p12e.c: In function 'sec_pkcs12_encoder_start_context': p12e.c:1535:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12d.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12d.c p12d.c: In function 'SEC_PKCS12DecoderRenameCertNicknames': p12d.c:2813:5: warning: suggest parentheses around assignment used as truth value [-Wparentheses] for (i = 0; safeBag = p12dcx->safeBags[i]; i++) { ^ rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs12.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs12.a Linux3.19_arm_glibc_PTH_OPT.OBJ/p12local.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12creat.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12dec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12plcy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12tmpl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12e.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12d.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs12.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs12' cd pkcs7; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs7' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certread.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certread.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7common.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7common.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7create.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7create.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7decode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7decode.c p7decode.c: In function 'sec_pkcs7_verify_signature': p7decode.c:1293:21: warning: variable 'crls' set but not used [-Wunused-but-set-variable] CERTSignedCrl **crls; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7encode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7encode.c p7encode.c: In function 'sec_pkcs7_encoder_start_encrypt': p7encode.c:62:18: warning: variable 'wincx' set but not used [-Wunused-but-set-variable] void *mark, *wincx; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7local.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7local.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secmime.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secmime.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs7.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs7.a Linux3.19_arm_glibc_PTH_OPT.OBJ/certread.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7common.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7create.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7decode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7encode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7local.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secmime.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs7.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs7' cd smime; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/smime' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsarray.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsarray.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsasn1.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsasn1.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsattr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsattr.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscinfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmscinfo.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscipher.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmscipher.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdecode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdecode.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdigdata.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdigest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsencdata.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsencode.c cmsencode.c: In function 'nss_cms_encoder_notify': cmsencode.c:125:18: warning: variable 'poolp' set but not used [-Wunused-but-set-variable] PLArenaPool *poolp; ^ cmsencode.c: In function 'nss_cms_before_data': cmsencode.c:204:18: warning: variable 'poolp' set but not used [-Wunused-but-set-variable] PLArenaPool *poolp; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsenvdata.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsmessage.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsmessage.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmspubkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmspubkey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsrecinfo.c cmsrecinfo.c: In function 'NSS_CMSRecipientInfo_UnwrapBulkKey': cmsrecinfo.c:529:21: warning: variable 'encalg' set but not used [-Wunused-but-set-variable] SECAlgorithmID *encalg; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsreclist.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsreclist.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssigdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmssigdata.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmssiginfo.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsudf.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsudf.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsutil.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimemessage.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimemessage.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimeutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimeutil.c smimeutil.c: In function 'NSSSMIME_VersionCheck': smimeutil.c:772:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] volatile char c; /* force a reference that won't get optimized away */ ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimever.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimever.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime.a Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsarray.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsasn1.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsattr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscipher.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdecode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsmessage.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmspubkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsreclist.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssigdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsudf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimemessage.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimeutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimever.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime.a grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/smime.def rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/smime.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime3.so Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsarray.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsasn1.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsattr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscipher.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdecode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsmessage.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmspubkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsreclist.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssigdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsudf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimemessage.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimeutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/secmime.o -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime3.so ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime3.so ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/smime' cd crmf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/crmf' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfenc.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfenc.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmftmpl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmftmpl.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfreq.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfreq.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfpop.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfpop.c crmfpop.c: In function 'CRMF_CertReqMsgSetRAVerifiedPOP': crmfpop.c:36:28: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] SECItem *dummy; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfdec.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfdec.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfget.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfget.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfcont.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfcont.c crmfcont.c: In function 'CRMF_CreateEncryptedKeyWithEncryptedValue': crmfcont.c:860:31: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] CRMFEncryptedValue *dummy; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfasn1.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfresp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfresp.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfrec.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfrec.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfchal.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfchal.c cmmfchal.c: In function 'cmmf_create_witness_and_challenge': cmmfchal.c:33:22: warning: variable 'id' set but not used [-Wunused-but-set-variable] CK_OBJECT_HANDLE id; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/servget.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard servget.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/encutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard encutil.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/respcli.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard respcli.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/respcmn.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard respcmn.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/challcli.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard challcli.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/asn1cmn.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard asn1cmn.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libcrmf.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libcrmf.a Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfenc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmftmpl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfreq.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfpop.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfdec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfget.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfcont.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfresp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfrec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfchal.o Linux3.19_arm_glibc_PTH_OPT.OBJ/servget.o Linux3.19_arm_glibc_PTH_OPT.OBJ/encutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/respcli.o Linux3.19_arm_glibc_PTH_OPT.OBJ/respcmn.o Linux3.19_arm_glibc_PTH_OPT.OBJ/challcli.o Linux3.19_arm_glibc_PTH_OPT.OBJ/asn1cmn.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libcrmf.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libcrmf.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/crmf' cd jar; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/jar' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarver.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarsign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarsign.c jarsign.c: In function 'jar_create_pk7': jarsign.c:174:11: warning: variable 'errstring' set but not used [-Wunused-but-set-variable] char *errstring; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jar.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jar.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jar-ds.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jar-ds.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarfile.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarfile.c jarfile.c: In function 'jar_listtar': jarfile.c:824:12: warning: variable 'when' set but not used [-Wunused-but-set-variable] time_t when; ^ jarfile.c:823:14: warning: variable 'mode' set but not used [-Wunused-but-set-variable] long sz, mode; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarint.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarint.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libjar.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libjar.a Linux3.19_arm_glibc_PTH_OPT.OBJ/jarver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarsign.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jar.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jar-ds.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarfile.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarint.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libjar.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libjar.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/jar' cd ckfw; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crypto.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crypto.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/find.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard find.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/instance.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard instance.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mutex.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mutex.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/object.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard object.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/session.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard session.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sessobj.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sessobj.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/slot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard slot.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/token.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard token.c token.c: In function 'nssCKFWToken_GetUTCTime': token.c:1261:27: warning: variable 'z' set but not used [-Wunused-but-set-variable] int Y, M, D, h, m, s, z; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/wrap.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard wrap.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mechanism.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mechanism.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckfw.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckfw.a Linux3.19_arm_glibc_PTH_OPT.OBJ/crypto.o Linux3.19_arm_glibc_PTH_OPT.OBJ/find.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/instance.o Linux3.19_arm_glibc_PTH_OPT.OBJ/mutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/object.o Linux3.19_arm_glibc_PTH_OPT.OBJ/session.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sessobj.o Linux3.19_arm_glibc_PTH_OPT.OBJ/slot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/token.o Linux3.19_arm_glibc_PTH_OPT.OBJ/wrap.o Linux3.19_arm_glibc_PTH_OPT.OBJ/mechanism.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckfw.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib cd builtins; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/builtins' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/anchor.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard anchor.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/constants.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard constants.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/bfind.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bfind.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/binst.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard binst.c binst.c: In function 'builtins_mdInstance_GetLibraryVersion': binst.c:70:17: warning: variable 'c' set but not used [-Wunused-but-set-variable] volatile char c; /* force a reference that won't get optimized away */ ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/bobject.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bobject.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/bsession.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bsession.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/bslot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bslot.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/btoken.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard btoken.c perl certdata.perl < certdata.txt > Linux3.19_arm_glibc_PTH_OPT.OBJ/certdata.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/certdata.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckbiver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckbiver.c grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/nssckbi.def rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckbi.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckbi.so Linux3.19_arm_glibc_PTH_OPT.OBJ/anchor.o Linux3.19_arm_glibc_PTH_OPT.OBJ/constants.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bfind.o Linux3.19_arm_glibc_PTH_OPT.OBJ/binst.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bobject.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bsession.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bslot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/btoken.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckbiver.o ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/builtins' cd pem; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/pem' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/anchor.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard anchor.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/constants.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard constants.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pargs.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pargs.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pfind.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pfind.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pinst.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pinst.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pobject.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pobject.c pobject.c: In function 'pem_CreateObject': pobject.c:1047:15: warning: variable 'token' set but not used [-Wunused-but-set-variable] pemToken *token; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/prsa.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard prsa.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/psession.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard psession.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pslot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pslot.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ptoken.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ptoken.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckpemver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckpemver.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/rsawrapr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard rsawrapr.c rsawrapr.c:128:1: warning: 'oaep_xor_with_h1' defined but not used [-Wunused-function] oaep_xor_with_h1(unsigned char *data, unsigned int datalen, ^ rsawrapr.c:190:1: warning: 'oaep_xor_with_h2' defined but not used [-Wunused-function] oaep_xor_with_h2(unsigned char *salt, unsigned int saltlen, ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/util.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard util.c util.c: In function 'ReadDERFromFile': util.c:142:9: warning: variable 'error' set but not used [-Wunused-but-set-variable] int error; ^ grep -v ';-' nsspem.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/nsspem.def rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspem.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsspem.so -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/nsspem.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspem.so Linux3.19_arm_glibc_PTH_OPT.OBJ/anchor.o Linux3.19_arm_glibc_PTH_OPT.OBJ/constants.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pargs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pfind.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pinst.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pobject.o Linux3.19_arm_glibc_PTH_OPT.OBJ/prsa.o Linux3.19_arm_glibc_PTH_OPT.OBJ/psession.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pslot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ptoken.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckpemver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/rsawrapr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/util.o ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lnssutil3 -lfreebl3 -L../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lnssckfw -lnssb -lplc4 -lplds4 -L../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lnssutil3 -lfreebl3 -lsoftokn3 -lpthread -ldl -lc -L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspem.so ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspem.so ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/pem' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw' cd sysinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/sysinit' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nsssysinit.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nsssysinit.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux3.19_arm_glibc_PTH_OPT.OBJ/nsssysinit.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.a rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsssysinit.so -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.so Linux3.19_arm_glibc_PTH_OPT.OBJ/nsssysinit.o -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib' cd cmd; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd' cd lib; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/lib' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/basicutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard basicutil.c basicutil.c: In function 'SECU_PrintAsHex': basicutil.c:312:9: warning: 'column' may be used uninitialized in this function [-Wmaybe-uninitialized] column++; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secutil.c secutil.c: In function 'SECU_ChangePW2': secutil.c:336:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ secutil.c: In function 'SECU_PrintCertificateBasicInfo': secutil.c:2420:9: warning: unused variable 'iv' [-Wunused-variable] int iv; ^ secutil.c: In function 'secu_PrintPKCS7Signed': secutil.c:2746:11: warning: passing argument 5 of 'SECU_PrintSignedData' from incompatible pointer type [enabled by default] SECU_PrintCertificate); ^ In file included from secutil.c:19:0: secutil.h:263:12: note: expected 'SECU_PPFunc' but argument is of type 'int (*)(struct FILE *, const struct SECItem *, const char *, int)' extern int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m, ^ secutil.c: In function 'secu_PrintPKCS7SignedAndEnveloped': secutil.c:2865:11: warning: passing argument 5 of 'SECU_PrintSignedData' from incompatible pointer type [enabled by default] SECU_PrintCertificate); ^ In file included from secutil.c:19:0: secutil.h:263:12: note: expected 'SECU_PPFunc' but argument is of type 'int (*)(struct FILE *, const struct SECItem *, const char *, int)' extern int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m, ^ secutil.c: In function 'SEC_PrintCertificateAndTrust': secutil.c:3195:10: warning: passing argument 5 of 'SECU_PrintSignedData' from incompatible pointer type [enabled by default] SECU_PrintCertificate); ^ secutil.c:3168:5: note: expected 'SECU_PPFunc' but argument is of type 'int (*)(struct FILE *, const struct SECItem *, const char *, int)' int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m, ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secpwd.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secpwd.c secpwd.c: In function 'SEC_GetPassword': secpwd.c:77:14: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] QUIET_FGETS ( phrase, sizeof(phrase), input); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/derprint.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derprint.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/moreoids.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard moreoids.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pppolicy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pppolicy.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ffs.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ffs.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11table.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11table.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libsectool.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libsectool.a Linux3.19_arm_glibc_PTH_OPT.OBJ/basicutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secpwd.o Linux3.19_arm_glibc_PTH_OPT.OBJ/derprint.o Linux3.19_arm_glibc_PTH_OPT.OBJ/moreoids.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pppolicy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ffs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11table.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libsectool.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libsectool.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/lib' cd addbuiltin; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/addbuiltin' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/addbuiltin.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard addbuiltin.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/addbuiltin -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/addbuiltin.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/addbuiltin ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/addbuiltin' cd atob; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/atob' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/atob.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard atob.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/atob -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/atob.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/atob ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/atob' cd btoa; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/btoa' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/btoa.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard btoa.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/btoa -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/btoa.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/btoa ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/btoa' cd certcgi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certcgi' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certcgi.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certcgi.c certcgi.c: In function 'MakeV1Cert': certcgi.c:530:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ certcgi.c: In function 'get_serial_number': certcgi.c:594:6: warning: this decimal constant is unsigned only in ISO C90 [enabled by default] if (serial == 4294967295) { ^ certcgi.c: In function 'string_to_binary': certcgi.c:1425:24: warning: variable 'low_digit' set but not used [-Wunused-but-set-variable] int low_digit; ^ certcgi.c:1424:24: warning: variable 'high_digit' set but not used [-Wunused-but-set-variable] int high_digit; ^ certcgi.c: At top level: certcgi.c:360:1: warning: 'update_data_by_name' defined but not used [-Wunused-function] update_data_by_name(Pair *data, ^ certcgi.c:388:1: warning: 'update_data_by_index' defined but not used [-Wunused-function] update_data_by_index(Pair *data, ^ certcgi.c:404:1: warning: 'add_field' defined but not used [-Wunused-function] add_field(Pair *data, ^ certcgi.c: In function 'get_serial_number': certcgi.c:590:11: warning: ignoring return value of 'fread', declared with attribute warn_unused_result [-Wunused-result] fread(&serial, sizeof(int), 1, serialFile); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certcgi -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/certcgi.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/certcgi ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certcgi' cd certutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certutil' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certext.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certext.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certutil.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/keystuff.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard keystuff.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certutil -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/certext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/keystuff.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/certutil ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certutil' cd checkcert; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/checkcert' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/checkcert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard checkcert.c checkcert.c: In function 'OurVerifyData': checkcert.c:125:15: warning: variable 'sigAlgTag' set but not used [-Wunused-but-set-variable] SECOidTag sigAlgTag; ^ checkcert.c: In function 'main': checkcert.c:391:10: warning: passing argument 5 of 'SECU_PrintSignedData' from incompatible pointer type [enabled by default] SECU_PrintCertificate); ^ In file included from checkcert.c:5:0: ../../../dist/private/nss/secutil.h:263:12: note: expected 'SECU_PPFunc' but argument is of type 'int (*)(struct FILE *, const struct SECItem *, const char *, int)' extern int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m, ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/checkcert -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/checkcert.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/checkcert ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/checkcert' cd chktest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/chktest' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/chktest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard chktest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/chktest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/chktest.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/chktest ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/chktest' cd crlutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crlutil' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlgen_lex.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlgen.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlgen.c crlgen.c: In function 'crlgen_RmCert': crlgen.c:1082:18: warning: variable 'arena' set but not used [-Wunused-but-set-variable] PLArenaPool *arena; ^ crlgen.c: In function 'crlgen_CreateInvalidityDate': crlgen.c:627:22: warning: 'mark' may be used uninitialized in this function [-Wmaybe-uninitialized] PORT_ArenaRelease(arena, mark); ^ crlgen.c: In function 'crlgen_CreateReasonCode': crlgen.c:586:23: warning: 'mark' may be used uninitialized in this function [-Wmaybe-uninitialized] PORT_ArenaRelease (arena, mark); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlutil.c crlutil.c: In function 'main': crlutil.c:1108:16: warning: 'rv' may be used uninitialized in this function [-Wmaybe-uninitialized] return (rv != SECSuccess); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlutil -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlgen.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlutil.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/crlutil ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crlutil' cd crmftest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crmftest' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/testcrmf.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard testcrmf.c testcrmf.c: In function 'get_serial_number': testcrmf.c:130:16: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ testcrmf.c: In function 'main': testcrmf.c:1539:23: warning: variable 'PArg' set but not used [-Wunused-but-set-variable] PRBool PArg = PR_FALSE; ^ testcrmf.c:1538:23: warning: variable 'sArg' set but not used [-Wunused-but-set-variable] PRBool sArg = PR_FALSE; ^ testcrmf.c:1537:23: warning: variable 'eArg' set but not used [-Wunused-but-set-variable] PRBool eArg = PR_FALSE; ^ testcrmf.c:1536:23: warning: variable 'pArg' set but not used [-Wunused-but-set-variable] PRBool pArg = PR_FALSE; ^ testcrmf.c: At top level: testcrmf.c:941:1: warning: 'mapWrapKeyType' defined but not used [-Wunused-function] mapWrapKeyType(KeyType keyType) ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmftest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/testcrmf.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcrmf.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/crmftest ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crmftest' cd dbtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/dbtest' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dbtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dbtest.c In file included from ../modutil/modutil.h:22:0, from dbtest.c:32: ../modutil/error.h:136:14: warning: 'msgStrings' defined but not used [-Wunused-variable] static char *msgStrings[] = { ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dbtest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/dbtest.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/dbtest ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/dbtest' cd derdump; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/derdump' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/derdump.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derdump.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/derdump -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/derdump.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/derdump ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/derdump' cd digest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/digest' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/digest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard digest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/digest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/digest.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/digest ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/digest' cd httpserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/httpserv' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/httpserv.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard httpserv.c httpserv.c: In function 'handle_connection': httpserv.c:715:39: warning: integer overflow in expression [-Woverflow] nextUpdate = PR_Now() + 60*60*24 * PR_USEC_PER_SEC; /*tomorrow*/ ^ httpserv.c:716:37: warning: integer overflow in expression [-Woverflow] revoDate = PR_Now() - 60*60*24 * PR_USEC_PER_SEC; /*yesterday*/ ^ httpserv.c: In function 'getBoundListenSocket': httpserv.c:941:24: warning: variable 'socketDomain' set but not used [-Wunused-but-set-variable] PRUint16 socketDomain = PR_AF_INET; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/httpserv -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/httpserv.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/httpserv ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/httpserv' cd listsuites; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/listsuites' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/listsuites.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard listsuites.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/listsuites -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/listsuites.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/listsuites ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/listsuites' cd makepqg; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/makepqg' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/makepqg.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard makepqg.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/makepqg -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/makepqg.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/makepqg ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/makepqg' cd multinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/multinit' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/multinit.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard multinit.c multinit.c:320:1: warning: 'appendItem' defined but not used [-Wunused-function] appendItem(SECItem *item) ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/multinit -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/multinit.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/multinit ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/multinit' cd ocspclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspclnt' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspclnt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspclnt.c ocspclnt.c: In function 'print_raw_certificates': ocspclnt.c:565:10: warning: passing argument 5 of 'SECU_PrintSignedData' from incompatible pointer type [enabled by default] SECU_PrintCertificate); ^ In file included from ocspclnt.c:9:0: ../../../dist/private/nss/secutil.h:263:12: note: expected 'SECU_PPFunc' but argument is of type 'int (*)(struct FILE *, const struct SECItem *, const char *, int)' extern int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m, ^ ocspclnt.c: In function 'main': ocspclnt.c:446:8: warning: 'cert_usage' may be used uninitialized in this function [-Wmaybe-uninitialized] rv = CERT_VerifyCert (handle, cert, PR_TRUE, cert_usage, verify_time, ^ ocspclnt.c:967:18: note: 'cert_usage' was declared here SECCertUsage cert_usage; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspclnt -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspclnt.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspclnt ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspclnt' cd ocspresp; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspresp' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspresp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspresp.c ocspresp.c: In function 'main': ocspresp.c:140:15: warning: variable 'statusDecodedFail' set but not used [-Wunused-but-set-variable] SECStatus statusDecodedFail; ^ ocspresp.c:136:15: warning: variable 'statusDecodedRev' set but not used [-Wunused-but-set-variable] SECStatus statusDecodedRev; ^ ocspresp.c:132:15: warning: variable 'statusDecoded' set but not used [-Wunused-but-set-variable] SECStatus statusDecoded; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspresp -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspresp.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspresp ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspresp' cd oidcalc; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/oidcalc' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/oidcalc.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard oidcalc.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/oidcalc -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/oidcalc.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/oidcalc ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/oidcalc' cd p7content; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7content' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7content.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7content.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7content -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/p7content.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/p7content ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7content' cd p7env; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7env' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7env.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7env.c p7env.c: In function 'main': p7env.c:133:11: warning: variable 'certName' set but not used [-Wunused-but-set-variable] char *certName; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7env -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/p7env.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/p7env ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7env' cd p7sign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7sign' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7sign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7sign.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7sign -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/p7sign.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/p7sign ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7sign' cd p7verify; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7verify' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7verify.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7verify.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7verify -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/p7verify.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/p7verify ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7verify' cd pk12util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk12util' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk12util.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk12util.c pk12util.c: In function 'P12U_ListPKCS12File': pk12util.c:759:30: warning: passing argument 5 of 'SECU_PrintSignedData' from incompatible pointer type [enabled by default] 0, SECU_PrintCertificate) != 0) { ^ In file included from pk12util.c:11:0: ../../../dist/private/nss/secutil.h:263:12: note: expected 'SECU_PPFunc' but argument is of type 'int (*)(struct FILE *, const struct SECItem *, const char *, int)' extern int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m, ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk12util -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/pk12util.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pk12util ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk12util' cd pk11gcmtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11gcmtest' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11gcmtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11gcmtest.c pk11gcmtest.c: In function 'aes_gcm_kat': pk11gcmtest.c:319:6: warning: 'tagsize' may be used uninitialized in this function [-Wmaybe-uninitialized] rv = aes_decrypt_buf(key, keysize, iv, ivsize, ^ pk11gcmtest.c:319:6: warning: 'ciphertextlen' may be used uninitialized in this function [-Wmaybe-uninitialized] pk11gcmtest.c:66:24: warning: 'ivsize' may be used uninitialized in this function [-Wmaybe-uninitialized] gcm_params.ulIvLen = ivsize; ^ pk11gcmtest.c:174:18: note: 'ivsize' was declared here unsigned int ivsize; ^ pk11gcmtest.c:54:18: warning: 'keysize' may be used uninitialized in this function [-Wmaybe-uninitialized] key_item.len = keysize; ^ pk11gcmtest.c:172:18: note: 'keysize' was declared here unsigned int keysize; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11gcmtest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11gcmtest.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11gcmtest ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11gcmtest' cd pk11mode; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11mode' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11mode.c pk11mode.c: In function 'PKM_TLSMasterKeyDerive': pk11mode.c:4561:29: warning: variable 'expected_version' set but not used [-Wunused-but-set-variable] CK_VERSION expected_version, version; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mode -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mode.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mode ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11mode' cd pk1sign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk1sign' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk1sign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk1sign.c pk1sign.c: In function 'main': pk1sign.c:283:32: warning: 'cert' may be used uninitialized in this function [-Wmaybe-uninitialized] CERT_DestroyCertificate(cert); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk1sign -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/pk1sign.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pk1sign ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk1sign' cd pkix-errcodes; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pkix-errcodes' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix-errcodes.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix-errcodes.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix-errcodes -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix-errcodes.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix-errcodes ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pkix-errcodes' cd pp; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pp' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pp.c pp.c: In function 'main': pp.c:139:9: warning: passing argument 5 of 'SECU_PrintSignedData' from incompatible pointer type [enabled by default] SECU_PrintCertificate); ^ In file included from pp.c:10:0: ../../../dist/private/nss/secutil.h:263:12: note: expected 'SECU_PPFunc' but argument is of type 'int (*)(struct FILE *, const struct SECItem *, const char *, int)' extern int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m, ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pp -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/pp.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pp ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pp' cd pwdecrypt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pwdecrypt' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pwdecrypt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pwdecrypt.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pwdecrypt -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/pwdecrypt.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pwdecrypt ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pwdecrypt' cd rsaperf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/rsaperf' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/rsaperf.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard rsaperf.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/defkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard defkey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/rsaperf -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/rsaperf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/defkey.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/rsaperf ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/sdrtest' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sdrtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sdrtest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sdrtest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/sdrtest.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/sdrtest ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/sdrtest' cd selfserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/selfserv' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/selfserv.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard selfserv.c selfserv.c: In function 'makeSignedOCSPResponse': selfserv.c:1148:33: warning: integer overflow in expression [-Woverflow] nextUpdate = now + 60*60*24 * PR_USEC_PER_SEC; /* plus 1 day */ ^ selfserv.c:1163:18: warning: integer overflow in expression [-Woverflow] now - 60*60*24 * PR_USEC_PER_SEC, /* minus 1 day */ ^ selfserv.c: In function 'getBoundListenSocket': selfserv.c:1706:24: warning: variable 'socketDomain' set but not used [-Wunused-but-set-variable] PRUint16 socketDomain = PR_AF_INET; ^ selfserv.c: In function 'makeSignedOCSPResponse': selfserv.c:1179:24: warning: 'sr' may be used uninitialized in this function [-Wmaybe-uninitialized] singleResponses[0] = sr; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/selfserv -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/selfserv.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/selfserv ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/selfserv' cd signtool; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signtool' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/signtool.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard signtool.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certgen.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certgen.c certgen.c: In function 'sign_cert': certgen.c:423:11: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] void *dummy; ^ certgen.c: In function 'GetSubjectFromUser': certgen.c:125:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] fgets(buf, STDIN_BUF_SIZE, stdin); ^ certgen.c:147:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] fgets(buf, STDIN_BUF_SIZE, stdin); ^ certgen.c:166:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] fgets(buf, STDIN_BUF_SIZE, stdin); ^ certgen.c:184:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] fgets(buf, STDIN_BUF_SIZE, stdin); ^ certgen.c:202:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] fgets(buf, STDIN_BUF_SIZE, stdin); ^ certgen.c:223:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] fgets(buf, STDIN_BUF_SIZE, stdin); ^ certgen.c:241:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] fgets(buf, STDIN_BUF_SIZE, stdin); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/javascript.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard javascript.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard list.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sign.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/util.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard util.c util.c: In function 'XP_GetString': util.c:21:5: warning: return discards 'const' qualifier from pointer target type [enabled by default] return SECU_Strerror (i); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/verify.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard verify.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/zip.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard zip.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/signtool -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/signtool.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certgen.o Linux3.19_arm_glibc_PTH_OPT.OBJ/javascript.o Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sign.o Linux3.19_arm_glibc_PTH_OPT.OBJ/util.o Linux3.19_arm_glibc_PTH_OPT.OBJ/verify.o Linux3.19_arm_glibc_PTH_OPT.OBJ/zip.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/signtool ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signtool' cd signver; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signver' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/signver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard signver.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk7print.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk7print.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/signver -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/signver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk7print.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/signver ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signver' cd shlibsign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/shlibsign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard shlibsign.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/shlibsign -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/shlibsign.o -Wl,-z,relro -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/shlibsign ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin cd mangle; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign/mangle' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mangle.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mangle.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mangle -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/mangle.o -Wl,-z,relro -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/mangle ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign/mangle' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign' cd smimetools; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/smimetools' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsutil.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/smimetools' cd ssltap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ssltap' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltap.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssltap.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltap -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltap.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltap ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ssltap' cd strsclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/strsclnt' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/strsclnt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard strsclnt.c strsclnt.c: In function 'do_connects': strsclnt.c:735:18: warning: variable 'result' set but not used [-Wunused-but-set-variable] SECStatus result; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/strsclnt -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/strsclnt.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/strsclnt ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/symkeyutil' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/symkeyutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard symkeyutil.c symkeyutil.c: In function 'main': symkeyutil.c:1018:31: warning: unused variable 'rv2' [-Wunused-variable] SECStatus rv2 = PK11_FreeSlotListElement(slotList, se); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/symkeyutil -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/symkeyutil.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/symkeyutil ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/symkeyutil' cd tests; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tests' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/baddbdir.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard baddbdir.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/baddbdir -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/baddbdir.o \ -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/conflict.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard conflict.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/conflict -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/conflict.o \ -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dertimetest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dertimetest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dertimetest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/dertimetest.o \ -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/encodeinttest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard encodeinttest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/encodeinttest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/encodeinttest.o \ -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nonspr10.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nonspr10.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nonspr10 -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/nonspr10.o \ -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/remtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard remtest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/remtest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/remtest.o \ -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secmodtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secmodtest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secmodtest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/secmodtest.o \ -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/baddbdir Linux3.19_arm_glibc_PTH_OPT.OBJ/conflict Linux3.19_arm_glibc_PTH_OPT.OBJ/dertimetest Linux3.19_arm_glibc_PTH_OPT.OBJ/encodeinttest Linux3.19_arm_glibc_PTH_OPT.OBJ/nonspr10 Linux3.19_arm_glibc_PTH_OPT.OBJ/remtest Linux3.19_arm_glibc_PTH_OPT.OBJ/secmodtest ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tests' cd tstclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tstclnt' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/tstclnt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tstclnt.c tstclnt.c: In function 'dumpServerCertificateChain': tstclnt.c:537:15: warning: assignment from incompatible pointer type [enabled by default] dumpFunction = SECU_PrintCertificateBasicInfo; ^ tstclnt.c:539:15: warning: assignment from incompatible pointer type [enabled by default] dumpFunction = SECU_PrintCertificate; ^ tstclnt.c: In function 'ownAuthCertificate': tstclnt.c:647:19: warning: unused variable 'error' [-Wunused-variable] PRErrorCode error = PR_GetError(); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/tstclnt -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/tstclnt.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/tstclnt ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tstclnt' cd vfychain; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfychain' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfychain.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfychain.c vfychain.c: In function 'configureRevocationParams': vfychain.c:363:50: warning: 'revFlags' may be used uninitialized in this function [-Wmaybe-uninitialized] revFlags[cert_revocation_method_ocsp] = ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfychain -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/vfychain.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/vfychain ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfychain' cd vfyserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfyserv' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyserv.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfyserv.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfyutil.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyserv -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyserv.o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyutil.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyserv ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfyserv' cd modutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/modutil' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/modutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard modutil.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/instsec.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard instsec.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/install.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard install.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/installparse.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard installparse.c ytab.c: In function 'Pk11Install_yyparse': ytab.c:219:5: warning: suggest parentheses around assignment used as truth value [-Wparentheses] gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/install-ds.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard install-ds.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard lex.Pk11Install_yy.c installparse.l:25:17: warning: 'Pkcs11Install_yyunput' defined but not used [-Wunused-function] ^ lex.Pk11Install_yy.cpp:1060:13: note: in expansion of macro 'yyunput' lex.Pk11Install_yy.cpp:1106:12: warning: 'input' defined but not used [-Wunused-function] gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/modutil -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/modutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11.o Linux3.19_arm_glibc_PTH_OPT.OBJ/instsec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/install.o Linux3.19_arm_glibc_PTH_OPT.OBJ/installparse.o Linux3.19_arm_glibc_PTH_OPT.OBJ/install-ds.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/modutil ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd' make: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss' ~/build/BUILD/nss-3.19.1/nss ~/build/BUILD/nss-3.19.1 + unset NSS_BLTEST_NOT_AVAILABLE + pushd ./nss + /usr/bin/make clean_docs build_docs /usr/bin/make -C ./doc clean make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/doc' rm -f date.xml version.xml *.tar.bz2 rm -f html/*.proc rm -fr nss-man ascii make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/doc' /usr/bin/make -C ./doc make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/doc' date +"%e %B %Y" | tr -d '\n' > date.xml echo -n > version.xml mkdir -p html mkdir -p nroff make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/doc' ~/build/BUILD/nss-3.19.1 + popd + /usr/bin/mkdir -p ./dist/doc/nroff + /usr/bin/cp ./nss/doc/nroff/certutil.1 ./nss/doc/nroff/cmsutil.1 ./nss/doc/nroff/crlutil.1 ./nss/doc/nroff/derdump.1 ./nss/doc/nroff/modutil.1 ./nss/doc/nroff/pk12util.1 ./nss/doc/nroff/pp.1 ./nss/doc/nroff/signtool.1 ./nss/doc/nroff/signver.1 ./nss/doc/nroff/ssltap.1 ./nss/doc/nroff/vfychain.1 ./nss/doc/nroff/vfyserv.1 ./dist/doc/nroff + /usr/bin/mkdir -p ./dist/pkgconfig + /usr/bin/cat /builddir/build/SOURCES/nss.pc.in + sed -e s,%libdir%,/usr/lib,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.19.1,g -e s,%NSPR_VERSION%,4.10.8,g -e s,%NSSUTIL_VERSION%,3.19.1,g -e s,%SOFTOKEN_VERSION%,3.16.2.3,g ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMAJOR' ++ awk '{print $3}' + NSS_VMAJOR=3 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMINOR' ++ awk '{print $3}' + NSS_VMINOR=19 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VPATCH' ++ awk '{print $3}' + NSS_VPATCH=1 + export NSS_VMAJOR + export NSS_VMINOR + export NSS_VPATCH + /usr/bin/cat /builddir/build/SOURCES/nss-config.in + sed -e s,@libdir@,/usr/lib,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,19,g -e s,@MOD_PATCH_VERSION@,1,g + chmod 755 ./dist/pkgconfig/nss-config + /usr/bin/cat /builddir/build/SOURCES/setup-nsssysinit.sh + chmod 755 ./dist/pkgconfig/setup-nsssysinit.sh + /usr/bin/cp ./nss/lib/ckfw/nssck.api ./dist/private/nss/ + date '+%e %B %Y' + tr -d '\n' + echo -n 3.19.1 + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/nss-config.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/setup-nsssysinit.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/pkcs11.txt.xml . + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man nss-config.xml Note: Writing nss-config.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man setup-nsssysinit.xml Note: Writing setup-nsssysinit.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man pkcs11.txt.xml Note: Writing pkcs11.txt.5 + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert8.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert9.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key3.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key4.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/secmod.db.xml . + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert8.db.xml Note: Writing cert8.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert9.db.xml Note: Writing cert9.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key3.db.xml Note: Writing key3.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key4.db.xml Note: Writing key4.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man secmod.db.xml Note: Writing secmod.db.5 + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.kkT0We + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm '!=' / ']' + rm -rf /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm ++ dirname /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm + cd nss-3.19.1 + /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3/templates + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/pkgconfig + mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1 + mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man5 + touch /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/libnssckbi.so + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/libnssckbi.so + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//etc/pki/nssdb + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert8.db /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//etc/pki/nssdb/cert8.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key3.db /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//etc/pki/nssdb/key3.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-secmod.db /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//etc/pki/nssdb/secmod.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//etc/pki/nssdb/cert9.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//etc/pki/nssdb/key4.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//etc/pki/nssdb/pkcs11.txt + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/listsuites /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nsspem.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in dist/private/nss/nssck.api + /usr/bin/install -p -m 644 dist/private/nss/nssck.api /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3/templates + /usr/bin/install -p -m 644 ./dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/pkgconfig/nss.pc + /usr/bin/install -p -m 755 ./dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin/nss-config + /usr/bin/install -p -m 755 ./dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin/setup-nsssysinit.sh + ln -r -s -f /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin/setup-nsssysinit + for f in nss-config setup-nsssysinit + install -c -m 644 nss-config.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/nss-config.1 + for f in nss-config setup-nsssysinit + install -c -m 644 setup-nsssysinit.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/setup-nsssysinit.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/certutil.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/certutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/cmsutil.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/cmsutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/crlutil.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/crlutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/derdump.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/derdump.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/modutil.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/modutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pk12util.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/pk12util.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pp.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/pp.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signtool.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/signtool.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signver.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/signver.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/ssltap.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/ssltap.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfychain.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/vfychain.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfyserv.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/vfyserv.1 + for f in pkcs11.txt + install -c -m 644 pkcs11.txt.5 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man5/pkcs11.txt.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert8.db.5 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man5/cert8.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert9.db.5 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man5/cert9.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key3.db.5 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man5/key3.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key4.db.5 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man5/key4.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 secmod.db.5 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man5/secmod.db.5 + /usr/lib/rpm/find-debuginfo.sh --strict-build-id -m --run-dwz --dwz-low-mem-die-limit 10000000 --dwz-max-die-limit 50000000 /builddir/build/BUILD/nss-3.19.1 extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/certutil extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/signtool extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/pk12util extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/crlutil extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/modutil extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/signver extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/cmsutil extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/ssltap extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/libsmime3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/libnsssysinit.so extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/libssl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/libnss3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/vfyserv extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/vfychain extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/listsuites extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/selfserv extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/ocspclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/strsclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/derdump extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/pp extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/tstclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/btoa extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/symkeyutil extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/atob extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/libnssckbi.so extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/libnsspem.so /usr/lib/rpm/sepdebugcrcfix: Updated 26 CRC32s, 0 CRC32s did match. cpio: nss-3.19.1/nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory cpio: nss-3.19.1/nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory 23987 blocks + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/redhat/brp-compress + /usr/lib/rpm/redhat/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/brp-python-bytecompile /usr/bin/python 1 + /usr/lib/rpm/redhat/brp-python-hardlink + /usr/lib/rpm/redhat/brp-java-repack-jars Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.YjC1gl + umask 022 + cd /builddir/build/BUILD + cd nss-3.19.1 + '[' 0 -eq 1 ']' + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + BUILD_OPT=1 + export BUILD_OPT + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + export SOFTOKEN_LIB_DIR=/usr/lib + SOFTOKEN_LIB_DIR=/usr/lib ++ find ./nss/tests ++ grep -c ' ' + SPACEISBAD=0 + : + '[' 0 -ne 0 ']' ++ perl -e 'print 9000 + int rand 1000' 9591 selfserv_9591 + MYRAND=9591 + echo 9591 + RANDSERV=selfserv_9591 + echo selfserv_9591 ++ ls -d ./dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin ./dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin + DISTBINDIR=./dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin + echo ./dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin ++ pwd ~/build/BUILD/nss-3.19.1 ~/build/BUILD/nss-3.19.1 + pushd /builddir/build/BUILD/nss-3.19.1 + cd ./dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin + ln -s selfserv selfserv_9591 ~/build/BUILD/nss-3.19.1 + popd + find ./nss/tests -type f + grep -v '\.db$' + grep -v '\.crl$' + xargs grep -lw selfserv + xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9591/g' + grep -vw CVS + grep -v '\.crt$' + killall selfserv_9591 selfserv_9591: no process found + : + rm -rf ./tests_results ~/build/BUILD/nss-3.19.1/nss/tests ~/build/BUILD/nss-3.19.1 + pushd ./nss/tests/ + HOST=localhost + DOMSUF=localdomain + PORT=9591 + NSS_CYCLES= + NSS_TESTS='libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains' + NSS_SSL_TESTS= + NSS_SSL_RUN= + ./all.sh testdir is /builddir/build/BUILD/nss-3.19.1/tests_results/security init.sh init: Creating /builddir/build/BUILD/nss-3.19.1/tests_results/security which: no domainname in (.:/builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin) ******************************************** Platform: Linux3.19_arm_glibc_PTH_OPT.OBJ Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin against LIB /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib: Running tests for libpkix TIMESTAMP libpkix BEGIN: Fri Jan 8 02:13:13 EST 2016 TIMESTAMP libpkix END: Fri Jan 8 02:13:13 EST 2016 Running tests for cert TIMESTAMP cert BEGIN: Fri Jan 8 02:13:13 EST 2016 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #37: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #39: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #50: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #51: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #52: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #53: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #54: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #55: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #56: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #57: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #58: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #59: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #60: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #61: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #62: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #63: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #64: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #65: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #66: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #67: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #68: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #69: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #70: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #71: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #72: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #73: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #74: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #75: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #77: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #78: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #79: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #80: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #81: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #82: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #84: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #85: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #86: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #88: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #89: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #90: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #91: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #92: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #93: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #94: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #95: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #96: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #97: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #98: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #99: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #100: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #101: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #102: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #104: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #105: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #106: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #107: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #108: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #109: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #110: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #111: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -i ../CA/TestCA-ec.ca.cert cert.sh: #112: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #113: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #114: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #116: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #117: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #118: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #119: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #120: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #121: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #123: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #126: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #128: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #129: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #130: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #131: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -i ../CA/TestCA-ec.ca.cert cert.sh: #132: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #133: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #134: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #135: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #136: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #137: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #138: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #139: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #140: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #141: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #142: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #143: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #144: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #149: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #152: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #155: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #158: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #160: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #161: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #163: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #164: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #165: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating ssl_gtest DB dir cert.sh: Creating database for ssl_gtests cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ssl_gtests --empty-password cert.sh: #166: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Creating server certs for ssl_gtests cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -S -z ../tests_noise -g 2048 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ssl_gtests -n server -s CN=server -t C,C,C -x -m 1 -w -2 -v 120 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? cert.sh: #167: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -S -z ../tests_noise -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ssl_gtests -n ecdsa -s CN=ecdsa -t C,C,C -x -m 1 -w -2 -v 120 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? cert.sh: #168: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #169: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #170: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #171: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #172: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #173: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #174: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #175: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #176: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #177: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #178: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #179: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #180: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #181: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #182: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #183: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #184: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #185: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #186: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #187: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #188: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #189: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #195: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #198: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #204: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #209: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #210: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #211: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #212: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #213: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #214: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #215: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #216: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #218: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #221: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #224: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #227: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #229: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #230: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #231: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #232: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #233: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #234: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #235: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #236: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #237: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #238: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #239: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #241: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #244: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #247: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #249: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #250: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #251: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #252: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #253: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #254: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #255: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #256: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips -f ../tests.fipspw cert.sh: #257: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #258: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #259: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #260: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -f ../tests.pw cert.sh: #261: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #262: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #263: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #264: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #265: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #266: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #267: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #268: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #269: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #270: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #271: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #272: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #273: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #274: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #275: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #276: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #277: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #278: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #279: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #281: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #282: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #283: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #284: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #285: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #286: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #287: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #288: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #289: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #290: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #291: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #292: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:19:ad:03 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 07:19:36 2016 Not After : Fri Apr 08 07:19:36 2016 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:81:a3:1b:d2:65:04:1c:bb:04:c2:12:97:e6:46:d9: 17:a4:f4:bb:e0:16:12:b8:5e:e1:0a:21:47:af:bc:97: 96:c6:c7:b6:51:a4:7b:8e:ea:d4:f4:72:d1:7c:c0:2d: d0:19:69:d9:8a:4c:24:0d:b0:51:48:06:0d:8a:29:7e: eb:65:46:3b:92:be:1e:d1:e5:f7:68:2d:07:4e:8d:3e: 2b:6d:6e:40:57:8e:3c:10:c6:81:e2:42:ec:d4:b4:55: 74:2b:a2:43:7c:77:a1:32:fd:c4:94:96:23:61:59:cf: 03:29:6f:6d:a8:8a:fd:28:85:52:f2:5f:fa:84:b9:08: 09:7f:93:a0:aa:80:32:cc:d8:86:ee:90:4a:d1:a1:29: 9c:29:e5:ef:32:c1:62:0f:25:0f:71:b4:1d:b4:fd:f6: b6:fc:ef:3f:a2:51:9b:b3:7a:3b:14:9b:5a:e2:99:90: 12:05:8a:53:0d:a8:d3:c1:bc:55:a0:1e:5e:2f:1a:82: d3:23:54:d8:df:45:e9:15:c1:08:f8:10:14:2c:a9:a0: 90:d7:cc:f6:12:7a:ab:80:6e:84:d6:5e:50:df:a9:50: 21:0e:92:56:90:5b:b6:c4:bb:0e:58:d9:86:c2:ab:b4: 83:85:e6:77:9a:fc:72:43:2a:28:c8:85:ee:db:71:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:df:7f:75:3d:4a:52:ec:d1:3b:8b:05:bd:13:79:48: c9:12:dd:fa:48:98:9e:96:40:7b:07:c3:ec:c9:c0:1e: 3b:5c:b5:8e:19:9c:fd:38:f3:56:de:d0:1c:b3:95:21: ad:c8:5a:76:de:5b:85:ad:b2:05:09:56:31:61:32:76: 9a:24:21:be:98:91:77:f8:02:c2:70:0d:6b:dd:18:68: 30:94:fb:97:40:08:67:f6:ff:77:68:f5:5d:38:57:84: 07:6e:d2:d9:3b:70:dc:7d:32:97:16:a5:27:75:bb:80: df:06:ab:f0:b3:34:5c:89:80:dc:25:50:4b:b5:d9:cb: 62:8b:14:6d:b8:f6:7f:21:f3:76:1a:0d:b9:42:cf:1e: 9e:08:bf:77:5f:0e:f0:a1:8f:b1:e6:7e:77:24:44:dc: 9a:40:e0:3e:43:8d:29:11:f4:f2:c1:8c:c3:3a:8b:0e: 2e:a3:99:cf:3b:67:a0:cd:95:dd:64:10:94:ad:8c:88: 02:49:45:aa:68:31:b6:6b:bb:d5:18:eb:f7:26:aa:2a: 6a:9b:83:fe:bd:5a:05:59:e9:ce:a0:3a:7f:2e:37:0a: 4a:4d:58:37:ca:b3:91:c3:64:ab:b0:f3:a9:61:45:cb: 9d:54:76:18:ec:f5:a5:6e:e5:b7:eb:c9:7f:3d:3d:29 Fingerprint (SHA-256): B1:B6:27:4A:91:64:16:3F:18:80:59:99:D6:F0:8C:F2:7B:3A:5D:28:80:32:01:C5:3C:D9:6A:21:F7:08:B1:34 Fingerprint (SHA1): F1:06:AF:1E:D6:0A:64:75:54:E1:B2:95:6F:9A:5B:5C:3B:11:66:91 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #293: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:19:ad:1f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 07:19:46 2016 Not After : Fri Apr 08 07:19:46 2016 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:e4:2d:c7:dd:2a:bb:df:9d:41:8d:cd:f1:20:ef:0d: 15:d4:34:3b:26:26:df:3a:87:45:b5:63:be:5e:b5:83: c3:4f:5d:0d:50:c3:ae:3c:63:a2:95:83:b9:42:cf:43: 75:de:09:c6:fe:2d:6c:f0:61:c8:20:5a:35:f4:bb:3c: db:4f:6d:0e:08:a5:0f:5f:c9:21:50:85:76:61:f7:5a: 1b:ad:83:a2:0e:9d:c4:75:c7:25:cf:98:03:3c:ba:c2: 1c:70:cc:30:8b:fe:76:f2:96:c2:d4:9d:83:b5:0c:e3: f2:84:52:6a:fb:63:ef:50:25:cf:fe:bb:0c:04:03:b8: ff:25:a1:cc:b8:37:ba:d1:53:ab:29:40:73:aa:bb:11: 2d:3c:3e:d7:f1:2b:e5:0a:ed:54:a8:ec:57:b0:e3:00: ef:40:62:c9:33:f9:73:c7:80:cf:34:2f:74:eb:f3:24: 97:84:71:3c:e7:32:2b:7f:32:bf:58:93:28:b1:77:2c: 91:f0:0b:bb:e7:00:d7:00:f0:8a:16:90:65:de:c8:1e: b0:2d:0f:90:52:72:c0:50:34:57:be:67:fa:85:ce:f1: f9:be:4d:84:27:19:26:aa:6f:b9:d2:6f:13:be:39:e4: 24:c9:4b:91:54:78:fb:12:30:db:18:8c:4f:06:ba:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:9c:02:b4:b3:2c:11:93:35:95:61:dc:7c:18:28:b3: d4:9f:2e:38:b5:e2:0c:6f:89:54:13:2e:3f:6d:9b:1d: 98:49:90:c9:fd:57:59:6a:69:8c:56:b8:aa:dc:7b:21: 10:9b:23:9a:ae:25:70:6c:83:1b:f0:7d:ab:51:36:7f: b6:a1:b5:f4:05:d9:88:b4:64:69:4c:df:08:f2:fc:c1: 2d:13:3a:15:75:ea:0f:82:ef:a9:56:50:e6:72:2d:98: 11:a8:5a:df:f2:05:13:6c:33:c1:25:30:63:f5:5d:a6: aa:42:bb:88:61:fc:09:dc:de:b1:3f:87:0d:23:03:2d: 7d:ed:bd:23:16:94:03:db:5f:39:cb:16:a8:15:51:9e: 8a:5e:ec:1b:80:8f:ed:09:6d:09:5d:dd:98:c9:fb:b2: b2:b8:60:60:40:04:e9:7b:93:89:93:7b:56:23:1f:23: 02:0c:8c:9b:4d:a6:d4:7a:6c:ca:cd:e0:e9:23:75:39: 44:eb:79:03:15:d6:e9:55:70:62:93:f5:87:30:b2:e2: 82:2d:45:20:7d:3b:db:0e:8f:5b:84:93:32:04:20:96: 26:00:9a:04:fa:bf:61:7d:43:1e:44:36:ef:ae:e0:b0: d4:aa:81:1f:c4:63:e4:c0:7b:e7:a0:ff:2d:e3:51:34 Fingerprint (SHA-256): 63:6D:2C:16:EE:46:52:75:A5:D3:82:0E:F5:9A:1E:89:2D:B3:55:EA:55:22:B5:8E:DA:F6:2A:1C:B1:92:B3:C0 Fingerprint (SHA1): EF:FF:4B:02:87:09:64:D7:2F:78:6A:39:06:F3:6B:15:F7:26:20:97 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #294: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:19:ad:31 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 07:19:53 2016 Not After : Fri Apr 08 07:19:53 2016 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:6c:5f:ee:ca:ed:85:95:8a:70:5e:7f:ca:13:e4:da: 6a:81:87:33:c5:65:ad:41:71:de:15:00:56:dd:b9:fd: 12:e3:b2:0c:3b:2f:dc:b9:84:10:c5:38:c5:8c:b2:04: b4:a1:79:9e:12:3a:ec:fc:bc:2a:4b:53:0f:2e:6d:97: 0e:c4:95:b8:90:08:d6:f8:c8:60:0c:46:5b:2d:c3:57: e1:c0:5a:2d:9e:d5:a8:5f:98:cb:c4:88:e9:17:93:79: 2b:4e:86:87:55:72:e5:0d:e4:5d:4c:42:2b:ca:71:13: b0:bc:ce:74:db:2f:1b:48:c1:5a:9f:d9:1b:8f:30:6b: 45:ff:2a:e4:84:a9:39:a4:45:b7:0b:b5:e1:9d:82:9f: aa:6c:bc:48:05:38:66:24:09:e2:62:73:4c:35:40:e1: a6:3d:31:74:0d:a9:df:19:2f:52:86:ca:2a:5a:5c:40: d6:37:1e:b7:5b:65:cd:22:a1:03:b3:9b:6c:49:bd:d0: 7c:a5:63:1f:c0:8f:9d:59:b9:7e:45:b6:d2:e3:8f:37: 6a:18:bc:01:9b:7c:f9:a7:34:97:d8:29:46:27:89:3a: 47:b8:27:91:a1:e0:1e:3c:5b:c6:60:35:f6:6e:c1:fa: d8:19:88:60:cf:81:93:62:e0:16:45:42:3f:60:0a:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:7b:83:60:92:3f:a7:a9:e2:1b:30:04:97:dc:9e:58: c0:02:fe:c7:96:6b:6f:fe:51:4b:4b:4e:08:03:7e:d8: 63:68:42:c6:73:d0:94:36:37:91:16:d2:9b:f6:3f:ce: 4e:3e:1c:c6:86:79:80:1f:fb:67:27:73:7e:87:70:c1: 58:a4:51:0c:6d:87:de:0d:06:08:ab:fa:99:38:52:ee: 1f:ea:40:71:77:64:b3:4a:27:ed:24:71:1b:8e:2f:72: 71:59:d2:05:8f:c9:18:b2:3c:08:a9:85:d7:2f:3d:7e: 8a:78:9e:b7:b9:33:8b:5f:73:46:82:eb:ef:69:e5:48: 3c:17:a4:1f:d4:34:47:48:ae:3a:b3:f6:fe:be:bd:7c: 90:5b:92:d3:64:6a:81:b7:9c:2e:98:af:84:ce:c8:bf: d0:5c:22:b1:8b:b3:d8:9e:d3:39:ff:48:54:81:5d:b2: 8c:88:f4:dd:12:09:a6:7a:d9:ca:8b:fd:07:7d:97:bf: e8:47:bd:8f:71:38:df:ab:82:cf:7a:12:9a:44:58:69: e5:a7:eb:8d:1b:89:f0:d0:ea:15:86:2d:0c:e7:2e:a8: 97:21:2d:88:d5:2e:f6:60:41:f8:9c:ce:c6:e8:73:d1: 2c:7c:46:0b:8f:4b:83:08:54:0c:f8:34:20:41:68:05 Fingerprint (SHA-256): FE:7A:AB:AA:20:2F:9A:DD:01:55:84:D7:08:09:91:D4:31:9C:87:8B:70:DE:09:A9:80:DC:92:A7:35:26:59:E0 Fingerprint (SHA1): 9A:EC:67:B2:AF:CD:02:09:F6:E2:41:CA:9D:29:2B:2B:0E:57:55:9D Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #295: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:19:ad:3e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 07:20:04 2016 Not After : Fri Apr 08 07:20:04 2016 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:fb:af:2c:4c:94:3e:ce:be:58:0b:82:90:8a:62:6b: e4:04:7d:92:bf:74:4f:ab:ee:96:12:58:b6:ff:90:df: c3:7f:51:bf:70:3d:ab:91:11:2a:d3:51:ac:f9:88:00: 87:2d:ef:19:fb:44:5f:fa:40:f4:4c:aa:d8:fa:3a:c6: 87:9a:b3:75:72:39:f6:cc:58:fd:8d:4b:48:f4:1e:62: ae:6e:57:77:97:e3:8e:4b:64:28:9a:16:16:c4:76:47: 7d:a7:12:79:da:dd:97:3c:2e:1a:54:0f:d1:31:ac:89: 0a:47:5a:df:4d:05:1b:2d:5e:8b:7a:b0:70:09:75:57: 36:d9:ad:e2:68:68:05:d6:6d:04:ae:16:df:cc:b1:9c: f3:b4:38:57:0e:ac:2d:b1:69:1d:65:07:47:cc:99:5b: 9f:2b:ad:02:57:b1:d0:ef:e8:1c:df:ed:44:ff:d2:3d: 08:8d:50:4d:a8:32:b6:43:4c:5f:a2:b7:92:18:dc:9d: ee:9f:33:b9:e5:12:95:4f:c9:59:4d:3e:fb:22:d0:d0: 07:0d:2d:61:69:24:55:46:ec:8c:d5:d4:9e:4a:de:c6: d9:4c:a7:50:c9:5d:8b:77:d8:78:4a:7a:44:d5:14:c7: 83:13:bb:12:da:0d:c9:f7:84:1d:a7:07:6a:77:bd:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:1f:91:7b:ae:2a:e8:6d:7c:6d:4b:d0:ca:51:47:6e: 0e:c1:18:4f:ec:d5:cf:fb:9d:11:b1:be:41:53:5a:1b: dd:c9:89:73:22:10:7f:2c:c8:ac:90:a3:3e:11:2e:21: aa:93:a8:7b:cf:3f:25:0f:9d:6d:61:5e:d6:98:8c:43: de:5f:c5:ae:30:e8:ba:0c:62:5c:97:3b:2b:3a:7c:17: 17:50:33:29:b8:7a:96:30:d2:d7:05:95:0f:95:88:3c: 7d:9a:56:15:da:9e:1f:07:97:05:82:f6:30:bd:cc:85: 44:9a:3f:be:86:e2:d7:70:a2:b5:61:5c:9f:95:29:0f: 42:d8:aa:2e:1c:50:57:d0:32:5e:09:84:30:74:a2:13: 84:24:4e:81:a2:89:be:7d:27:f7:20:2a:cc:28:d4:d0: 0e:c4:45:c8:33:4f:61:2a:68:a6:6d:55:6f:42:12:6f: a3:c2:59:f5:77:09:0a:90:6a:e0:9f:5c:b7:78:6b:a9: e6:41:9e:91:7c:c1:e7:2f:8e:fa:f2:04:19:e8:45:f1: e7:fe:11:2e:50:b6:21:00:95:aa:7c:e1:63:a8:4f:b4: 0e:f3:be:94:eb:13:3e:39:68:aa:13:f7:7f:22:b9:3a: 16:59:d8:47:8a:95:42:c3:f5:b6:ae:50:5b:12:18:d1 Fingerprint (SHA-256): 99:A4:D6:21:36:36:B2:06:40:EB:02:A0:5D:68:64:02:4C:D2:83:AE:FF:A6:EA:7F:8E:85:69:81:04:FC:21:2D Fingerprint (SHA1): 78:1A:EC:F6:0B:C5:E5:C9:04:59:9E:20:1F:56:37:DB:05:5E:63:CF Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #296: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:19:ad:53 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 07:20:09 2016 Not After : Fri Apr 08 07:20:09 2016 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:04:27:44:ff:91:0d:13:02:8f:fb:d4:d6:c5:ed:4d: c5:50:83:9d:25:4c:7f:57:e5:33:0f:5d:8b:65:62:4b: 32:07:d2:a3:5b:f5:fd:53:cd:9c:b4:cd:2f:24:37:1b: 0a:ba:71:bb:de:36:cf:18:36:be:a5:c5:5e:b9:ca:4f: 59:df:b1:2a:31:af:83:42:d8:63:88:13:6e:33:74:e0: c3:6d:e9:2b:ae:c8:06:86:d8:a2:39:5f:d9:c3:1b:6f: e2:a5:c1:64:96:8f:a5:e3:61:b8:ca:8b:c7:48:37:ce: 97:dc:14:98:e5:26:1e:78:9a:d7:ff:58:44:05:b4:1f: 14:63:7e:3e:67:b7:2d:57:09:ed:81:04:87:64:c2:38: 8c:36:2b:0a:63:3c:9e:a5:9d:1c:cd:28:e3:bf:af:ee: 16:9d:e7:29:5d:93:b7:1a:d9:64:43:a2:c8:a4:4b:f6: 68:cb:60:f3:a8:a4:79:21:d7:e1:12:55:62:a4:5d:67: 56:8a:ae:ea:40:16:03:f6:72:29:96:43:de:e5:88:03: ac:a0:7b:76:87:e3:2b:fa:db:5e:5b:d3:b3:54:2d:d8: 76:83:6d:04:de:e0:f8:b2:96:05:8d:40:ea:14:16:87: 57:0a:75:79:c6:55:86:ba:20:f0:56:3c:bd:64:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:f9:39:de:d8:dd:83:e4:f5:13:cd:dd:6d:9f:55:b5: 89:83:88:44:65:00:a3:9f:44:1f:7c:de:56:4c:08:bc: ad:34:93:c5:e3:59:98:ff:e0:07:e8:4f:2f:eb:60:90: 24:67:54:0e:a5:aa:80:c4:03:36:76:d8:b2:23:b4:58: 70:41:10:6a:b2:a4:cd:5c:24:64:04:e4:1c:e7:21:a5: 7a:02:83:15:19:da:99:66:04:e4:87:65:ab:99:8f:9b: 5b:cb:c8:0b:a6:89:f4:28:3c:70:92:bb:5d:65:bf:e3: 09:b1:c0:05:e7:6f:a4:63:6f:15:cf:35:e9:1e:b9:bf: 4f:be:d8:8d:08:53:bd:39:30:74:6b:50:17:c4:86:e8: 7b:bc:df:5e:a2:8d:9a:67:b8:93:16:7c:f1:68:d0:1d: 8c:24:d9:78:b7:f3:f9:ac:4a:5e:51:e7:78:48:08:26: 80:e6:7e:a9:b6:61:4d:35:8b:d1:c9:63:23:e2:4f:ee: 85:51:86:10:5b:3a:ee:31:fb:a0:96:43:cf:8c:9b:6d: ae:5e:20:e3:e5:64:7c:5e:ab:de:f8:ba:37:a7:13:56: 6c:1c:30:dd:c1:1d:99:97:ff:86:6e:87:43:d3:ff:11: 37:99:b9:16:82:0e:51:22:d1:b6:0c:a9:cf:a5:c4:e2 Fingerprint (SHA-256): F5:E1:71:97:22:58:06:8C:2E:98:78:3B:A8:8A:9B:EC:01:1C:51:B4:00:DF:FE:FC:DB:1D:0A:33:63:CB:AD:57 Fingerprint (SHA1): 07:49:E1:FB:ED:12:BC:96:F0:EF:9F:F4:AD:F9:8B:E3:53:84:E3:69 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #297: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:19:ad:5e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 07:20:16 2016 Not After : Fri Apr 08 07:20:16 2016 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:01:58:11:87:cd:57:a5:0f:e7:1d:95:04:32:3a:7d: 93:0a:aa:c1:87:b2:c7:2e:20:4c:27:76:4a:8d:6c:9c: 4a:35:ed:e3:59:21:dc:ed:28:98:52:58:2a:26:b3:b0: e4:c1:45:6b:89:31:41:ba:a3:a5:8c:38:c0:96:08:f5: 8a:3f:34:9e:d4:21:0d:41:2c:cc:0a:ce:19:be:49:60: 19:79:b5:9b:75:53:88:3e:ac:36:4d:37:b6:1f:c4:5b: cb:dc:7f:b9:aa:b3:d0:05:87:32:ee:70:58:52:85:60: bf:bf:e6:9b:66:c9:94:45:9c:11:08:3e:36:39:e2:eb: 6d:a9:dd:11:9b:d4:1f:69:47:ed:70:5d:6c:b7:64:eb: f3:ee:82:97:95:42:39:1b:85:43:00:56:8a:a7:63:15: 2e:21:6d:13:82:d1:d1:44:ca:35:1d:87:4a:22:a6:e7: cc:6e:79:08:94:11:c6:b4:74:c1:87:bc:12:85:e7:c5: 57:a0:b8:9b:03:79:4b:7e:fb:26:60:12:0c:d1:fc:bc: 3f:91:d6:7e:73:0d:53:95:8e:eb:81:92:36:3c:55:62: 97:ce:e2:25:43:54:7e:4a:23:8d:20:a2:05:a7:fe:ec: 3e:9e:4a:03:f9:40:78:41:77:a7:d4:da:4c:4a:7f:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:b5:a5:be:c4:1c:11:0e:13:32:1b:b4:da:d4:76:1c: f0:e7:e3:5c:d3:91:8d:e3:0b:c6:4c:72:54:60:47:a9: f8:6a:60:fd:77:dd:2e:f2:a4:e5:31:5d:da:2f:22:30: 7e:ee:a8:48:f8:ab:a7:3a:3f:1b:97:a1:23:5a:57:44: a8:54:84:9c:fc:ca:cb:26:e9:49:f5:fc:fa:e6:f9:ab: 03:8f:0f:6c:d3:24:04:4a:82:6c:a5:be:73:61:44:9f: 39:1d:48:18:c0:06:39:f5:97:aa:62:a3:8b:c7:d9:b7: 52:02:f3:b4:c6:80:32:9a:df:69:58:1a:7d:1d:01:f8: c5:ad:65:fb:e9:a8:6f:97:a7:28:48:95:10:bc:3e:1b: 1b:ec:dd:88:28:21:89:6d:29:88:09:82:ab:88:fe:88: e0:55:f8:a5:e9:6f:c0:a6:8e:b2:a5:df:10:1c:9c:9f: e8:d6:4f:c9:f8:41:68:24:82:90:29:94:4f:5d:4d:f7: 7a:f1:d1:00:ba:bd:bd:40:b1:f0:af:4f:25:a8:91:b4: fb:df:de:54:7a:9a:f4:e2:22:be:08:6d:73:0a:34:41: 49:1a:58:f6:1d:51:fc:d4:63:94:12:87:3a:56:81:78: 5f:bc:cb:b6:1a:95:27:e5:63:05:2c:40:f7:5a:a4:3a Fingerprint (SHA-256): AE:A3:26:B6:AB:59:1C:A1:67:A4:47:D5:E0:62:DF:56:6C:C6:DA:0C:37:02:CB:82:42:01:A9:86:F5:40:07:AF Fingerprint (SHA1): DB:8D:AE:75:AE:AB:3C:E9:EA:3F:CB:D8:02:A8:C7:97:A9:0E:DC:88 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #298: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:19:ad:6b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 07:20:31 2016 Not After : Fri Apr 08 07:20:31 2016 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:1a:11:cf:2b:f6:4c:2b:52:c8:74:40:23:1e:29:74: db:26:d1:36:ef:63:33:ae:49:52:d1:cb:b1:d1:c3:42: f0:53:b5:b4:69:94:e9:57:7c:ca:a3:0d:b8:dd:95:1a: fe:fb:03:10:7b:3e:50:1c:c7:d3:99:b7:7c:f9:5a:c4: e9:79:4f:2e:cf:a8:ac:b7:63:6c:ff:6d:8d:0b:f5:31: 7f:07:18:f0:14:15:8a:23:69:71:6a:51:d7:fe:2a:29: 38:f8:19:34:55:f6:78:24:6a:74:b0:b8:8b:b0:fb:af: 8d:fc:48:79:b4:54:db:67:e9:25:ae:66:06:25:15:9a: 07:d5:c1:d1:2b:98:25:70:3e:5a:3f:4b:e4:c5:9f:8e: 38:86:c9:48:44:cf:b6:46:a3:41:3c:bb:12:89:af:e2: fa:61:c8:2b:ea:5f:9f:de:3d:86:45:e7:6f:98:47:bd: fc:0a:54:06:32:7a:25:a2:f3:aa:9a:f7:cf:20:72:a9: 67:56:f1:8f:46:a6:5b:06:c5:c6:d9:f0:58:54:02:d6: 66:0a:50:9c:2c:c0:fa:13:c9:e5:08:f0:6f:d9:58:ec: dd:da:8c:2b:c1:5f:1d:82:e2:b6:35:29:37:ba:9a:d5: dc:a5:e2:77:11:aa:a9:79:c2:f6:80:cd:e7:76:ed:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:81:90:97:02:18:f7:27:e8:3b:fd:06:c8:40:e6:4d: 1e:af:78:4a:72:ae:05:00:ee:14:b7:f1:fd:65:36:4c: 00:ff:b4:32:e2:68:d2:ec:d1:1c:ff:f8:03:00:49:5a: a9:64:99:2b:b2:c6:c8:67:07:9c:19:3f:d8:0f:4b:42: b0:9b:69:93:ae:d5:bd:a4:a4:a3:e2:02:a8:e2:29:84: 92:67:e8:ce:61:b2:1d:3e:f7:b2:c6:37:07:59:15:52: a9:fc:25:c4:3d:c9:ca:ab:98:fb:ef:09:5a:18:53:e2: 6c:09:1d:81:5f:ce:c1:ed:82:94:55:67:b9:21:1b:5d: 0c:f9:26:cb:6d:95:7b:89:90:d7:12:c7:df:9e:69:2c: 18:f1:75:ee:8a:25:56:8e:1a:0b:81:69:1d:75:b0:9f: 8e:c9:f9:1b:2f:49:72:ec:86:2e:30:67:f2:b1:8c:31: ba:7b:fb:68:f9:ad:72:19:0b:bd:3e:05:7c:ae:9c:bf: 58:08:9f:ff:d4:70:2e:9e:d7:0c:22:68:49:d2:eb:e6: e8:67:c6:d5:8e:ee:e0:10:16:72:f5:fd:8f:91:47:fd: 53:d6:a1:ed:05:53:8e:3a:41:2a:54:21:03:2a:6c:c8: ca:db:fa:7f:9a:47:04:e6:ba:7d:83:d1:b6:d7:04:f6 Fingerprint (SHA-256): E2:72:C0:9A:21:F4:65:21:06:DA:15:2F:09:FA:F6:7D:4C:75:29:E2:17:34:FA:91:6D:92:3D:14:11:DF:86:9D Fingerprint (SHA1): 49:79:E5:93:56:BF:01:E1:35:12:A2:A7:6E:AE:1E:7E:02:F2:4A:01 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #299: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:19:ad:87 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 07:20:47 2016 Not After : Fri Apr 08 07:20:47 2016 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:e2:c3:5b:1a:c7:6c:01:99:72:00:6e:dc:99:6b:95: a4:31:cf:04:4e:bd:8f:35:0a:67:b5:ca:9e:5d:ea:bf: 58:02:ae:82:47:f5:8e:5f:d7:c6:f5:a8:38:50:6b:ed: 39:5e:9a:e3:c9:a4:2e:f9:c3:bd:97:1e:1f:b2:53:8c: 93:f6:b1:8e:05:7a:6e:77:ef:fc:df:16:0e:37:44:f2: e8:af:d5:fe:ce:ae:aa:00:79:5f:75:4f:26:08:ad:27: ed:83:a6:6f:d7:d0:12:e3:57:81:1e:df:c7:4c:a0:30: e5:32:b9:c3:4b:cd:93:43:43:b2:5c:80:7b:c8:3a:0f: 3c:ce:18:64:07:b7:9f:50:ed:cb:b0:b1:4e:34:ba:6d: 6a:aa:6b:f5:00:58:d2:b4:c8:b5:bb:95:40:a1:c2:77: c5:6a:b3:bf:90:2b:55:1c:ce:d7:c3:26:32:5d:de:72: 74:58:81:13:e3:50:7b:16:8d:78:5a:0f:1d:c8:0d:25: d2:c7:aa:7f:db:2f:ca:da:d4:ca:41:3e:c4:65:5e:a4: fd:74:32:a3:c5:61:07:8a:c7:56:0c:7c:11:22:23:85: b1:ed:35:d4:cb:d9:53:ba:48:66:c1:bc:cb:50:a4:f6: b6:23:54:69:12:2e:d7:ac:96:5e:1d:11:40:b6:dc:2d Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:25:88:a5:10:6c:7c:ca:ff:91:80:c9:1e:d4:78:35: 9c:59:be:23:73:4d:dd:84:e6:c7:47:97:15:68:b6:0d: 9c:b0:26:ce:c6:b6:ab:c0:d6:b7:cd:12:19:d3:6b:1d: c2:78:83:d5:06:85:6b:57:bc:9a:9d:0e:5e:5a:cc:27: b5:db:3f:14:17:d5:12:f1:53:8a:77:59:03:33:8c:8e: 5b:05:de:b2:a4:1c:56:04:31:ef:2c:c8:70:18:42:ed: 63:44:94:90:fc:9d:6c:fc:5c:7a:fd:01:11:f6:27:72: 02:59:fc:7d:2a:2f:bf:f2:92:96:d5:4d:6b:23:ba:7f: 01:94:73:ac:b1:ad:be:44:d5:20:48:e5:bd:0c:40:ef: eb:9a:87:0b:77:33:49:a2:2a:ba:21:6c:80:20:e0:07: 5b:bf:a7:ee:c5:20:49:40:e1:2e:7d:6b:4c:0c:60:9e: aa:8a:40:26:58:6b:53:cd:39:d1:b2:64:79:60:ee:a4: 7d:7f:44:d3:95:15:4c:a7:0f:04:f4:9d:16:48:21:0e: 72:51:23:86:b3:2b:84:21:4a:73:88:89:c6:4f:8f:47: da:f1:37:0f:5c:e4:a1:f2:9c:60:07:7b:ef:ca:0d:4a: 38:14:e0:02:82:26:93:da:ae:2f:d6:a5:54:58:d2:73 Fingerprint (SHA-256): 91:19:66:91:4B:C8:33:A2:62:AD:8F:92:D6:E7:99:AD:A7:36:2C:A9:72:75:B6:2C:E1:7A:53:E1:BA:87:99:7F Fingerprint (SHA1): 10:C1:AD:0C:27:44:B4:3C:51:2F:61:64:8F:F5:6B:DA:C8:56:1C:61 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #300: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:19:ad:a5 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 07:20:54 2016 Not After : Fri Apr 08 07:20:54 2016 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 93:43:de:38:81:d8:5a:d9:dc:0d:5e:2f:f7:a6:f0:fa: bb:34:e4:e7:19:13:8c:da:2f:08:c1:cd:42:05:ce:23: 2a:ce:24:40:0c:94:f5:93:48:f5:39:b2:a0:50:c7:16: 1b:49:cc:0e:1c:3b:3c:3a:0d:4f:6e:29:84:29:cb:2b: 3b:52:0a:0f:2d:a5:fb:de:36:bf:61:df:0b:25:d8:88: 67:9a:be:42:0c:55:80:c7:5c:2b:da:26:3b:3a:06:5c: a9:b1:ac:c7:eb:d3:3e:88:fb:56:5e:fb:99:16:e0:60: ff:4e:82:9f:9a:e4:28:c5:c4:7b:94:a5:d2:eb:d2:da: 73:8a:b1:19:64:cb:a4:b8:44:79:95:7b:11:07:a0:1c: a1:6c:62:4a:d9:2d:1a:fe:85:a3:0c:66:7b:8a:de:af: 60:d4:39:5b:33:5b:37:f2:89:98:e9:38:11:44:64:b4: ab:16:08:cd:fd:47:3a:d7:28:0f:ea:04:80:e2:9e:d7: 02:89:5c:74:60:89:5b:7c:ca:65:21:c4:6a:5e:b8:92: 5a:23:7b:ab:93:28:0f:c7:b8:b0:84:6e:13:e0:ec:ed: 4d:5a:b5:6d:00:93:e0:d6:a6:68:1f:8b:f1:e4:cc:0c: 58:da:44:34:8b:40:30:8d:a9:ac:d6:bc:a6:16:7b:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:07:f2:7a:72:3c:8a:2f:e9:54:79:18:ba:8c:7e:f2: d8:14:a2:40:d7:5b:7e:ce:05:d2:1c:e9:4e:ed:7f:b9: 93:ac:8f:86:46:31:03:8a:2f:1f:65:e1:ef:bf:8e:83: c2:43:72:e2:fc:9e:57:74:f5:24:22:c2:d5:c2:38:e0: 44:87:83:b2:37:1e:48:63:76:90:9c:68:76:a3:35:29: 41:df:e4:e6:e4:f2:77:ab:aa:46:46:04:f5:9d:1e:fa: cb:02:9f:28:d2:6e:3e:05:8d:6f:69:92:f5:15:d0:c4: 15:3e:ca:28:f7:d4:b4:8c:b9:cb:d9:f4:9e:f8:c6:30: e5:88:d6:ca:ad:c5:34:11:71:35:8b:25:fe:72:d1:73: 0e:9e:06:14:0a:02:3e:4a:16:3f:79:88:6f:db:32:02: 83:98:5e:4e:6d:e8:61:ef:65:06:de:00:be:94:57:33: 53:78:21:bb:e5:bf:cb:75:c5:71:56:9a:9b:b4:76:02: 80:f2:f0:12:1a:d8:2c:36:80:83:ae:70:47:5f:fc:81: 2b:08:92:de:21:0c:2a:fc:d2:0c:cd:8b:56:31:b7:0c: e5:83:9b:5a:7c:ed:5b:d2:b3:87:f6:b5:7e:8e:11:f9: 61:10:c5:68:3b:07:d1:f0:b3:70:b8:9f:51:71:52:d5 Fingerprint (SHA-256): A2:EB:F8:89:F2:7A:8B:23:A6:75:5C:3C:D2:B7:2F:7E:F3:71:9D:FB:D5:6B:98:CD:E6:F8:14:B7:C5:9A:8A:05 Fingerprint (SHA1): 11:8A:97:C1:2B:01:30:F1:0F:26:DC:57:F9:68:10:FD:66:C2:DC:F4 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #301: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:19:ad:b4 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Jan 08 07:21:03 2016 Not After : Fri Apr 08 07:21:03 2016 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:55:b8:e9:5c:c9:48:95:6e:da:c0:d0:08:bc:63:99: 4f:a0:ce:12:4e:88:c5:61:7a:0d:de:80:8f:6f:4b:32: 70:1f:b6:55:58:f0:58:9f:b1:df:e0:a4:92:07:99:f1: ed:25:2e:a2:2b:74:3d:ea:c6:32:b8:37:75:da:65:d0: 66:1c:7a:d1:45:23:0b:5c:d7:92:6c:9e:b6:ec:bb:0b: d9:1b:ce:35:51:08:8d:6c:cc:33:36:8a:44:05:5e:64: 40:9f:ef:3b:b1:c2:ac:35:ae:21:21:bf:19:1f:d1:9e: 4f:88:45:22:51:fb:d4:99:50:85:a6:df:44:ce:e9:dd: f6:6d:bd:0c:68:49:cf:78:ee:97:35:16:24:4d:02:28: 43:e3:fa:91:c3:1d:91:44:52:26:4d:6a:3b:d1:ca:ff: d3:f0:b2:23:9e:5c:93:74:ad:da:be:e7:6a:a5:75:89: c5:c6:c7:11:fa:b3:4b:0b:0d:06:74:64:76:1f:6d:4c: 1c:f7:fd:aa:0d:f0:80:6c:fc:eb:f6:f4:5a:b1:3a:73: 75:f2:90:a3:28:55:b1:fd:42:a2:9a:05:37:9e:a0:79: 4f:61:76:7f:77:d9:c3:f2:6f:88:eb:d6:1e:df:d4:16: 3b:98:ea:0e:ad:bf:67:e1:95:47:48:a9:d4:00:22:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:3d:1c:a7:6f:f4:54:24:88:ac:bb:7e:07:0d:ed:35: dc:dd:71:58:bd:a5:89:6d:b8:c1:92:86:fe:f1:2e:f9: c1:60:68:f5:29:ee:6a:64:17:7a:44:96:fe:2b:76:f9: 0d:14:84:f2:80:a0:fc:e2:2f:19:40:23:cc:9c:b7:bd: b5:43:b2:3e:72:f4:d2:b6:6a:27:4c:3a:f5:c5:31:5a: 08:b2:68:f1:0c:cb:d3:01:ed:9e:5f:dc:41:2a:59:7f: 0b:2b:a7:7b:09:1e:ef:bf:f0:b7:2e:5c:65:11:68:ad: a0:ae:5b:a9:6c:1b:60:40:52:99:66:8d:89:e9:60:7b: aa:38:d2:7f:3d:45:83:35:63:2b:c6:8a:6a:88:a9:a8: a4:d4:95:6e:43:ca:e6:4a:e8:30:8a:b3:01:b4:7d:64: 26:2c:33:ad:a4:d3:08:a3:f4:b8:d3:65:6f:30:6b:bd: 66:df:63:12:dc:09:0b:e9:66:ea:a0:6c:e2:d3:2f:65: 7a:d6:56:e9:0c:e7:31:1d:ea:b3:f0:45:da:65:ca:af: 54:cb:ac:01:7f:d5:a8:dd:ce:6d:24:2a:19:c0:f3:88: 63:d0:14:a6:95:27:dd:fb:2b:cb:ce:b1:9f:c0:a2:97: 48:70:43:05:e2:40:12:45:78:27:21:be:38:06:d3:e9 Fingerprint (SHA-256): 44:79:D8:E8:69:58:8C:50:DB:CB:B8:5C:FF:32:FC:BB:F6:8D:F5:C7:02:E3:15:58:BE:B8:DE:D4:DB:F5:EA:83 Fingerprint (SHA1): F7:B9:AD:F2:93:95:46:80:D4:62:4F:DE:19:D1:6F:2E:36:2C:9C:89 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #302: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:19:ad:c4 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Jan 08 07:21:34 2016 Not After : Fri Apr 08 07:21:34 2016 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:e0:67:d6:63:72:d1:83:cf:a7:a7:6a:52:3f:a1:cf: c4:c9:eb:de:4a:fe:cd:da:87:ca:5f:90:55:6d:a5:9b: 8b:71:54:b9:cc:e8:5b:09:77:17:95:35:9f:c6:c3:75: 8a:61:5f:2a:ef:96:8b:4e:92:66:33:3f:25:d7:ce:60: ba:70:81:38:66:29:4c:a3:7c:37:68:a0:6a:19:df:c5: 52:33:aa:21:51:e7:85:44:42:23:17:eb:b6:87:1c:6a: c8:ec:85:b7:9d:dd:a4:ed:bd:1e:34:9a:a5:1f:ec:15: af:f6:58:ef:2a:7a:b0:fa:de:e8:9b:3e:b3:13:ce:c5: 44:e9:f5:eb:7a:0b:b9:87:ac:d5:33:6e:71:f8:2f:4a: c0:b9:e2:9f:6c:a4:fa:98:1c:dd:24:bc:9d:5f:e9:ad: 43:f7:d3:12:eb:23:01:18:69:fe:f2:3d:04:52:af:4d: e7:18:b2:a9:ce:20:0e:43:ce:a3:9c:ea:4d:bb:7a:00: 4a:0f:a0:d6:bd:20:9c:9a:ff:4c:86:8e:5a:37:91:a2: c4:7c:93:49:35:36:cd:93:a7:08:86:e9:f6:2a:91:b9: 31:a3:d3:3d:45:62:d7:ee:1c:5b:9b:73:30:1a:ce:c9: 2a:96:dc:25:76:37:d0:01:51:4a:41:ef:a5:87:e0:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:e7:5a:0f:aa:a1:10:3f:20:9a:f2:d6:2b:18:c1:3b: f9:db:f1:1b:93:e6:cb:11:ea:2e:4e:72:57:95:87:b8: ba:57:15:20:a2:00:db:5c:59:3b:9c:5f:4c:70:62:90: 0e:5d:81:e4:c7:53:29:eb:e9:c6:a4:ab:40:83:db:21: ac:f9:cf:1d:5a:ac:ce:d5:b2:34:e0:8d:34:41:da:40: d8:93:8b:74:2d:99:45:41:3d:51:3e:c4:a6:09:b7:3b: d2:e5:b7:5b:48:ca:c6:2c:e6:65:3d:c7:7c:d3:a3:13: 8a:35:60:6c:bf:2e:83:27:ff:af:d5:a3:af:f1:f0:ad: 33:c5:14:a7:38:a5:3a:c3:94:c7:5b:8a:a7:79:e2:10: 28:5a:20:8a:c3:8e:d8:60:22:e6:36:71:c7:99:a5:8f: 9a:f6:ef:62:21:8e:6f:2e:f3:15:f9:11:4d:89:19:5e: eb:8d:87:3e:a3:47:85:75:3d:83:d8:c1:b8:9e:dc:2a: ea:1f:35:eb:ef:13:07:96:95:02:bf:dd:45:32:31:5b: 08:76:23:ef:4b:6e:1f:6c:6e:32:4b:f7:2c:db:01:b0: c0:b8:4f:07:7d:cc:98:bc:9b:d9:45:04:0b:c5:b8:18: a3:7a:31:d7:35:84:f2:de:0e:17:5c:5e:ce:38:53:c6 Fingerprint (SHA-256): C8:32:17:E8:D8:DB:42:3F:EE:1E:E0:B1:D9:2A:25:96:44:EA:2C:34:1E:C5:61:CF:9F:A9:18:9C:B3:64:53:2D Fingerprint (SHA1): B3:BC:2A:BB:8E:32:2B:92:35:33:A8:3E:8E:68:0C:FD:B4:99:98:F3 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #303: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #304: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #305: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #306: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:19:ae:0f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Jan 08 07:22:18 2016 Not After : Fri Apr 08 07:22:18 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:67:2f:a5:70:cd:95:5e:d5:87:f0:10:c0:93:7a:6f: 01:27:48:1d:2d:86:09:8d:73:b3:03:ff:09:7c:b9:e4: 84:b8:ac:44:8a:86:72:2b:25:52:cf:c9:22:7d:53:35: 26:5c:16:2d:7e:2b:45:27:41:d7:c2:7c:93:cb:34:eb: 5d:52:0b:5a:48:c6:db:2c:39:5a:94:70:ba:c2:93:00: 79:cc:9f:83:88:6e:13:04:d0:06:12:48:d0:a3:d2:ed: 4e:f4:89:51:ef:0d:ea:1f:0a:86:ca:3c:11:0f:60:cb: ad:9d:7b:64:e2:5f:d8:4d:0d:5c:99:63:ef:95:2b:9b: e4:e5:ab:5c:66:5e:a9:64:c4:83:ab:32:5f:97:18:09: fc:f3:b7:60:9a:d6:19:ef:f9:62:58:08:22:76:6e:05: 9e:0e:50:d9:77:be:3d:18:4f:fc:78:f6:ed:31:11:e0: 4f:8d:7e:2f:7e:42:d5:4f:10:b9:92:26:ec:7a:83:0d: 0c:94:0d:dc:c6:b6:65:3b:4f:18:3d:86:36:13:49:3d: e9:c7:22:34:aa:3e:c6:ff:df:73:10:e8:e4:c3:8c:83: c4:04:d7:0a:c0:fb:ff:9c:e0:a8:4f:b1:bf:fc:4a:ae: a3:62:b7:30:bf:72:39:3b:c8:76:7d:d9:5f:f0:04:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:f9:e8:1b:82:dd:d3:26:08:95:9a:d1:82:79:56:6c: 58:52:fd:52:5b:d5:78:80:30:70:e2:02:d7:5f:a4:d8: 5a:c3:e6:87:d9:d7:fe:ec:64:6d:b7:4c:ab:a4:24:f4: 43:55:31:66:50:d6:b4:84:34:e1:aa:e9:07:b2:0c:4c: ec:e0:bf:bd:7e:37:7e:67:8e:de:2f:0b:59:fa:3c:a0: 6d:5d:7a:52:59:29:f5:db:5e:72:64:37:0c:6a:9b:55: 80:f5:8e:45:77:9e:82:ce:7a:1b:31:c6:4f:8d:1e:1a: 30:10:74:ff:79:d0:9a:81:69:42:93:d9:8e:09:3b:93: f6:41:28:04:fe:34:3f:d1:a8:63:f8:c6:58:d8:68:3c: 80:d0:c0:0d:69:8d:72:c0:6a:d4:cd:f9:2f:ff:de:65: 25:bb:95:52:2c:f3:ec:05:14:b6:da:3d:60:c7:e9:60: 2d:16:fa:d6:a2:65:15:a6:8f:6c:c7:ed:54:f6:e3:c3: 18:26:dd:18:67:cf:8c:29:de:4f:8d:6b:02:ad:f0:cb: e4:da:5c:db:25:b1:e4:2e:8d:cc:8d:b2:05:1d:a7:3c: 2b:97:e7:0f:dc:38:d7:dd:51:6e:d8:3e:91:e5:af:b1: 2a:8f:a1:4d:c2:a9:6e:38:7d:77:83:99:8b:e1:40:5a Fingerprint (SHA-256): D2:27:EF:4A:A6:55:BB:61:29:74:69:A3:B1:A0:95:98:DC:1B:4B:2F:7E:41:92:CE:CE:F4:71:4D:07:76:0B:35 Fingerprint (SHA1): 33:7D:0A:D2:D1:2F:75:49:9E:14:CF:2E:C6:4C:AD:F9:94:6E:A7:A3 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #307: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der cert.sh: #308: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #309: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #310: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #311: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #312: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #313: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #314: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:19:ae:85 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Jan 08 07:22:56 2016 Not After : Fri Apr 08 07:22:56 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:12:ca:c2:62:c7:3f:d4:e0:29:2d:c1:c2:34:17:51: f5:e2:56:4d:9d:2c:a8:be:6d:fe:58:25:22:d3:40:3d: f2:39:68:37:be:18:9f:e5:7f:71:ba:b6:8e:34:a4:af: d7:89:e8:75:9f:3a:0d:2b:4b:dc:93:80:d1:b6:00:54: 9e:5b:58:8b:a3:c1:89:90:c6:c1:4e:26:b8:62:d7:b8: f4:a3:c9:c0:f9:2b:aa:8b:8d:64:44:fa:76:0c:21:9c: 73:7e:26:90:31:e5:10:1a:3e:3d:61:a2:bb:c2:af:1a: c8:0d:8e:df:2c:93:7d:3b:f6:9c:f6:04:b7:86:40:6a: 2f:61:cf:2c:3d:68:27:b2:20:d6:55:3c:57:66:3b:56: 7e:05:c5:a3:ac:ac:76:f9:b3:c5:9b:a6:a1:ff:b1:74: e0:30:0c:88:27:e6:1a:46:78:ee:a9:23:55:3e:98:98: 46:7f:68:f5:3d:bb:bb:01:64:b6:dc:9d:21:4e:d6:b3: 45:7c:b6:9b:7a:f6:37:21:85:f5:f8:8c:0b:7c:43:86: e0:ec:cc:8e:33:8d:1c:ee:a3:e7:28:66:5c:2d:a8:6f: ea:24:96:69:e8:09:c5:d9:b3:ec:b5:cb:b0:62:7a:eb: 74:74:c1:b7:28:8d:7d:ba:b8:43:6c:74:d5:62:37:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:a7:ad:78:69:45:c9:32:db:59:94:af:70:c5:9d:de: ca:3d:34:f3:52:c9:e4:7a:bf:1f:a2:68:ec:c6:65:fb: f5:1d:7c:f3:46:79:b7:c7:bc:40:6f:16:24:18:62:a8: 7c:47:6d:be:11:73:d0:2d:15:ca:10:6d:f2:75:54:0c: 8a:54:aa:31:31:6e:9f:59:e7:c8:0f:01:79:b0:b7:3b: 3e:8d:5d:51:1e:d2:33:e9:80:ee:ff:62:02:4b:15:4d: 69:f5:ec:bc:69:a4:b1:06:74:16:df:5a:38:d3:e2:86: 99:54:33:97:0c:d2:fc:ba:6b:8c:1b:f7:d6:32:69:37: 0f:db:03:68:bc:20:dd:dc:c6:95:da:76:a9:68:ef:be: 01:8c:35:c9:7a:59:9d:f3:96:ee:34:22:df:a1:e4:ae: e0:ea:bd:b9:4a:76:d3:56:2e:cd:b0:1d:ed:6f:24:1a: 0b:3f:02:c9:ff:72:b4:35:fa:fe:ce:cc:4d:f5:a9:e2: 33:8e:b7:7d:25:43:3e:62:66:14:12:b6:c1:63:94:7b: 99:e2:49:85:0d:6d:76:55:9c:bb:26:d3:0c:e5:b6:75: a6:03:e3:20:f6:97:43:5e:f6:39:b2:49:fd:0b:18:21: 4e:13:15:31:4b:50:48:6a:20:f7:a8:b2:27:60:75:59 Fingerprint (SHA-256): B8:D1:6F:E3:99:A4:15:0E:41:A5:EE:00:3A:20:E0:B7:FC:B5:D5:0A:B9:AA:41:8D:E3:D7:A6:06:C0:C5:28:D1 Fingerprint (SHA1): 09:89:A0:F5:F2:32:17:14:BC:FE:87:02:07:C3:DF:0F:21:4D:47:B6 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #315: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #316: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #317: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #318: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #319: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #320: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #321: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #322: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #323: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #324: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #325: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #326: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #327: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #328: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #329: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #330: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #331: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #332: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #333: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #334: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #335: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #336: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #337: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #338: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #339: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #340: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #341: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #342: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #343: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #344: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #345: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #346: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -o root.cert cert.sh: #347: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #348: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #349: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #350: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #351: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #352: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #353: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #354: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #355: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #356: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #357: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #358: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #359: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #360: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #361: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #362: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #363: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #364: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #365: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #366: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #367: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #369: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #372: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #375: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #378: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #381: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #383: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #384: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #386: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #387: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #388: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #389: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #390: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #391: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #392: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #393: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #394: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #395: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #396: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #397: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #398: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #399: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #400: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #401: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #402: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #403: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #404: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #405: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #406: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #407: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #408: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #409: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #410: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #411: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #412: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #413: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #414: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #415: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #416: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #417: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #418: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #419: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #420: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #421: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #422: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #423: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #424: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #426: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #427: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #428: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #429: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #430: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #431: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #432: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #433: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #434: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #435: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #436: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #437: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #438: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #439: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #441: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #442: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #443: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #444: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #445: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #446: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #447: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #448: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #449: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #450: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #451: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #453: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #454: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #455: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #456: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #457: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #458: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #459: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #460: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #461: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #462: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #463: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #464: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #465: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #466: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #467: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #468: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #469: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #470: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #471: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #472: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #473: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #474: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #475: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #476: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #477: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #478: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #479: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #480: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #481: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #482: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #483: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #484: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #485: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #486: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #487: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #488: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #489: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #490: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #491: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #492: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #493: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #494: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #495: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #496: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #497: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #498: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #499: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #500: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #501: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #502: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #503: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #504: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #505: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #506: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #507: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #508: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #509: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #510: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #511: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #512: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #513: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #514: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #515: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #516: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #517: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #518: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #519: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #520: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #521: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #522: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #523: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #524: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #525: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #526: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #527: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #528: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #529: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #530: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #531: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #532: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #533: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #534: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #535: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #536: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #537: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #538: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #539: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #540: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #541: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #542: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #543: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #544: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #545: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #546: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #547: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #548: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #549: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #550: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #551: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #552: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #553: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #554: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #555: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #556: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #557: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #558: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #559: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #560: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #561: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #562: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #563: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #564: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #565: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #566: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #567: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #568: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #569: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #570: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #571: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #572: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #573: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #574: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #575: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #576: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Fri Jan 8 02:28:36 EST 2016 Running tests for dbtests TIMESTAMP dbtests BEGIN: Fri Jan 8 02:28:36 EST 2016 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #577: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #578: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #579: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #580: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #581: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir dbtests.sh: #582: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir dbtests.sh: #583: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #584: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtests.sh: #585: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #586: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #587: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/secmod.db database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/cert8.db database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/key3.db dbtests.sh: #588: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtests.sh: #589: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Jan 8 02:28 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir -r--r-----. 1 mockbuild mockbuild 1220 Jan 8 02:28 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1425 Jan 8 02:28 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 579 Jan 8 02:28 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 705 Jan 8 02:28 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 870 Jan 8 02:28 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 229376 Jan 8 02:28 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/cert8.db -r--------. 1 mockbuild mockbuild 106496 Jan 8 02:28 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/key3.db -r--r-----. 1 mockbuild mockbuild 394 Jan 8 02:28 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/req -r--------. 1 mockbuild mockbuild 16384 Jan 8 02:28 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/secmod.db --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #590: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:49 2016 Not After : Fri Jan 08 07:17:49 2021 Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:95:46:21:1e:ed:f3:61:7d:9c:b8:79:67:51:5d:a8: d1:36:78:73:07:cc:31:c3:b6:bd:3f:f6:0f:04:fd:51: 2e:06:8e:9b:a5:e7:42:05:a0:70:fc:e2:75:be:f0:33: ac:c7:12:04:68:0a:5c:95:ed:6a:08:03:a1:96:85:6b: e6:42:c7:1c:f6:61:0e:ad:4f:09:b1:98:33:73:09:26: e5:7d:38:b9:08:b9:04:53:08:66:c5:4b:c3:d4:7c:c1: a9:cb:e6:6c:d7:f2:b1:74:63:5c:8a:4e:6e:2c:be:ae: 6c:c1:59:31:d4:01:31:0a:dd:97:8c:5a:7e:43:4d:08: 46:ba:57:da:f2:74:72:dc:58:67:c0:82:95:3b:b5:12: dd:59:e3:d3:57:30:aa:6c:e0:59:4e:3d:3a:95:c2:6d: 3a:03:6a:00:96:5b:2c:89:16:f5:c9:65:72:3b:eb:9c: 72:c9:84:7d:bd:d2:f2:11:43:dd:6e:15:f1:e8:7a:40: 34:58:87:79:d3:6f:8c:40:be:43:77:b6:83:34:00:47: 6b:b5:23:63:f3:98:2b:ab:86:d2:7f:09:57:ae:42:67: 04:c4:0d:2d:5b:17:73:67:cc:c0:a8:fa:ed:5a:1f:bd: 45:8f:cd:d7:43:10:41:58:73:d0:7b:4a:ef:1d:1d:bb Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:78:cb:e7:d2:74:d3:61:ba:8a:8f:65:a9:9e:8c:95: d1:82:84:b0:6c:2b:8a:bf:6f:b8:bd:c1:2a:c1:fa:8d: 3d:82:ec:f6:c1:08:ce:a3:7a:a0:34:93:9a:a4:49:74: 52:4a:6f:f7:24:b2:c6:ab:c0:f7:1a:0c:bb:4d:57:51: 52:af:30:68:41:3b:3a:88:06:23:22:86:cb:c0:e8:a3: 65:e4:55:6c:22:87:24:75:ec:87:3a:20:0c:9c:5d:e3: 75:3f:ec:9e:46:c8:61:07:4d:c5:9f:3a:56:4b:e4:0a: da:6d:76:67:e5:d1:a5:b5:ad:6b:29:ff:d9:14:4d:d9: c3:99:32:22:e1:45:17:8a:44:c3:93:09:a7:24:96:27: a9:2f:59:49:ba:1b:bb:1a:b4:df:8d:4f:7e:eb:7c:e5: 6d:1f:38:a3:5b:10:94:27:bb:8e:90:7c:f7:85:f8:84: 7e:d7:bc:12:e9:61:f6:1a:5e:68:81:1b:17:a2:fd:30: bf:8c:5c:29:55:fe:64:0a:00:50:a4:98:ca:81:8f:35: 71:73:c5:de:42:a7:d9:30:aa:4e:6a:7c:88:dd:06:95: e6:10:90:6b:5a:25:f6:92:56:26:f7:3b:28:72:d0:be: 0b:9a:c7:8c:16:8f:f8:65:4a:28:ea:c0:d6:20:b1:02 Fingerprint (SHA-256): 6D:A2:F5:4C:A2:41:78:FE:FC:B0:6A:B7:BA:7A:53:CE:17:DA:6B:7B:E1:C2:49:18:45:F0:E5:41:C4:55:E4:E9 Fingerprint (SHA1): 33:17:52:E9:25:09:85:0F:85:C4:21:0D:E5:44:16:53:E6:4A:3B:4D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #591: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED TIMESTAMP dbtests END: Fri Jan 8 02:28:46 EST 2016 Running tests for tools TIMESTAMP tools BEGIN: Fri Jan 8 02:28:46 EST 2016 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #592: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d4:c3:ca:51:01:7e:6d:6f:b8:bc:bd:a4:a5:34:12:3d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #593: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #594: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #595: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e9:20:f9:85:05:9b:26:4e:2c:d1:ea:2b:02:63:a4:0d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 07:14:36 2016 Not After : Fri Jan 08 07:14:36 2066 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:f3:04:60:fc:37:5e:ef:c5:1d:25:68:90:ba:97: 91:d3:ce:4b:a1:9f:5a:fc:b6:56:78:12:c2:db:37:c6: f6:62:bd:8e:63:f2:f8:5b:3b:c3:c1:00:e2:cf:ae:af: 9c:56:1b:e6:00:98:f9:a6:c5:a3:37:4e:36:31:db:35: 4e:a3:f4:01:28:09:f8:8d:d5:a1:c9:92:0e:b2:b9:5c: 68:82:02:88:e6:d1:af:6d:1e:7f:42:73:b7:2b:ee:1f: 2d:d7:f1:6d:27:14:8d:ae:91:7f:e3:f9:44:2b:9c:a0: 78:aa:88:b7:b0:25:67:89:3a:de:36:53:21:88:c5:2f: 4d:76:02:c9:8d Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:da:74:66:ea:39:d8:43:18:06:e8: 42:4a:c6:32:e9:72:df:25:74:96:c7:ed:ac:7a:72:70: 4b:72:72:e1:7b:36:c5:02:bf:b5:76:a4:e2:a4:e6:a5: c8:16:54:f3:f2:a8:c7:b5:80:c2:5b:bc:93:d1:c2:f0: 6f:76:38:63:b8:f2:6f:02:42:01:21:ad:0e:a6:9f:dc: a1:9f:ec:17:13:a7:04:14:6a:0f:a6:6f:98:eb:ca:8f: 11:4d:dd:ed:fb:73:b2:47:d4:0b:55:1d:57:04:58:d4: 8c:63:ae:33:f6:98:fe:5d:75:cc:e2:a8:8a:07:30:2d: 56:4c:86:22:8a:08:a2:8f:1d:f5:ea Fingerprint (SHA-256): 82:B2:89:6E:4A:EC:72:6D:C2:ED:6A:11:75:CD:CB:B9:93:20:15:C5:97:3E:59:C6:57:5F:A0:7B:B4:A9:26:EE Fingerprint (SHA1): A3:10:F6:B5:AF:EC:A0:DA:07:62:B8:64:EF:6F:44:13:3A:06:2F:55 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 07:17:34 2016 Not After : Fri Jan 08 07:17:34 2021 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:cc:bc:be:ac:d1:c2:18:35:35:7e:27:a4:ae:df:83: 5d:47:39:07:37:c5:35:31:d1:44:27:a5:d8:1c:87:bd: a3:cb:04:87:87:55:cd:8a:4c:49:5b:1f:1b:29:3d:1f: 67:9c:c5:4d:2c:b9:88:f2:d3:09:b9:2c:0f:e1:e1:9b: 2b:df:56:9f:82:a6:f2:8d:ee:7f:e8:03:b1:cd:d2:d7: 59:82:6a:55:40:eb:31:ca:1a:13:3e:af:5a:98:04:74: fc Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:1c:56:0a:3f:9c:18:ff:60:76:ef: 77:aa:2e:b2:fd:df:7d:5b:6c:d9:2b:2c:2f:07:5c:6d: 06:90:62:f3:8f:b3:7b:9c:fe:b2:e6:ae:57:01:f2:e0: 93:33:45:0c:f7:ac:65:16:70:16:a9:19:b3:dd:22:11: 0f:4b:1e:d8:55:eb:42:02:42:01:2b:72:d7:46:19:c0: 21:08:aa:cd:d0:fc:6a:02:4c:f3:7a:25:a0:3e:cc:c0: 55:a5:80:dd:9c:75:76:7a:1c:17:a5:0b:f1:4e:29:d5: e7:2f:b3:21:f8:7b:19:53:77:33:92:90:32:94:11:d5: 05:b6:0b:31:6c:2b:4b:94:8b:ad:e0 Fingerprint (SHA-256): BF:29:58:3F:B3:11:57:07:B1:EC:D1:FE:AC:96:E3:8D:B0:17:77:5F:1E:98:18:2C:A0:97:A1:39:59:96:29:C3 Fingerprint (SHA1): F1:71:BE:1B:65:2F:30:87:2A:A6:54:0F:4F:61:E4:66:2E:8E:CC:41 Friendly Name: Alice-ec tools.sh: #597: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #598: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e4:6a:38:c6:1e:41:f7:d9:fb:e2:87:50:04:20:c8:d6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 14:05:e9:a8:7d:99:88:33:e4:51:b0:d2:7f:e4:c4:4b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #602: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #603: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #604: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 46:ff:a7:55:f8:ff:5a:e1:c2:7f:ca:4c:e5:52:4a:5a Iteration Count: 2000 (0x7d0) tools.sh: #605: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #606: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #607: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 95:55:17:e1:c1:df:0f:ce:42:a1:83:ef:1c:5f:9e:80 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #608: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #609: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #610: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 29:13:d1:6a:23:06:64:03:9f:69:21:72:8e:b4:e5:f3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 48:8b:df:93:aa:aa:ed:2e:2a:46:41:50:0d:43:e7:87 Iteration Count: 2000 (0x7d0) tools.sh: #614: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #615: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #616: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 30:06:bc:8b:38:6f:3f:3d:c6:72:10:80:d8:a9:82:d0 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:f9:1a:ce:f0:d8:9e:88:38:d3:8b:cc:1f:a5:1e: b4:fd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #617: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #618: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #619: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1d:f2:b0:e9:06:b7:57:1e:ad:2b:61:be:66:a6:bb:61 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:75:ee:b9:30:e5:f1:0a:a7:2d:d2:32:17:1a:38: 5d:85 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #620: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #621: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #622: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c2:16:92:d8:6d:ce:16:d0:ca:fa:ad:5f:8e:f9:de:5f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:d2:13:73:f3:2e:5b:e4:83:d7:74:e8:38:b1:e8: 8e:fe tools.sh: #623: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1f:f9:cf:c2:f0:d2:5d:81:b3:b4:8d:60:bc:17:08:b2 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:5c:5f:be:b8:24:20:fa:8f:54:4c:82:f5:55:b6: 81:b3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #626: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #627: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #628: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e5:72:86:89:9c:10:36:92:69:bd:44:10:19:34:ff:a4 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:55:f1:96:bf:42:ab:fa:65:88:34:06:00:40:2d: 68:b4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #629: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #630: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #631: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f5:ae:8b:72:b3:2c:80:65:59:4a:19:62:9d:26:15:75 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:5f:28:93:82:1d:59:63:8f:f8:86:b6:12:87:97: 01:dd tools.sh: #632: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #633: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #634: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2b:88:ef:6a:61:f6:24:6c:d8:7e:6f:fe:29:31:00:e8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:0e:89:6d:88:2a:60:c9:cf:dd:64:72:42:ff:64: 89:00 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3f:c1:68:92:34:70:1d:4f:30:cb:67:e6:6d:ed:a7:6f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d1:b6:b5:c9:61:38:17:ed:1f:65:ee:01:21:ee: f7:30 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #638: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #639: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #640: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f6:2e:bb:5e:c7:fc:ae:44:e6:ed:2d:58:22:2c:b4:4b Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f2:2d:6a:24:17:22:a0:29:aa:d5:df:20:37:11: 13:1d tools.sh: #641: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #642: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #643: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 77:1b:b6:78:f4:42:d2:3f:fb:c5:75:88:83:bc:be:a9 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:9a:a4:6c:fa:0f:7f:c4:94:43:34:85:7b:8b:1d: 3e:ae Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #644: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #645: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #646: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:a2:42:10:80:fe:f7:6c:60:bc:52:d1:84:45:80:c6 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:51:a3:f0:cb:4c:4d:29:06:6b:80:7a:b6:79:ed: d7:59 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 84:46:8c:93:1c:4e:b1:1a:3d:b7:b5:e4:ce:9a:db:5f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:79:86:de:63:7a:72:3b:d5:00:b6:52:78:f9:1b: c9:2d tools.sh: #650: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #651: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #652: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 82:a3:86:2a:b2:a9:ad:94:07:99:47:15:eb:9b:2f:54 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:a9:79:21:c1:aa:4a:2b:32:0c:0a:d2:cb:f3:63: 5b:e9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #653: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #654: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #655: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b3:a4:85:ac:96:52:cc:a8:72:2f:81:66:41:3f:15:a1 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:bb:06:68:64:3b:15:70:a3:4d:d3:cc:33:40:e8: 08:73 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #656: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #657: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #658: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a6:6a:ff:80:84:e4:e3:06:ac:fe:99:70:6b:07:ff:77 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:26:9d:ff:a6:b6:99:d8:6a:a2:ca:9e:7e:91:f2: 0d:19 tools.sh: #659: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b2:51:36:ff:b0:7e:e2:f2:7f:72:0b:c1:b1:68:c4:5c Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:bc:25:f3:7b:88:e7:aa:c9:2c:ed:bd:8e:08:71: 2a:e9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #662: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #663: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #664: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 04:76:0c:cf:24:59:70:79:1a:06:40:70:ce:63:c9:82 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:1d:f3:d0:ec:4a:a3:2a:19:a3:e6:0d:99:b3:82: 6b:ad Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #665: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #666: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #667: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1c:ee:86:4d:04:4d:5b:e3:6e:91:fa:52:99:4e:f1:56 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:59:df:41:81:5c:79:88:66:33:be:88:bb:3c:e4: 44:e5 tools.sh: #668: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #669: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #670: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 69:af:97:9e:41:59:c6:87:a8:cc:7e:4f:60:e8:6f:d0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 74:86:b5:e6:04:73:1a:85:14:f7:9c:0a:47:db:9b:2a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #674: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #675: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #676: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: bd:9a:4f:63:7f:99:1b:00:c7:15:4f:8b:a4:03:61:1d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #677: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #678: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #679: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 15:8f:8f:2d:eb:0f:8c:d5:c4:28:65:73:82:4a:75:37 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #680: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #681: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #682: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a4:da:cd:dc:9b:bb:6b:c7:f5:5b:14:88:2b:22:94:29 Iteration Count: 2000 (0x7d0) tools.sh: #683: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: c9:e2:f1:45:5d:80:4e:a3:81:0a:d2:33:cd:92:14:ac Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #686: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #687: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #688: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: dc:50:ad:c6:65:4b:05:52:d2:ea:29:94:d5:87:5c:d9 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #689: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #690: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #691: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 37:5c:2b:2a:49:5f:5b:e8:dd:9e:92:0b:b0:e0:bd:90 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #692: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #693: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #694: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 73:55:89:fc:41:87:a9:e2:d8:84:34:c6:85:be:dc:5e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 54:fd:90:45:8c:44:b7:7a:8e:20:a9:8a:87:85:0a:90 Iteration Count: 2000 (0x7d0) tools.sh: #698: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #699: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #700: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: cd:fa:84:fb:85:c6:28:27:c7:0b:60:13:f1:2d:25:93 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #701: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #702: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #703: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d2:3f:2e:57:a3:e0:17:b4:98:ee:2b:f4:9f:6f:c4:85 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #704: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #705: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #706: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c7:c9:78:27:3c:e1:49:08:ef:83:dc:9b:25:38:6f:2f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 77:df:4e:58:cb:dd:fe:01:65:3a:b4:e6:89:4c:5c:2d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #710: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #711: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #712: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0d:c0:13:40:c4:12:d9:07:57:0e:f9:9c:b0:c5:ec:dd Iteration Count: 2000 (0x7d0) tools.sh: #713: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #714: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #715: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 46:b4:8d:6c:85:19:63:d1:35:c4:96:b8:4d:92:d9:a6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #716: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #717: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #718: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:81:c0:88:69:b4:bd:dc:c8:2d:f6:22:22:00:86:b3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8f:22:35:68:4d:f5:65:25:68:c4:27:70:d9:bd:13:a4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #722: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #723: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #724: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 29:37:02:c6:5e:ab:4f:6c:85:fc:b6:b7:8e:68:3f:53 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #725: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #726: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #727: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b8:93:0d:e5:23:3b:cc:a3:92:af:64:80:3c:65:6b:62 Iteration Count: 2000 (0x7d0) tools.sh: #728: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #729: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #730: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 00:5e:79:ac:2e:75:db:4b:87:7b:95:27:4c:69:0b:8e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #731: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #732: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #733: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: da:be:56:4a:25:07:09:f5:7d:c6:1a:00:4f:d1:54:80 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #734: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #735: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #736: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 83:2b:0c:d2:a9:e4:7a:94:e9:04:df:3e:5b:d8:d3:52 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #737: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #738: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #739: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: dd:82:dd:c5:aa:38:cd:42:e2:9d:04:78:95:3f:d4:51 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #740: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #741: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #742: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 07:4f:5d:d5:4a:fb:36:d9:f6:da:25:45:8d:45:94:d1 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #743: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #744: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #745: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4c:4a:d3:10:f4:4d:74:7b:87:c3:e3:04:97:01:8e:b4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #746: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #747: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #748: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: de:c9:7d:ef:f5:cf:8c:2a:e4:41:23:16:49:c1:3c:e9 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #749: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #750: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #751: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ee:26:a5:1b:e1:42:e9:2a:8e:06:e9:1b:3f:6a:ff:6a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #752: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #753: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #754: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 02:f7:6d:82:f8:8e:80:26:a6:48:86:0e:2c:28:5f:d4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #755: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #756: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #757: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1a:7a:ba:0c:e3:dc:ee:e3:3a:ad:20:18:b0:5e:a2:f0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #758: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #759: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #760: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #761: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #762: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #763: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #764: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #765: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #766: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #767: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #768: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Fri Jan 8 02:30:19 EST 2016 Running tests for fips TIMESTAMP fips BEGIN: Fri Jan 8 02:30:19 EST 2016 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #769: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #770: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1c5921e1ef426e08718d8e0f17a4b528f65a29d3 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #771: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #772: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #773: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #774: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #775: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #776: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #777: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #778: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #779: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #780: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #781: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1c5921e1ef426e08718d8e0f17a4b528f65a29d3 FIPS_PUB_140_Test_Certificate fips.sh: #782: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #783: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #784: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #785: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #786: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1c5921e1ef426e08718d8e0f17a4b528f65a29d3 FIPS_PUB_140_Test_Certificate fips.sh: #787: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #788: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #789: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle Changing byte 0x00032fe4 (208868): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips fips.sh: #790: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Fri Jan 8 02:31:01 EST 2016 Running tests for sdr TIMESTAMP sdr BEGIN: Fri Jan 8 02:31:01 EST 2016 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v1.18586 -t "Test1" sdr.sh: #791: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v2.18586 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #792: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v3.18586 -t "1234567" sdr.sh: #793: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v1.18586 -t "Test1" sdr.sh: #794: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v2.18586 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #795: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v3.18586 -t "1234567" sdr.sh: #796: Decrypt - Value 3 - PASSED TIMESTAMP sdr END: Fri Jan 8 02:31:04 EST 2016 Running tests for crmf TIMESTAMP crmf BEGIN: Fri Jan 8 02:31:04 EST 2016 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #797: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #798: CMMF test . - PASSED TIMESTAMP crmf END: Fri Jan 8 02:31:06 EST 2016 Running tests for smime TIMESTAMP smime BEGIN: Fri Jan 8 02:31:06 EST 2016 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #799: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #800: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #801: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #802: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #803: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #804: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #805: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #806: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #807: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #808: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #809: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #810: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #811: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #812: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #813: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #814: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #815: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #816: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #817: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #818: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #819: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #820: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #821: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #822: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #823: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #824: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #825: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #826: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #827: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #828: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #829: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #830: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #831: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #832: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #833: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #834: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #835: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #836: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #837: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #838: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #839: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #840: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #841: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #842: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #843: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #844: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #845: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #846: Decrypt with a Multiple Email cert . - PASSED smime.sh: #847: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #848: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #849: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #850: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #851: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #852: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #853: Decode Encrypted-Data . - PASSED smime.sh: #854: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #855: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #856: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #857: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #858: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #859: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Fri Jan 8 02:31:34 EST 2016 Running tests for ssl TIMESTAMP ssl BEGIN: Fri Jan 8 02:31:34 EST 2016 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:31:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:31:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:31:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #860: Waiting for Server - FAILED kill -0 28318 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28318 found at Fri Jan 8 02:31:41 EST 2016 selfserv_9591 with PID 28318 started at Fri Jan 8 02:31:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #861: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28318 at Fri Jan 8 02:31:41 EST 2016 kill -USR1 28318 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28318 killed at Fri Jan 8 02:31:42 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:31:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:31:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:31:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #862: Waiting for Server - FAILED kill -0 28386 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28386 found at Fri Jan 8 02:31:48 EST 2016 selfserv_9591 with PID 28386 started at Fri Jan 8 02:31:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #863: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28386 at Fri Jan 8 02:31:48 EST 2016 kill -USR1 28386 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28386 killed at Fri Jan 8 02:31:48 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:31:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:31:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:31:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #864: Waiting for Server - FAILED kill -0 28455 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28455 found at Fri Jan 8 02:31:54 EST 2016 selfserv_9591 with PID 28455 started at Fri Jan 8 02:31:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #865: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28455 at Fri Jan 8 02:31:55 EST 2016 kill -USR1 28455 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28455 killed at Fri Jan 8 02:31:55 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:31:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:31:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:32:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #866: Waiting for Server - FAILED kill -0 28535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28535 found at Fri Jan 8 02:32:01 EST 2016 selfserv_9591 with PID 28535 started at Fri Jan 8 02:32:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #867: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28535 at Fri Jan 8 02:32:02 EST 2016 kill -USR1 28535 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28535 killed at Fri Jan 8 02:32:02 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:32:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:32:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:32:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #868: Waiting for Server - FAILED kill -0 28603 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28603 found at Fri Jan 8 02:32:08 EST 2016 selfserv_9591 with PID 28603 started at Fri Jan 8 02:32:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #869: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28603 at Fri Jan 8 02:32:09 EST 2016 kill -USR1 28603 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28603 killed at Fri Jan 8 02:32:09 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:32:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:32:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:32:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #870: Waiting for Server - FAILED kill -0 28672 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28672 found at Fri Jan 8 02:32:15 EST 2016 selfserv_9591 with PID 28672 started at Fri Jan 8 02:32:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #871: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28672 at Fri Jan 8 02:32:16 EST 2016 kill -USR1 28672 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28672 killed at Fri Jan 8 02:32:16 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:32:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:32:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:32:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #872: Waiting for Server - FAILED kill -0 28752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28752 found at Fri Jan 8 02:32:22 EST 2016 selfserv_9591 with PID 28752 started at Fri Jan 8 02:32:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #873: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28752 at Fri Jan 8 02:32:23 EST 2016 kill -USR1 28752 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28752 killed at Fri Jan 8 02:32:23 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:32:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:32:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:32:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #874: Waiting for Server - FAILED kill -0 28820 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28820 found at Fri Jan 8 02:32:29 EST 2016 selfserv_9591 with PID 28820 started at Fri Jan 8 02:32:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #875: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28820 at Fri Jan 8 02:32:29 EST 2016 kill -USR1 28820 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28820 killed at Fri Jan 8 02:32:30 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:32:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:32:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:32:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #876: Waiting for Server - FAILED kill -0 28889 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28889 found at Fri Jan 8 02:32:36 EST 2016 selfserv_9591 with PID 28889 started at Fri Jan 8 02:32:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #877: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28889 at Fri Jan 8 02:32:36 EST 2016 kill -USR1 28889 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28889 killed at Fri Jan 8 02:32:37 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:32:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:32:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:32:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #878: Waiting for Server - FAILED kill -0 28969 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28969 found at Fri Jan 8 02:32:43 EST 2016 selfserv_9591 with PID 28969 started at Fri Jan 8 02:32:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #879: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28969 at Fri Jan 8 02:32:43 EST 2016 kill -USR1 28969 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28969 killed at Fri Jan 8 02:32:44 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:32:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:32:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:32:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #880: Waiting for Server - FAILED kill -0 29037 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29037 found at Fri Jan 8 02:32:50 EST 2016 selfserv_9591 with PID 29037 started at Fri Jan 8 02:32:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #881: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 29037 at Fri Jan 8 02:32:50 EST 2016 kill -USR1 29037 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29037 killed at Fri Jan 8 02:32:51 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:32:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:32:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:32:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #882: Waiting for Server - FAILED kill -0 29106 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29106 found at Fri Jan 8 02:32:57 EST 2016 selfserv_9591 with PID 29106 started at Fri Jan 8 02:32:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #883: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 29106 at Fri Jan 8 02:32:57 EST 2016 kill -USR1 29106 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29106 killed at Fri Jan 8 02:32:57 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:32:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:32:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:33:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #884: Waiting for Server - FAILED kill -0 29186 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29186 found at Fri Jan 8 02:33:04 EST 2016 selfserv_9591 with PID 29186 started at Fri Jan 8 02:33:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #885: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 29186 at Fri Jan 8 02:33:04 EST 2016 kill -USR1 29186 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29186 killed at Fri Jan 8 02:33:04 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:33:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:33:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:33:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #886: Waiting for Server - FAILED kill -0 29254 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29254 found at Fri Jan 8 02:33:10 EST 2016 selfserv_9591 with PID 29254 started at Fri Jan 8 02:33:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #887: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 29254 at Fri Jan 8 02:33:11 EST 2016 kill -USR1 29254 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29254 killed at Fri Jan 8 02:33:11 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:33:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:33:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:33:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #888: Waiting for Server - FAILED kill -0 29323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29323 found at Fri Jan 8 02:33:17 EST 2016 selfserv_9591 with PID 29323 started at Fri Jan 8 02:33:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #889: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 29323 at Fri Jan 8 02:33:18 EST 2016 kill -USR1 29323 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29323 killed at Fri Jan 8 02:33:18 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:33:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:33:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:33:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #890: Waiting for Server - FAILED kill -0 29403 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29403 found at Fri Jan 8 02:33:24 EST 2016 selfserv_9591 with PID 29403 started at Fri Jan 8 02:33:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #891: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 29403 at Fri Jan 8 02:33:25 EST 2016 kill -USR1 29403 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29403 killed at Fri Jan 8 02:33:25 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:33:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:33:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:33:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #892: Waiting for Server - FAILED kill -0 29471 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29471 found at Fri Jan 8 02:33:31 EST 2016 selfserv_9591 with PID 29471 started at Fri Jan 8 02:33:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #893: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29471 at Fri Jan 8 02:33:32 EST 2016 kill -USR1 29471 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29471 killed at Fri Jan 8 02:33:32 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:33:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:33:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:33:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #894: Waiting for Server - FAILED kill -0 29540 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29540 found at Fri Jan 8 02:33:38 EST 2016 selfserv_9591 with PID 29540 started at Fri Jan 8 02:33:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #895: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 29540 at Fri Jan 8 02:33:39 EST 2016 kill -USR1 29540 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29540 killed at Fri Jan 8 02:33:39 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:33:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:33:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:33:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #896: Waiting for Server - FAILED kill -0 29620 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29620 found at Fri Jan 8 02:33:45 EST 2016 selfserv_9591 with PID 29620 started at Fri Jan 8 02:33:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #897: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29620 at Fri Jan 8 02:33:45 EST 2016 kill -USR1 29620 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29620 killed at Fri Jan 8 02:33:46 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:33:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:33:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:33:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #898: Waiting for Server - FAILED kill -0 29688 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29688 found at Fri Jan 8 02:33:52 EST 2016 selfserv_9591 with PID 29688 started at Fri Jan 8 02:33:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #899: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29688 at Fri Jan 8 02:33:52 EST 2016 kill -USR1 29688 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29688 killed at Fri Jan 8 02:33:53 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:33:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:33:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:33:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #900: Waiting for Server - FAILED kill -0 29757 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29757 found at Fri Jan 8 02:33:59 EST 2016 selfserv_9591 with PID 29757 started at Fri Jan 8 02:33:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #901: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29757 at Fri Jan 8 02:33:59 EST 2016 kill -USR1 29757 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29757 killed at Fri Jan 8 02:34:00 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:34:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:34:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:34:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #902: Waiting for Server - FAILED kill -0 29837 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29837 found at Fri Jan 8 02:34:06 EST 2016 selfserv_9591 with PID 29837 started at Fri Jan 8 02:34:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #903: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29837 at Fri Jan 8 02:34:06 EST 2016 kill -USR1 29837 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29837 killed at Fri Jan 8 02:34:07 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:34:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:34:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:34:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #904: Waiting for Server - FAILED kill -0 29905 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29905 found at Fri Jan 8 02:34:13 EST 2016 selfserv_9591 with PID 29905 started at Fri Jan 8 02:34:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #905: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29905 at Fri Jan 8 02:34:13 EST 2016 kill -USR1 29905 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29905 killed at Fri Jan 8 02:34:13 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:34:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:34:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:34:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #906: Waiting for Server - FAILED kill -0 29974 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29974 found at Fri Jan 8 02:34:19 EST 2016 selfserv_9591 with PID 29974 started at Fri Jan 8 02:34:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #907: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29974 at Fri Jan 8 02:34:20 EST 2016 kill -USR1 29974 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29974 killed at Fri Jan 8 02:34:20 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:34:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:34:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:34:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #908: Waiting for Server - FAILED kill -0 30054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30054 found at Fri Jan 8 02:34:26 EST 2016 selfserv_9591 with PID 30054 started at Fri Jan 8 02:34:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #909: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 30054 at Fri Jan 8 02:34:27 EST 2016 kill -USR1 30054 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30054 killed at Fri Jan 8 02:34:27 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:34:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:34:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:34:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #910: Waiting for Server - FAILED kill -0 30122 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30122 found at Fri Jan 8 02:34:33 EST 2016 selfserv_9591 with PID 30122 started at Fri Jan 8 02:34:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #911: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30122 at Fri Jan 8 02:34:34 EST 2016 kill -USR1 30122 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30122 killed at Fri Jan 8 02:34:34 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:34:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:34:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:34:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #912: Waiting for Server - FAILED kill -0 30191 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30191 found at Fri Jan 8 02:34:40 EST 2016 selfserv_9591 with PID 30191 started at Fri Jan 8 02:34:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #913: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 30191 at Fri Jan 8 02:34:41 EST 2016 kill -USR1 30191 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30191 killed at Fri Jan 8 02:34:41 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:34:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:34:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:34:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #914: Waiting for Server - FAILED kill -0 30271 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30271 found at Fri Jan 8 02:34:47 EST 2016 selfserv_9591 with PID 30271 started at Fri Jan 8 02:34:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #915: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 30271 at Fri Jan 8 02:34:48 EST 2016 kill -USR1 30271 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30271 killed at Fri Jan 8 02:34:48 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:34:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:34:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:34:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #916: Waiting for Server - FAILED kill -0 30339 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30339 found at Fri Jan 8 02:34:54 EST 2016 selfserv_9591 with PID 30339 started at Fri Jan 8 02:34:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #917: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 30339 at Fri Jan 8 02:34:55 EST 2016 kill -USR1 30339 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30339 killed at Fri Jan 8 02:34:55 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:34:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:34:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:35:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #918: Waiting for Server - FAILED kill -0 30408 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30408 found at Fri Jan 8 02:35:01 EST 2016 selfserv_9591 with PID 30408 started at Fri Jan 8 02:35:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #919: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 30408 at Fri Jan 8 02:35:01 EST 2016 kill -USR1 30408 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30408 killed at Fri Jan 8 02:35:02 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:35:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:35:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:35:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #920: Waiting for Server - FAILED kill -0 30488 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30488 found at Fri Jan 8 02:35:08 EST 2016 selfserv_9591 with PID 30488 started at Fri Jan 8 02:35:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #921: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 30488 at Fri Jan 8 02:35:08 EST 2016 kill -USR1 30488 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30488 killed at Fri Jan 8 02:35:09 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:35:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:35:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:35:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #922: Waiting for Server - FAILED kill -0 30556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30556 found at Fri Jan 8 02:35:15 EST 2016 selfserv_9591 with PID 30556 started at Fri Jan 8 02:35:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #923: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 30556 at Fri Jan 8 02:35:15 EST 2016 kill -USR1 30556 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30556 killed at Fri Jan 8 02:35:16 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:35:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:35:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:35:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #924: Waiting for Server - FAILED kill -0 30625 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30625 found at Fri Jan 8 02:35:22 EST 2016 selfserv_9591 with PID 30625 started at Fri Jan 8 02:35:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #925: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 30625 at Fri Jan 8 02:35:22 EST 2016 kill -USR1 30625 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30625 killed at Fri Jan 8 02:35:23 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:35:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:35:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:35:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #926: Waiting for Server - FAILED kill -0 30705 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30705 found at Fri Jan 8 02:35:29 EST 2016 selfserv_9591 with PID 30705 started at Fri Jan 8 02:35:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #927: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 30705 at Fri Jan 8 02:35:29 EST 2016 kill -USR1 30705 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30705 killed at Fri Jan 8 02:35:29 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:35:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:35:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:35:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #928: Waiting for Server - FAILED kill -0 30773 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30773 found at Fri Jan 8 02:35:35 EST 2016 selfserv_9591 with PID 30773 started at Fri Jan 8 02:35:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #929: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30773 at Fri Jan 8 02:35:36 EST 2016 kill -USR1 30773 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30773 killed at Fri Jan 8 02:35:36 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:35:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:35:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:35:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #930: Waiting for Server - FAILED kill -0 30842 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30842 found at Fri Jan 8 02:35:42 EST 2016 selfserv_9591 with PID 30842 started at Fri Jan 8 02:35:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #931: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 30842 at Fri Jan 8 02:35:43 EST 2016 kill -USR1 30842 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30842 killed at Fri Jan 8 02:35:43 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:35:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:35:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:35:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #932: Waiting for Server - FAILED kill -0 30922 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30922 found at Fri Jan 8 02:35:49 EST 2016 selfserv_9591 with PID 30922 started at Fri Jan 8 02:35:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #933: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30922 at Fri Jan 8 02:35:50 EST 2016 kill -USR1 30922 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30922 killed at Fri Jan 8 02:35:50 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:35:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:35:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:35:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #934: Waiting for Server - FAILED kill -0 30990 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30990 found at Fri Jan 8 02:35:56 EST 2016 selfserv_9591 with PID 30990 started at Fri Jan 8 02:35:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #935: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30990 at Fri Jan 8 02:35:57 EST 2016 kill -USR1 30990 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30990 killed at Fri Jan 8 02:35:57 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:35:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:35:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:36:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #936: Waiting for Server - FAILED kill -0 31059 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31059 found at Fri Jan 8 02:36:03 EST 2016 selfserv_9591 with PID 31059 started at Fri Jan 8 02:36:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #937: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31059 at Fri Jan 8 02:36:04 EST 2016 kill -USR1 31059 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31059 killed at Fri Jan 8 02:36:04 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:36:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:36:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:36:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #938: Waiting for Server - FAILED kill -0 31139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31139 found at Fri Jan 8 02:36:10 EST 2016 selfserv_9591 with PID 31139 started at Fri Jan 8 02:36:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #939: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31139 at Fri Jan 8 02:36:11 EST 2016 kill -USR1 31139 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31139 killed at Fri Jan 8 02:36:11 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:36:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:36:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:36:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #940: Waiting for Server - FAILED kill -0 31207 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31207 found at Fri Jan 8 02:36:17 EST 2016 selfserv_9591 with PID 31207 started at Fri Jan 8 02:36:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #941: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31207 at Fri Jan 8 02:36:17 EST 2016 kill -USR1 31207 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31207 killed at Fri Jan 8 02:36:18 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:36:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:36:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:36:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #942: Waiting for Server - FAILED kill -0 31276 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31276 found at Fri Jan 8 02:36:24 EST 2016 selfserv_9591 with PID 31276 started at Fri Jan 8 02:36:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #943: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31276 at Fri Jan 8 02:36:24 EST 2016 kill -USR1 31276 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31276 killed at Fri Jan 8 02:36:25 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:36:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:36:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:36:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #944: Waiting for Server - FAILED kill -0 31356 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31356 found at Fri Jan 8 02:36:31 EST 2016 selfserv_9591 with PID 31356 started at Fri Jan 8 02:36:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #945: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31356 at Fri Jan 8 02:36:31 EST 2016 kill -USR1 31356 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31356 killed at Fri Jan 8 02:36:32 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:36:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:36:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:36:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #946: Waiting for Server - FAILED kill -0 31425 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31425 found at Fri Jan 8 02:36:38 EST 2016 selfserv_9591 with PID 31425 started at Fri Jan 8 02:36:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #947: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31425 at Fri Jan 8 02:36:38 EST 2016 kill -USR1 31425 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31425 killed at Fri Jan 8 02:36:39 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:36:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:36:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:36:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #948: Waiting for Server - FAILED kill -0 31493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31493 found at Fri Jan 8 02:36:45 EST 2016 selfserv_9591 with PID 31493 started at Fri Jan 8 02:36:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #949: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31493 at Fri Jan 8 02:36:45 EST 2016 kill -USR1 31493 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31493 killed at Fri Jan 8 02:36:45 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:36:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:36:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:36:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #950: Waiting for Server - FAILED kill -0 31573 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31573 found at Fri Jan 8 02:36:51 EST 2016 selfserv_9591 with PID 31573 started at Fri Jan 8 02:36:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #951: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31573 at Fri Jan 8 02:36:52 EST 2016 kill -USR1 31573 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31573 killed at Fri Jan 8 02:36:52 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:36:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:36:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:36:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #952: Waiting for Server - FAILED kill -0 31642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31642 found at Fri Jan 8 02:36:58 EST 2016 selfserv_9591 with PID 31642 started at Fri Jan 8 02:36:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31642 at Fri Jan 8 02:36:59 EST 2016 kill -USR1 31642 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31642 killed at Fri Jan 8 02:36:59 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:36:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:36:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:37:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #954: Waiting for Server - FAILED kill -0 31713 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31713 found at Fri Jan 8 02:37:05 EST 2016 selfserv_9591 with PID 31713 started at Fri Jan 8 02:37:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #955: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31713 at Fri Jan 8 02:37:06 EST 2016 kill -USR1 31713 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31713 killed at Fri Jan 8 02:37:06 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:37:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:37:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:37:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #956: Waiting for Server - FAILED kill -0 31793 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31793 found at Fri Jan 8 02:37:12 EST 2016 selfserv_9591 with PID 31793 started at Fri Jan 8 02:37:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #957: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31793 at Fri Jan 8 02:37:13 EST 2016 kill -USR1 31793 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31793 killed at Fri Jan 8 02:37:13 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:37:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:37:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:37:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #958: Waiting for Server - FAILED kill -0 31862 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31862 found at Fri Jan 8 02:37:19 EST 2016 selfserv_9591 with PID 31862 started at Fri Jan 8 02:37:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #959: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31862 at Fri Jan 8 02:37:20 EST 2016 kill -USR1 31862 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31862 killed at Fri Jan 8 02:37:20 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:37:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:37:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:37:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #960: Waiting for Server - FAILED kill -0 31930 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31930 found at Fri Jan 8 02:37:26 EST 2016 selfserv_9591 with PID 31930 started at Fri Jan 8 02:37:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #961: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31930 at Fri Jan 8 02:37:27 EST 2016 kill -USR1 31930 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31930 killed at Fri Jan 8 02:37:27 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:37:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:37:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:37:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #962: Waiting for Server - FAILED kill -0 32010 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32010 found at Fri Jan 8 02:37:33 EST 2016 selfserv_9591 with PID 32010 started at Fri Jan 8 02:37:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #963: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32010 at Fri Jan 8 02:37:33 EST 2016 kill -USR1 32010 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32010 killed at Fri Jan 8 02:37:34 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:37:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:37:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:37:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #964: Waiting for Server - FAILED kill -0 32079 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32079 found at Fri Jan 8 02:37:40 EST 2016 selfserv_9591 with PID 32079 started at Fri Jan 8 02:37:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #965: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32079 at Fri Jan 8 02:37:40 EST 2016 kill -USR1 32079 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32079 killed at Fri Jan 8 02:37:41 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:37:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:37:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:37:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #966: Waiting for Server - FAILED kill -0 32147 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32147 found at Fri Jan 8 02:37:47 EST 2016 selfserv_9591 with PID 32147 started at Fri Jan 8 02:37:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #967: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32147 at Fri Jan 8 02:37:47 EST 2016 kill -USR1 32147 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32147 killed at Fri Jan 8 02:37:48 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:37:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:37:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:37:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #968: Waiting for Server - FAILED kill -0 32227 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32227 found at Fri Jan 8 02:37:54 EST 2016 selfserv_9591 with PID 32227 started at Fri Jan 8 02:37:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #969: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32227 at Fri Jan 8 02:37:54 EST 2016 kill -USR1 32227 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32227 killed at Fri Jan 8 02:37:55 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:37:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:37:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:38:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #970: Waiting for Server - FAILED kill -0 32296 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32296 found at Fri Jan 8 02:38:01 EST 2016 selfserv_9591 with PID 32296 started at Fri Jan 8 02:38:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #971: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32296 at Fri Jan 8 02:38:01 EST 2016 kill -USR1 32296 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32296 killed at Fri Jan 8 02:38:01 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:38:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:38:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:38:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #972: Waiting for Server - FAILED kill -0 32364 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32364 found at Fri Jan 8 02:38:07 EST 2016 selfserv_9591 with PID 32364 started at Fri Jan 8 02:38:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #973: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32364 at Fri Jan 8 02:38:08 EST 2016 kill -USR1 32364 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32364 killed at Fri Jan 8 02:38:08 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:38:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:38:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:38:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #974: Waiting for Server - FAILED kill -0 32444 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32444 found at Fri Jan 8 02:38:14 EST 2016 selfserv_9591 with PID 32444 started at Fri Jan 8 02:38:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #975: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32444 at Fri Jan 8 02:38:15 EST 2016 kill -USR1 32444 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32444 killed at Fri Jan 8 02:38:15 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:38:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:38:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:38:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #976: Waiting for Server - FAILED kill -0 32513 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32513 found at Fri Jan 8 02:38:21 EST 2016 selfserv_9591 with PID 32513 started at Fri Jan 8 02:38:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #977: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32513 at Fri Jan 8 02:38:22 EST 2016 kill -USR1 32513 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32513 killed at Fri Jan 8 02:38:22 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:38:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:38:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:38:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #978: Waiting for Server - FAILED kill -0 32581 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32581 found at Fri Jan 8 02:38:28 EST 2016 selfserv_9591 with PID 32581 started at Fri Jan 8 02:38:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #979: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32581 at Fri Jan 8 02:38:29 EST 2016 kill -USR1 32581 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32581 killed at Fri Jan 8 02:38:29 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:38:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:38:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:38:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #980: Waiting for Server - FAILED kill -0 32661 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32661 found at Fri Jan 8 02:38:35 EST 2016 selfserv_9591 with PID 32661 started at Fri Jan 8 02:38:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #981: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32661 at Fri Jan 8 02:38:36 EST 2016 kill -USR1 32661 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32661 killed at Fri Jan 8 02:38:36 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:38:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:38:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:38:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #982: Waiting for Server - FAILED kill -0 32730 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32730 found at Fri Jan 8 02:38:42 EST 2016 selfserv_9591 with PID 32730 started at Fri Jan 8 02:38:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #983: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32730 at Fri Jan 8 02:38:43 EST 2016 kill -USR1 32730 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32730 killed at Fri Jan 8 02:38:43 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:38:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:38:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:38:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #984: Waiting for Server - FAILED kill -0 330 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 330 found at Fri Jan 8 02:38:49 EST 2016 selfserv_9591 with PID 330 started at Fri Jan 8 02:38:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #985: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 330 at Fri Jan 8 02:38:49 EST 2016 kill -USR1 330 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 330 killed at Fri Jan 8 02:38:50 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:38:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:38:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:38:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #986: Waiting for Server - FAILED kill -0 413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 413 found at Fri Jan 8 02:38:56 EST 2016 selfserv_9591 with PID 413 started at Fri Jan 8 02:38:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #987: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 413 at Fri Jan 8 02:38:56 EST 2016 kill -USR1 413 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 413 killed at Fri Jan 8 02:38:57 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:38:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:38:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:39:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #988: Waiting for Server - FAILED kill -0 497 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 497 found at Fri Jan 8 02:39:03 EST 2016 selfserv_9591 with PID 497 started at Fri Jan 8 02:39:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 497 at Fri Jan 8 02:39:03 EST 2016 kill -USR1 497 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 497 killed at Fri Jan 8 02:39:04 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:39:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:39:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:39:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #990: Waiting for Server - FAILED kill -0 571 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 571 found at Fri Jan 8 02:39:10 EST 2016 selfserv_9591 with PID 571 started at Fri Jan 8 02:39:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #991: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 571 at Fri Jan 8 02:39:10 EST 2016 kill -USR1 571 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 571 killed at Fri Jan 8 02:39:11 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:39:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:39:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:39:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #992: Waiting for Server - FAILED kill -0 656 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 656 found at Fri Jan 8 02:39:17 EST 2016 selfserv_9591 with PID 656 started at Fri Jan 8 02:39:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #993: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 656 at Fri Jan 8 02:39:17 EST 2016 kill -USR1 656 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 656 killed at Fri Jan 8 02:39:18 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:39:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:39:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:39:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #994: Waiting for Server - FAILED kill -0 725 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 725 found at Fri Jan 8 02:39:23 EST 2016 selfserv_9591 with PID 725 started at Fri Jan 8 02:39:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #995: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 725 at Fri Jan 8 02:39:24 EST 2016 kill -USR1 725 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 725 killed at Fri Jan 8 02:39:24 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:39:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:39:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:39:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #996: Waiting for Server - FAILED kill -0 793 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 793 found at Fri Jan 8 02:39:30 EST 2016 selfserv_9591 with PID 793 started at Fri Jan 8 02:39:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #997: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 793 at Fri Jan 8 02:39:31 EST 2016 kill -USR1 793 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 793 killed at Fri Jan 8 02:39:31 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:39:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:39:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:39:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #998: Waiting for Server - FAILED kill -0 873 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 873 found at Fri Jan 8 02:39:37 EST 2016 selfserv_9591 with PID 873 started at Fri Jan 8 02:39:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #999: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 873 at Fri Jan 8 02:39:38 EST 2016 kill -USR1 873 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 873 killed at Fri Jan 8 02:39:38 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:39:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:39:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:39:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1000: Waiting for Server - FAILED kill -0 942 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 942 found at Fri Jan 8 02:39:44 EST 2016 selfserv_9591 with PID 942 started at Fri Jan 8 02:39:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1001: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 942 at Fri Jan 8 02:39:45 EST 2016 kill -USR1 942 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 942 killed at Fri Jan 8 02:39:45 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:39:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:39:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:39:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1002: Waiting for Server - FAILED kill -0 1010 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1010 found at Fri Jan 8 02:39:51 EST 2016 selfserv_9591 with PID 1010 started at Fri Jan 8 02:39:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1003: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1010 at Fri Jan 8 02:39:52 EST 2016 kill -USR1 1010 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1010 killed at Fri Jan 8 02:39:52 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:39:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:39:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:39:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1004: Waiting for Server - FAILED kill -0 1090 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1090 found at Fri Jan 8 02:39:58 EST 2016 selfserv_9591 with PID 1090 started at Fri Jan 8 02:39:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1005: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1090 at Fri Jan 8 02:39:59 EST 2016 kill -USR1 1090 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1090 killed at Fri Jan 8 02:39:59 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:39:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:39:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:40:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1006: Waiting for Server - FAILED kill -0 1162 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1162 found at Fri Jan 8 02:40:05 EST 2016 selfserv_9591 with PID 1162 started at Fri Jan 8 02:40:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1007: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1162 at Fri Jan 8 02:40:05 EST 2016 kill -USR1 1162 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1162 killed at Fri Jan 8 02:40:06 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:40:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:40:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:40:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1008: Waiting for Server - FAILED kill -0 1230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1230 found at Fri Jan 8 02:40:12 EST 2016 selfserv_9591 with PID 1230 started at Fri Jan 8 02:40:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1009: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1230 at Fri Jan 8 02:40:12 EST 2016 kill -USR1 1230 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1230 killed at Fri Jan 8 02:40:13 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:40:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:40:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:40:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1010: Waiting for Server - FAILED kill -0 1310 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1310 found at Fri Jan 8 02:40:19 EST 2016 selfserv_9591 with PID 1310 started at Fri Jan 8 02:40:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1011: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1310 at Fri Jan 8 02:40:19 EST 2016 kill -USR1 1310 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1310 killed at Fri Jan 8 02:40:20 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:40:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:40:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:40:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1012: Waiting for Server - FAILED kill -0 1379 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1379 found at Fri Jan 8 02:40:26 EST 2016 selfserv_9591 with PID 1379 started at Fri Jan 8 02:40:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1013: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1379 at Fri Jan 8 02:40:26 EST 2016 kill -USR1 1379 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1379 killed at Fri Jan 8 02:40:27 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:40:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:40:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:40:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1014: Waiting for Server - FAILED kill -0 1447 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1447 found at Fri Jan 8 02:40:33 EST 2016 selfserv_9591 with PID 1447 started at Fri Jan 8 02:40:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1015: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1447 at Fri Jan 8 02:40:33 EST 2016 kill -USR1 1447 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1447 killed at Fri Jan 8 02:40:33 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:40:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:40:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:40:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1016: Waiting for Server - FAILED kill -0 1527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1527 found at Fri Jan 8 02:40:40 EST 2016 selfserv_9591 with PID 1527 started at Fri Jan 8 02:40:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1017: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1527 at Fri Jan 8 02:40:40 EST 2016 kill -USR1 1527 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1527 killed at Fri Jan 8 02:40:40 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:40:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:40:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:40:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1018: Waiting for Server - FAILED kill -0 1596 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1596 found at Fri Jan 8 02:40:46 EST 2016 selfserv_9591 with PID 1596 started at Fri Jan 8 02:40:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1019: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1596 at Fri Jan 8 02:40:47 EST 2016 kill -USR1 1596 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1596 killed at Fri Jan 8 02:40:47 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:40:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:40:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:40:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1020: Waiting for Server - FAILED kill -0 1664 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1664 found at Fri Jan 8 02:40:53 EST 2016 selfserv_9591 with PID 1664 started at Fri Jan 8 02:40:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1021: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1664 at Fri Jan 8 02:40:54 EST 2016 kill -USR1 1664 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1664 killed at Fri Jan 8 02:40:54 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:40:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:40:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:41:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1022: Waiting for Server - FAILED kill -0 1744 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1744 found at Fri Jan 8 02:41:00 EST 2016 selfserv_9591 with PID 1744 started at Fri Jan 8 02:41:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1023: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1744 at Fri Jan 8 02:41:01 EST 2016 kill -USR1 1744 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1744 killed at Fri Jan 8 02:41:01 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:41:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:41:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:41:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1024: Waiting for Server - FAILED kill -0 1813 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1813 found at Fri Jan 8 02:41:07 EST 2016 selfserv_9591 with PID 1813 started at Fri Jan 8 02:41:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1025: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1813 at Fri Jan 8 02:41:08 EST 2016 kill -USR1 1813 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1813 killed at Fri Jan 8 02:41:08 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:41:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:41:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:41:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1026: Waiting for Server - FAILED kill -0 1886 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1886 found at Fri Jan 8 02:41:14 EST 2016 selfserv_9591 with PID 1886 started at Fri Jan 8 02:41:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1027: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1886 at Fri Jan 8 02:41:15 EST 2016 kill -USR1 1886 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1886 killed at Fri Jan 8 02:41:15 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:41:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:41:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:41:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1028: Waiting for Server - FAILED kill -0 1966 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1966 found at Fri Jan 8 02:41:21 EST 2016 selfserv_9591 with PID 1966 started at Fri Jan 8 02:41:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1029: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1966 at Fri Jan 8 02:41:21 EST 2016 kill -USR1 1966 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1966 killed at Fri Jan 8 02:41:22 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:41:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:41:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:41:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1030: Waiting for Server - FAILED kill -0 2035 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2035 found at Fri Jan 8 02:41:28 EST 2016 selfserv_9591 with PID 2035 started at Fri Jan 8 02:41:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1031: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2035 at Fri Jan 8 02:41:28 EST 2016 kill -USR1 2035 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2035 killed at Fri Jan 8 02:41:29 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:41:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:41:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:41:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1032: Waiting for Server - FAILED kill -0 2103 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2103 found at Fri Jan 8 02:41:35 EST 2016 selfserv_9591 with PID 2103 started at Fri Jan 8 02:41:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1033: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2103 at Fri Jan 8 02:41:35 EST 2016 kill -USR1 2103 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2103 killed at Fri Jan 8 02:41:36 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:41:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:41:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:41:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1034: Waiting for Server - FAILED kill -0 2184 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2184 found at Fri Jan 8 02:41:42 EST 2016 selfserv_9591 with PID 2184 started at Fri Jan 8 02:41:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1035: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2184 at Fri Jan 8 02:41:42 EST 2016 kill -USR1 2184 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2184 killed at Fri Jan 8 02:41:43 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:41:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:41:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:41:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1036: Waiting for Server - FAILED kill -0 2253 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2253 found at Fri Jan 8 02:41:49 EST 2016 selfserv_9591 with PID 2253 started at Fri Jan 8 02:41:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1037: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2253 at Fri Jan 8 02:41:49 EST 2016 kill -USR1 2253 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2253 killed at Fri Jan 8 02:41:50 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:41:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:41:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:41:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1038: Waiting for Server - FAILED kill -0 2321 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2321 found at Fri Jan 8 02:41:55 EST 2016 selfserv_9591 with PID 2321 started at Fri Jan 8 02:41:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1039: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2321 at Fri Jan 8 02:41:56 EST 2016 kill -USR1 2321 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2321 killed at Fri Jan 8 02:41:56 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:41:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:41:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:42:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1040: Waiting for Server - FAILED kill -0 2410 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2410 found at Fri Jan 8 02:42:02 EST 2016 selfserv_9591 with PID 2410 started at Fri Jan 8 02:42:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1041: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2410 at Fri Jan 8 02:42:03 EST 2016 kill -USR1 2410 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2410 killed at Fri Jan 8 02:42:03 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:42:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:42:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:42:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1042: Waiting for Server - FAILED kill -0 2479 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2479 found at Fri Jan 8 02:42:09 EST 2016 selfserv_9591 with PID 2479 started at Fri Jan 8 02:42:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1043: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2479 at Fri Jan 8 02:42:10 EST 2016 kill -USR1 2479 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2479 killed at Fri Jan 8 02:42:10 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:42:10 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:42:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:42:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1044: Waiting for Server - FAILED kill -0 2547 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2547 found at Fri Jan 8 02:42:16 EST 2016 selfserv_9591 with PID 2547 started at Fri Jan 8 02:42:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1045: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2547 at Fri Jan 8 02:42:17 EST 2016 kill -USR1 2547 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2547 killed at Fri Jan 8 02:42:17 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:42:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:42:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:42:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1046: Waiting for Server - FAILED kill -0 2627 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2627 found at Fri Jan 8 02:42:23 EST 2016 selfserv_9591 with PID 2627 started at Fri Jan 8 02:42:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1047: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 2627 at Fri Jan 8 02:42:24 EST 2016 kill -USR1 2627 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2627 killed at Fri Jan 8 02:42:24 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:42:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:42:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:42:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1048: Waiting for Server - FAILED kill -0 2696 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2696 found at Fri Jan 8 02:42:30 EST 2016 selfserv_9591 with PID 2696 started at Fri Jan 8 02:42:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1049: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2696 at Fri Jan 8 02:42:31 EST 2016 kill -USR1 2696 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2696 killed at Fri Jan 8 02:42:31 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:42:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:42:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:42:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1050: Waiting for Server - FAILED kill -0 2764 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2764 found at Fri Jan 8 02:42:37 EST 2016 selfserv_9591 with PID 2764 started at Fri Jan 8 02:42:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1051: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 2764 at Fri Jan 8 02:42:37 EST 2016 kill -USR1 2764 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2764 killed at Fri Jan 8 02:42:38 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:42:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:42:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:42:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1052: Waiting for Server - FAILED kill -0 2844 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2844 found at Fri Jan 8 02:42:44 EST 2016 selfserv_9591 with PID 2844 started at Fri Jan 8 02:42:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1053: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 2844 at Fri Jan 8 02:42:44 EST 2016 kill -USR1 2844 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2844 killed at Fri Jan 8 02:42:45 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:42:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:42:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:42:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1054: Waiting for Server - FAILED kill -0 2913 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2913 found at Fri Jan 8 02:42:51 EST 2016 selfserv_9591 with PID 2913 started at Fri Jan 8 02:42:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1055: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 2913 at Fri Jan 8 02:42:51 EST 2016 kill -USR1 2913 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2913 killed at Fri Jan 8 02:42:52 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:42:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:42:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:42:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1056: Waiting for Server - FAILED kill -0 2981 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2981 found at Fri Jan 8 02:42:58 EST 2016 selfserv_9591 with PID 2981 started at Fri Jan 8 02:42:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1057: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 2981 at Fri Jan 8 02:42:58 EST 2016 kill -USR1 2981 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2981 killed at Fri Jan 8 02:42:59 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:42:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:42:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:43:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1058: Waiting for Server - FAILED kill -0 3061 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3061 found at Fri Jan 8 02:43:05 EST 2016 selfserv_9591 with PID 3061 started at Fri Jan 8 02:43:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1059: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 3061 at Fri Jan 8 02:43:05 EST 2016 kill -USR1 3061 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3061 killed at Fri Jan 8 02:43:06 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:43:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:43:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:43:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1060: Waiting for Server - FAILED kill -0 3130 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3130 found at Fri Jan 8 02:43:12 EST 2016 selfserv_9591 with PID 3130 started at Fri Jan 8 02:43:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1061: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3130 at Fri Jan 8 02:43:12 EST 2016 kill -USR1 3130 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3130 killed at Fri Jan 8 02:43:12 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:43:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:43:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:43:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1062: Waiting for Server - FAILED kill -0 3198 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3198 found at Fri Jan 8 02:43:18 EST 2016 selfserv_9591 with PID 3198 started at Fri Jan 8 02:43:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1063: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 3198 at Fri Jan 8 02:43:19 EST 2016 kill -USR1 3198 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3198 killed at Fri Jan 8 02:43:19 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:43:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:43:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:43:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1064: Waiting for Server - FAILED kill -0 3278 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3278 found at Fri Jan 8 02:43:25 EST 2016 selfserv_9591 with PID 3278 started at Fri Jan 8 02:43:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1065: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3278 at Fri Jan 8 02:43:26 EST 2016 kill -USR1 3278 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3278 killed at Fri Jan 8 02:43:26 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:43:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:43:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:43:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1066: Waiting for Server - FAILED kill -0 3347 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3347 found at Fri Jan 8 02:43:32 EST 2016 selfserv_9591 with PID 3347 started at Fri Jan 8 02:43:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1067: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3347 at Fri Jan 8 02:43:33 EST 2016 kill -USR1 3347 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3347 killed at Fri Jan 8 02:43:33 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:43:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:43:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:43:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1068: Waiting for Server - FAILED kill -0 3415 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3415 found at Fri Jan 8 02:43:39 EST 2016 selfserv_9591 with PID 3415 started at Fri Jan 8 02:43:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1069: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3415 at Fri Jan 8 02:43:40 EST 2016 kill -USR1 3415 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3415 killed at Fri Jan 8 02:43:40 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:43:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:43:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:43:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1070: Waiting for Server - FAILED kill -0 3495 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3495 found at Fri Jan 8 02:43:46 EST 2016 selfserv_9591 with PID 3495 started at Fri Jan 8 02:43:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1071: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 3495 at Fri Jan 8 02:43:47 EST 2016 kill -USR1 3495 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3495 killed at Fri Jan 8 02:43:47 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:43:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:43:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:43:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1072: Waiting for Server - FAILED kill -0 3564 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3564 found at Fri Jan 8 02:43:53 EST 2016 selfserv_9591 with PID 3564 started at Fri Jan 8 02:43:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1073: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3564 at Fri Jan 8 02:43:54 EST 2016 kill -USR1 3564 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3564 killed at Fri Jan 8 02:43:54 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:43:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:43:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:43:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1074: Waiting for Server - FAILED kill -0 3632 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3632 found at Fri Jan 8 02:44:00 EST 2016 selfserv_9591 with PID 3632 started at Fri Jan 8 02:44:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1075: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 3632 at Fri Jan 8 02:44:00 EST 2016 kill -USR1 3632 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3632 killed at Fri Jan 8 02:44:01 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:44:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:44:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:44:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1076: Waiting for Server - FAILED kill -0 3712 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3712 found at Fri Jan 8 02:44:07 EST 2016 selfserv_9591 with PID 3712 started at Fri Jan 8 02:44:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1077: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 3712 at Fri Jan 8 02:44:07 EST 2016 kill -USR1 3712 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3712 killed at Fri Jan 8 02:44:08 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:44:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:44:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:44:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1078: Waiting for Server - FAILED kill -0 3781 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3781 found at Fri Jan 8 02:44:14 EST 2016 selfserv_9591 with PID 3781 started at Fri Jan 8 02:44:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1079: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 3781 at Fri Jan 8 02:44:14 EST 2016 kill -USR1 3781 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3781 killed at Fri Jan 8 02:44:15 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:44:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:44:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:44:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1080: Waiting for Server - FAILED kill -0 3849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3849 found at Fri Jan 8 02:44:21 EST 2016 selfserv_9591 with PID 3849 started at Fri Jan 8 02:44:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1081: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 3849 at Fri Jan 8 02:44:21 EST 2016 kill -USR1 3849 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3849 killed at Fri Jan 8 02:44:22 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:44:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:44:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:44:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1082: Waiting for Server - FAILED kill -0 3929 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3929 found at Fri Jan 8 02:44:28 EST 2016 selfserv_9591 with PID 3929 started at Fri Jan 8 02:44:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1083: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 3929 at Fri Jan 8 02:44:28 EST 2016 kill -USR1 3929 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3929 killed at Fri Jan 8 02:44:29 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:44:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:44:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:44:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1084: Waiting for Server - FAILED kill -0 3998 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3998 found at Fri Jan 8 02:44:35 EST 2016 selfserv_9591 with PID 3998 started at Fri Jan 8 02:44:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1085: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3998 at Fri Jan 8 02:44:35 EST 2016 kill -USR1 3998 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3998 killed at Fri Jan 8 02:44:35 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:44:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:44:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:44:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1086: Waiting for Server - FAILED kill -0 4066 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4066 found at Fri Jan 8 02:44:41 EST 2016 selfserv_9591 with PID 4066 started at Fri Jan 8 02:44:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1087: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 4066 at Fri Jan 8 02:44:42 EST 2016 kill -USR1 4066 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4066 killed at Fri Jan 8 02:44:42 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:44:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:44:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:44:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1088: Waiting for Server - FAILED kill -0 4146 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4146 found at Fri Jan 8 02:44:48 EST 2016 selfserv_9591 with PID 4146 started at Fri Jan 8 02:44:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1089: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4146 at Fri Jan 8 02:44:49 EST 2016 kill -USR1 4146 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4146 killed at Fri Jan 8 02:44:49 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:44:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:44:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:44:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1090: Waiting for Server - FAILED kill -0 4215 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4215 found at Fri Jan 8 02:44:55 EST 2016 selfserv_9591 with PID 4215 started at Fri Jan 8 02:44:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1091: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4215 at Fri Jan 8 02:44:56 EST 2016 kill -USR1 4215 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4215 killed at Fri Jan 8 02:44:56 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:44:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:44:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:45:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1092: Waiting for Server - FAILED kill -0 4283 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4283 found at Fri Jan 8 02:45:02 EST 2016 selfserv_9591 with PID 4283 started at Fri Jan 8 02:45:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1093: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4283 at Fri Jan 8 02:45:03 EST 2016 kill -USR1 4283 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4283 killed at Fri Jan 8 02:45:03 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:45:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:45:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:45:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1094: Waiting for Server - FAILED kill -0 4363 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4363 found at Fri Jan 8 02:45:09 EST 2016 selfserv_9591 with PID 4363 started at Fri Jan 8 02:45:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1095: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4363 at Fri Jan 8 02:45:10 EST 2016 kill -USR1 4363 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4363 killed at Fri Jan 8 02:45:10 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:45:10 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:45:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:45:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1096: Waiting for Server - FAILED kill -0 4432 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4432 found at Fri Jan 8 02:45:16 EST 2016 selfserv_9591 with PID 4432 started at Fri Jan 8 02:45:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1097: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4432 at Fri Jan 8 02:45:17 EST 2016 kill -USR1 4432 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4432 killed at Fri Jan 8 02:45:17 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:45:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:45:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:45:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1098: Waiting for Server - FAILED kill -0 4500 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4500 found at Fri Jan 8 02:45:23 EST 2016 selfserv_9591 with PID 4500 started at Fri Jan 8 02:45:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1099: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4500 at Fri Jan 8 02:45:23 EST 2016 kill -USR1 4500 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4500 killed at Fri Jan 8 02:45:24 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:45:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:45:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:45:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1100: Waiting for Server - FAILED kill -0 4580 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4580 found at Fri Jan 8 02:45:30 EST 2016 selfserv_9591 with PID 4580 started at Fri Jan 8 02:45:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1101: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4580 at Fri Jan 8 02:45:30 EST 2016 kill -USR1 4580 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4580 killed at Fri Jan 8 02:45:31 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:45:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:45:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:45:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1102: Waiting for Server - FAILED kill -0 4649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4649 found at Fri Jan 8 02:45:37 EST 2016 selfserv_9591 with PID 4649 started at Fri Jan 8 02:45:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1103: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4649 at Fri Jan 8 02:45:37 EST 2016 kill -USR1 4649 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4649 killed at Fri Jan 8 02:45:38 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:45:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:45:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:45:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1104: Waiting for Server - FAILED kill -0 4717 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4717 found at Fri Jan 8 02:45:44 EST 2016 selfserv_9591 with PID 4717 started at Fri Jan 8 02:45:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1105: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4717 at Fri Jan 8 02:45:44 EST 2016 kill -USR1 4717 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4717 killed at Fri Jan 8 02:45:45 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:45:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:45:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:45:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1106: Waiting for Server - FAILED kill -0 4797 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4797 found at Fri Jan 8 02:45:51 EST 2016 selfserv_9591 with PID 4797 started at Fri Jan 8 02:45:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1107: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4797 at Fri Jan 8 02:45:51 EST 2016 kill -USR1 4797 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4797 killed at Fri Jan 8 02:45:52 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:45:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:45:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:45:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1108: Waiting for Server - FAILED kill -0 4866 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4866 found at Fri Jan 8 02:45:58 EST 2016 selfserv_9591 with PID 4866 started at Fri Jan 8 02:45:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1109: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4866 at Fri Jan 8 02:45:58 EST 2016 kill -USR1 4866 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4866 killed at Fri Jan 8 02:45:58 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:45:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:45:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:46:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1110: Waiting for Server - FAILED kill -0 4934 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4934 found at Fri Jan 8 02:46:04 EST 2016 selfserv_9591 with PID 4934 started at Fri Jan 8 02:46:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1111: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4934 at Fri Jan 8 02:46:05 EST 2016 kill -USR1 4934 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4934 killed at Fri Jan 8 02:46:05 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:46:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:46:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:46:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1112: Waiting for Server - FAILED kill -0 5014 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5014 found at Fri Jan 8 02:46:11 EST 2016 selfserv_9591 with PID 5014 started at Fri Jan 8 02:46:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1113: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5014 at Fri Jan 8 02:46:12 EST 2016 kill -USR1 5014 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5014 killed at Fri Jan 8 02:46:12 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:46:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:46:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:46:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1114: Waiting for Server - FAILED kill -0 5083 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5083 found at Fri Jan 8 02:46:18 EST 2016 selfserv_9591 with PID 5083 started at Fri Jan 8 02:46:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1115: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5083 at Fri Jan 8 02:46:19 EST 2016 kill -USR1 5083 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5083 killed at Fri Jan 8 02:46:19 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:46:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:46:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:46:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1116: Waiting for Server - FAILED kill -0 5151 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5151 found at Fri Jan 8 02:46:25 EST 2016 selfserv_9591 with PID 5151 started at Fri Jan 8 02:46:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1117: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5151 at Fri Jan 8 02:46:26 EST 2016 kill -USR1 5151 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5151 killed at Fri Jan 8 02:46:26 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:46:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:46:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:46:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1118: Waiting for Server - FAILED kill -0 5231 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5231 found at Fri Jan 8 02:46:32 EST 2016 selfserv_9591 with PID 5231 started at Fri Jan 8 02:46:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1119: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5231 at Fri Jan 8 02:46:33 EST 2016 kill -USR1 5231 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5231 killed at Fri Jan 8 02:46:33 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:46:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:46:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:46:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1120: Waiting for Server - FAILED kill -0 5300 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5300 found at Fri Jan 8 02:46:39 EST 2016 selfserv_9591 with PID 5300 started at Fri Jan 8 02:46:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1121: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5300 at Fri Jan 8 02:46:39 EST 2016 kill -USR1 5300 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5300 killed at Fri Jan 8 02:46:40 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:46:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:46:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:46:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1122: Waiting for Server - FAILED kill -0 5368 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5368 found at Fri Jan 8 02:46:46 EST 2016 selfserv_9591 with PID 5368 started at Fri Jan 8 02:46:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1123: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5368 at Fri Jan 8 02:46:46 EST 2016 kill -USR1 5368 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5368 killed at Fri Jan 8 02:46:47 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:46:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:46:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:46:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1124: Waiting for Server - FAILED kill -0 5448 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5448 found at Fri Jan 8 02:46:53 EST 2016 selfserv_9591 with PID 5448 started at Fri Jan 8 02:46:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1125: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5448 at Fri Jan 8 02:46:53 EST 2016 kill -USR1 5448 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5448 killed at Fri Jan 8 02:46:54 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:46:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:46:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:46:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1126: Waiting for Server - FAILED kill -0 5517 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5517 found at Fri Jan 8 02:47:00 EST 2016 selfserv_9591 with PID 5517 started at Fri Jan 8 02:47:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1127: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5517 at Fri Jan 8 02:47:00 EST 2016 kill -USR1 5517 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5517 killed at Fri Jan 8 02:47:01 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:47:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:47:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:47:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1128: Waiting for Server - FAILED kill -0 5585 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5585 found at Fri Jan 8 02:47:07 EST 2016 selfserv_9591 with PID 5585 started at Fri Jan 8 02:47:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1129: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5585 at Fri Jan 8 02:47:07 EST 2016 kill -USR1 5585 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5585 killed at Fri Jan 8 02:47:08 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:47:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:47:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:47:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1130: Waiting for Server - FAILED kill -0 5667 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5667 found at Fri Jan 8 02:47:14 EST 2016 selfserv_9591 with PID 5667 started at Fri Jan 8 02:47:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1131: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5667 at Fri Jan 8 02:47:14 EST 2016 kill -USR1 5667 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5667 killed at Fri Jan 8 02:47:14 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:47:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:47:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:47:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1132: Waiting for Server - FAILED kill -0 5736 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5736 found at Fri Jan 8 02:47:20 EST 2016 selfserv_9591 with PID 5736 started at Fri Jan 8 02:47:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1133: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5736 at Fri Jan 8 02:47:21 EST 2016 kill -USR1 5736 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5736 killed at Fri Jan 8 02:47:21 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:47:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:47:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:47:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1134: Waiting for Server - FAILED kill -0 5804 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5804 found at Fri Jan 8 02:47:27 EST 2016 selfserv_9591 with PID 5804 started at Fri Jan 8 02:47:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1135: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5804 at Fri Jan 8 02:47:28 EST 2016 kill -USR1 5804 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5804 killed at Fri Jan 8 02:47:28 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:47:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:47:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:47:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1136: Waiting for Server - FAILED kill -0 5884 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5884 found at Fri Jan 8 02:47:34 EST 2016 selfserv_9591 with PID 5884 started at Fri Jan 8 02:47:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1137: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5884 at Fri Jan 8 02:47:35 EST 2016 kill -USR1 5884 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5884 killed at Fri Jan 8 02:47:35 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:47:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:47:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:47:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1138: Waiting for Server - FAILED kill -0 5953 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5953 found at Fri Jan 8 02:47:41 EST 2016 selfserv_9591 with PID 5953 started at Fri Jan 8 02:47:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1139: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5953 at Fri Jan 8 02:47:42 EST 2016 kill -USR1 5953 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5953 killed at Fri Jan 8 02:47:42 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:47:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:47:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:47:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1140: Waiting for Server - FAILED kill -0 6021 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6021 found at Fri Jan 8 02:47:48 EST 2016 selfserv_9591 with PID 6021 started at Fri Jan 8 02:47:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1141: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6021 at Fri Jan 8 02:47:49 EST 2016 kill -USR1 6021 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6021 killed at Fri Jan 8 02:47:49 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:47:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:47:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:47:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1142: Waiting for Server - FAILED kill -0 6101 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6101 found at Fri Jan 8 02:47:55 EST 2016 selfserv_9591 with PID 6101 started at Fri Jan 8 02:47:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6101 at Fri Jan 8 02:47:56 EST 2016 kill -USR1 6101 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6101 killed at Fri Jan 8 02:47:56 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:47:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:47:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:48:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1144: Waiting for Server - FAILED kill -0 6170 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6170 found at Fri Jan 8 02:48:02 EST 2016 selfserv_9591 with PID 6170 started at Fri Jan 8 02:48:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1145: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6170 at Fri Jan 8 02:48:02 EST 2016 kill -USR1 6170 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6170 killed at Fri Jan 8 02:48:03 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:48:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:48:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:48:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1146: Waiting for Server - FAILED kill -0 6238 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6238 found at Fri Jan 8 02:48:09 EST 2016 selfserv_9591 with PID 6238 started at Fri Jan 8 02:48:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1147: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6238 at Fri Jan 8 02:48:09 EST 2016 kill -USR1 6238 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6238 killed at Fri Jan 8 02:48:10 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:48:10 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:48:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:48:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1148: Waiting for Server - FAILED kill -0 6319 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6319 found at Fri Jan 8 02:48:16 EST 2016 selfserv_9591 with PID 6319 started at Fri Jan 8 02:48:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1149: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6319 at Fri Jan 8 02:48:16 EST 2016 kill -USR1 6319 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6319 killed at Fri Jan 8 02:48:17 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:48:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:48:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:48:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1150: Waiting for Server - FAILED kill -0 6387 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6387 found at Fri Jan 8 02:48:23 EST 2016 selfserv_9591 with PID 6387 started at Fri Jan 8 02:48:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1151: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6387 at Fri Jan 8 02:48:23 EST 2016 kill -USR1 6387 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6387 killed at Fri Jan 8 02:48:24 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:48:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:48:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:48:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1152: Waiting for Server - FAILED kill -0 6455 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6455 found at Fri Jan 8 02:48:30 EST 2016 selfserv_9591 with PID 6455 started at Fri Jan 8 02:48:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1153: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6455 at Fri Jan 8 02:48:30 EST 2016 kill -USR1 6455 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6455 killed at Fri Jan 8 02:48:31 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:48:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:48:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:48:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1154: Waiting for Server - FAILED kill -0 6536 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6536 found at Fri Jan 8 02:48:37 EST 2016 selfserv_9591 with PID 6536 started at Fri Jan 8 02:48:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1155: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6536 at Fri Jan 8 02:48:37 EST 2016 kill -USR1 6536 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6536 killed at Fri Jan 8 02:48:37 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:48:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:48:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:48:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1156: Waiting for Server - FAILED kill -0 6604 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6604 found at Fri Jan 8 02:48:43 EST 2016 selfserv_9591 with PID 6604 started at Fri Jan 8 02:48:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1157: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6604 at Fri Jan 8 02:48:44 EST 2016 kill -USR1 6604 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6604 killed at Fri Jan 8 02:48:44 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:48:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:48:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:48:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1158: Waiting for Server - FAILED kill -0 6672 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6672 found at Fri Jan 8 02:48:50 EST 2016 selfserv_9591 with PID 6672 started at Fri Jan 8 02:48:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1159: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6672 at Fri Jan 8 02:48:51 EST 2016 kill -USR1 6672 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6672 killed at Fri Jan 8 02:48:51 EST 2016 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv_9591 starting at Fri Jan 8 02:48:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:48:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:48:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1160: Waiting for Server - FAILED kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:48:57 EST 2016 selfserv_9591 with PID 6748 started at Fri Jan 8 02:48:57 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:48:58 EST 2016 ssl.sh: #1161: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:48:58 EST 2016 ssl.sh: #1162: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:48:59 EST 2016 ssl.sh: #1163: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:48:59 EST 2016 ssl.sh: #1164: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:00 EST 2016 ssl.sh: #1165: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:01 EST 2016 ssl.sh: #1166: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:01 EST 2016 ssl.sh: #1167: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:02 EST 2016 ssl.sh: #1168: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:02 EST 2016 ssl.sh: #1169: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:03 EST 2016 ssl.sh: #1170: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:03 EST 2016 ssl.sh: #1171: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:04 EST 2016 ssl.sh: #1172: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:04 EST 2016 ssl.sh: #1173: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:05 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1174: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:06 EST 2016 ssl.sh: #1175: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:06 EST 2016 ssl.sh: #1176: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:07 EST 2016 ssl.sh: #1177: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:07 EST 2016 ssl.sh: #1178: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:08 EST 2016 ssl.sh: #1179: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:08 EST 2016 ssl.sh: #1180: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:09 EST 2016 ssl.sh: #1181: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:09 EST 2016 ssl.sh: #1182: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:10 EST 2016 ssl.sh: #1183: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:10 EST 2016 ssl.sh: #1184: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:11 EST 2016 ssl.sh: #1185: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:12 EST 2016 ssl.sh: #1186: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:12 EST 2016 ssl.sh: #1187: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:13 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1188: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:13 EST 2016 ssl.sh: #1189: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:14 EST 2016 ssl.sh: #1190: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:14 EST 2016 ssl.sh: #1191: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:15 EST 2016 ssl.sh: #1192: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:15 EST 2016 ssl.sh: #1193: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:16 EST 2016 ssl.sh: #1194: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:17 EST 2016 ssl.sh: #1195: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:17 EST 2016 ssl.sh: #1196: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:18 EST 2016 ssl.sh: #1197: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:18 EST 2016 ssl.sh: #1198: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:19 EST 2016 ssl.sh: #1199: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:19 EST 2016 ssl.sh: #1200: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6748 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6748 found at Fri Jan 8 02:49:20 EST 2016 ssl.sh: #1201: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 6748 at Fri Jan 8 02:49:20 EST 2016 kill -USR1 6748 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6748 killed at Fri Jan 8 02:49:20 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:49:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:49:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:49:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1202: Waiting for Server - FAILED kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:26 EST 2016 selfserv_9591 with PID 8187 started at Fri Jan 8 02:49:26 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:27 EST 2016 ssl.sh: #1203: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:27 EST 2016 ssl.sh: #1204: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:28 EST 2016 ssl.sh: #1205: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:29 EST 2016 ssl.sh: #1206: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:29 EST 2016 ssl.sh: #1207: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:30 EST 2016 ssl.sh: #1208: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:30 EST 2016 ssl.sh: #1209: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:31 EST 2016 ssl.sh: #1210: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:31 EST 2016 ssl.sh: #1211: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:32 EST 2016 ssl.sh: #1212: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:32 EST 2016 ssl.sh: #1213: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:33 EST 2016 ssl.sh: #1214: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:34 EST 2016 ssl.sh: #1215: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:34 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1216: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:35 EST 2016 ssl.sh: #1217: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:35 EST 2016 ssl.sh: #1218: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:36 EST 2016 ssl.sh: #1219: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:36 EST 2016 ssl.sh: #1220: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:37 EST 2016 ssl.sh: #1221: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:37 EST 2016 ssl.sh: #1222: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:38 EST 2016 ssl.sh: #1223: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:39 EST 2016 ssl.sh: #1224: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:39 EST 2016 ssl.sh: #1225: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:40 EST 2016 ssl.sh: #1226: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:40 EST 2016 ssl.sh: #1227: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:41 EST 2016 ssl.sh: #1228: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:41 EST 2016 ssl.sh: #1229: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:42 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1230: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:42 EST 2016 ssl.sh: #1231: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:43 EST 2016 ssl.sh: #1232: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:44 EST 2016 ssl.sh: #1233: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:44 EST 2016 ssl.sh: #1234: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:45 EST 2016 ssl.sh: #1235: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:45 EST 2016 ssl.sh: #1236: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:46 EST 2016 ssl.sh: #1237: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:46 EST 2016 ssl.sh: #1238: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:47 EST 2016 ssl.sh: #1239: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:47 EST 2016 ssl.sh: #1240: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:48 EST 2016 ssl.sh: #1241: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:49 EST 2016 ssl.sh: #1242: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8187 found at Fri Jan 8 02:49:49 EST 2016 ssl.sh: #1243: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 8187 at Fri Jan 8 02:49:49 EST 2016 kill -USR1 8187 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8187 killed at Fri Jan 8 02:49:50 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:49:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:49:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:49:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1244: Waiting for Server - FAILED kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:49:56 EST 2016 selfserv_9591 with PID 9622 started at Fri Jan 8 02:49:56 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:49:56 EST 2016 ssl.sh: #1245: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:49:57 EST 2016 ssl.sh: #1246: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:49:57 EST 2016 ssl.sh: #1247: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:49:58 EST 2016 ssl.sh: #1248: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:49:58 EST 2016 ssl.sh: #1249: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:49:59 EST 2016 ssl.sh: #1250: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:49:59 EST 2016 ssl.sh: #1251: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:00 EST 2016 ssl.sh: #1252: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:01 EST 2016 ssl.sh: #1253: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:01 EST 2016 ssl.sh: #1254: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:02 EST 2016 ssl.sh: #1255: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:02 EST 2016 ssl.sh: #1256: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:03 EST 2016 ssl.sh: #1257: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:03 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1258: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:04 EST 2016 ssl.sh: #1259: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:04 EST 2016 ssl.sh: #1260: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:05 EST 2016 ssl.sh: #1261: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:06 EST 2016 ssl.sh: #1262: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:06 EST 2016 ssl.sh: #1263: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:07 EST 2016 ssl.sh: #1264: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:07 EST 2016 ssl.sh: #1265: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:08 EST 2016 ssl.sh: #1266: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:08 EST 2016 ssl.sh: #1267: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:09 EST 2016 ssl.sh: #1268: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:09 EST 2016 ssl.sh: #1269: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:10 EST 2016 ssl.sh: #1270: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:11 EST 2016 ssl.sh: #1271: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:11 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1272: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:12 EST 2016 ssl.sh: #1273: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:12 EST 2016 ssl.sh: #1274: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:13 EST 2016 ssl.sh: #1275: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:13 EST 2016 ssl.sh: #1276: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:14 EST 2016 ssl.sh: #1277: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:14 EST 2016 ssl.sh: #1278: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:15 EST 2016 ssl.sh: #1279: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:16 EST 2016 ssl.sh: #1280: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:16 EST 2016 ssl.sh: #1281: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:17 EST 2016 ssl.sh: #1282: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:17 EST 2016 ssl.sh: #1283: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:18 EST 2016 ssl.sh: #1284: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9622 found at Fri Jan 8 02:50:18 EST 2016 ssl.sh: #1285: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 9622 at Fri Jan 8 02:50:18 EST 2016 kill -USR1 9622 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9622 killed at Fri Jan 8 02:50:19 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:50:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:50:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:50:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1286: Waiting for Server - FAILED kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:25 EST 2016 selfserv_9591 with PID 11062 started at Fri Jan 8 02:50:25 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:25 EST 2016 ssl.sh: #1287: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:26 EST 2016 ssl.sh: #1288: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:26 EST 2016 ssl.sh: #1289: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:27 EST 2016 ssl.sh: #1290: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:28 EST 2016 ssl.sh: #1291: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:28 EST 2016 ssl.sh: #1292: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:29 EST 2016 ssl.sh: #1293: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:29 EST 2016 ssl.sh: #1294: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:30 EST 2016 ssl.sh: #1295: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:30 EST 2016 ssl.sh: #1296: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:31 EST 2016 ssl.sh: #1297: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:32 EST 2016 ssl.sh: #1298: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:32 EST 2016 ssl.sh: #1299: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:33 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1300: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:33 EST 2016 ssl.sh: #1301: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:34 EST 2016 ssl.sh: #1302: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:34 EST 2016 ssl.sh: #1303: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:35 EST 2016 ssl.sh: #1304: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:35 EST 2016 ssl.sh: #1305: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:36 EST 2016 ssl.sh: #1306: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:36 EST 2016 ssl.sh: #1307: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:37 EST 2016 ssl.sh: #1308: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:38 EST 2016 ssl.sh: #1309: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:38 EST 2016 ssl.sh: #1310: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:39 EST 2016 ssl.sh: #1311: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:39 EST 2016 ssl.sh: #1312: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:40 EST 2016 ssl.sh: #1313: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:40 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1314: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:41 EST 2016 ssl.sh: #1315: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:41 EST 2016 ssl.sh: #1316: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:42 EST 2016 ssl.sh: #1317: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:43 EST 2016 ssl.sh: #1318: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:43 EST 2016 ssl.sh: #1319: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:44 EST 2016 ssl.sh: #1320: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:44 EST 2016 ssl.sh: #1321: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:45 EST 2016 ssl.sh: #1322: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:45 EST 2016 ssl.sh: #1323: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:46 EST 2016 ssl.sh: #1324: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:46 EST 2016 ssl.sh: #1325: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:47 EST 2016 ssl.sh: #1326: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11062 found at Fri Jan 8 02:50:48 EST 2016 ssl.sh: #1327: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 11062 at Fri Jan 8 02:50:48 EST 2016 kill -USR1 11062 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11062 killed at Fri Jan 8 02:50:48 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:50:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:50:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:50:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1328: Waiting for Server - FAILED kill -0 12501 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12501 found at Fri Jan 8 02:50:54 EST 2016 selfserv_9591 with PID 12501 started at Fri Jan 8 02:50:54 EST 2016 trying to kill selfserv_9591 with PID 12501 at Fri Jan 8 02:50:54 EST 2016 kill -USR1 12501 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12501 killed at Fri Jan 8 02:50:54 EST 2016 selfserv_9591 starting at Fri Jan 8 02:50:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:50:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:51:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1329: Waiting for Server - FAILED kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:00 EST 2016 selfserv_9591 with PID 12556 started at Fri Jan 8 02:51:00 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:01 EST 2016 ssl.sh: #1330: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:02 EST 2016 ssl.sh: #1331: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:02 EST 2016 ssl.sh: #1332: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:03 EST 2016 ssl.sh: #1333: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:03 EST 2016 ssl.sh: #1334: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:04 EST 2016 ssl.sh: #1335: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:04 EST 2016 ssl.sh: #1336: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:05 EST 2016 ssl.sh: #1337: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:05 EST 2016 ssl.sh: #1338: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:06 EST 2016 ssl.sh: #1339: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:07 EST 2016 ssl.sh: #1340: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:07 EST 2016 ssl.sh: #1341: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:08 EST 2016 ssl.sh: #1342: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:08 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1343: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:09 EST 2016 ssl.sh: #1344: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:09 EST 2016 ssl.sh: #1345: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:10 EST 2016 ssl.sh: #1346: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:10 EST 2016 ssl.sh: #1347: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:11 EST 2016 ssl.sh: #1348: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:11 EST 2016 ssl.sh: #1349: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:12 EST 2016 ssl.sh: #1350: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:13 EST 2016 ssl.sh: #1351: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:13 EST 2016 ssl.sh: #1352: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:14 EST 2016 ssl.sh: #1353: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:14 EST 2016 ssl.sh: #1354: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:15 EST 2016 ssl.sh: #1355: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:15 EST 2016 ssl.sh: #1356: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:16 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1357: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:16 EST 2016 ssl.sh: #1358: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:17 EST 2016 ssl.sh: #1359: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:18 EST 2016 ssl.sh: #1360: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:18 EST 2016 ssl.sh: #1361: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:19 EST 2016 ssl.sh: #1362: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:19 EST 2016 ssl.sh: #1363: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:20 EST 2016 ssl.sh: #1364: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:20 EST 2016 ssl.sh: #1365: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:21 EST 2016 ssl.sh: #1366: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:21 EST 2016 ssl.sh: #1367: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:22 EST 2016 ssl.sh: #1368: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:23 EST 2016 ssl.sh: #1369: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12556 found at Fri Jan 8 02:51:23 EST 2016 ssl.sh: #1370: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 12556 at Fri Jan 8 02:51:23 EST 2016 kill -USR1 12556 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12556 killed at Fri Jan 8 02:51:24 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:51:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:51:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:51:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1371: Waiting for Server - FAILED kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:30 EST 2016 selfserv_9591 with PID 13991 started at Fri Jan 8 02:51:30 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:30 EST 2016 ssl.sh: #1372: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:31 EST 2016 ssl.sh: #1373: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:31 EST 2016 ssl.sh: #1374: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:32 EST 2016 ssl.sh: #1375: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:32 EST 2016 ssl.sh: #1376: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:33 EST 2016 ssl.sh: #1377: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:33 EST 2016 ssl.sh: #1378: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:34 EST 2016 ssl.sh: #1379: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:35 EST 2016 ssl.sh: #1380: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:35 EST 2016 ssl.sh: #1381: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:36 EST 2016 ssl.sh: #1382: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:36 EST 2016 ssl.sh: #1383: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:37 EST 2016 ssl.sh: #1384: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:37 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1385: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:38 EST 2016 ssl.sh: #1386: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:39 EST 2016 ssl.sh: #1387: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:39 EST 2016 ssl.sh: #1388: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:40 EST 2016 ssl.sh: #1389: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:40 EST 2016 ssl.sh: #1390: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:41 EST 2016 ssl.sh: #1391: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:41 EST 2016 ssl.sh: #1392: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:42 EST 2016 ssl.sh: #1393: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:42 EST 2016 ssl.sh: #1394: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:43 EST 2016 ssl.sh: #1395: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:44 EST 2016 ssl.sh: #1396: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:44 EST 2016 ssl.sh: #1397: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:45 EST 2016 ssl.sh: #1398: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:45 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1399: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:46 EST 2016 ssl.sh: #1400: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:46 EST 2016 ssl.sh: #1401: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:47 EST 2016 ssl.sh: #1402: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:47 EST 2016 ssl.sh: #1403: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:48 EST 2016 ssl.sh: #1404: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:48 EST 2016 ssl.sh: #1405: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:49 EST 2016 ssl.sh: #1406: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:50 EST 2016 ssl.sh: #1407: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:50 EST 2016 ssl.sh: #1408: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:51 EST 2016 ssl.sh: #1409: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:51 EST 2016 ssl.sh: #1410: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:52 EST 2016 ssl.sh: #1411: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13991 found at Fri Jan 8 02:51:52 EST 2016 ssl.sh: #1412: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13991 at Fri Jan 8 02:51:53 EST 2016 kill -USR1 13991 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13991 killed at Fri Jan 8 02:51:53 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:51:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:51:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:51:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1413: Waiting for Server - FAILED kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:51:59 EST 2016 selfserv_9591 with PID 15427 started at Fri Jan 8 02:51:59 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:51:59 EST 2016 ssl.sh: #1414: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:00 EST 2016 ssl.sh: #1415: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:01 EST 2016 ssl.sh: #1416: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:01 EST 2016 ssl.sh: #1417: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:02 EST 2016 ssl.sh: #1418: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:02 EST 2016 ssl.sh: #1419: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:03 EST 2016 ssl.sh: #1420: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:03 EST 2016 ssl.sh: #1421: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:04 EST 2016 ssl.sh: #1422: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:04 EST 2016 ssl.sh: #1423: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:05 EST 2016 ssl.sh: #1424: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:06 EST 2016 ssl.sh: #1425: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:06 EST 2016 ssl.sh: #1426: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:07 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1427: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:07 EST 2016 ssl.sh: #1428: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:08 EST 2016 ssl.sh: #1429: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:08 EST 2016 ssl.sh: #1430: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:09 EST 2016 ssl.sh: #1431: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:09 EST 2016 ssl.sh: #1432: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:10 EST 2016 ssl.sh: #1433: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:11 EST 2016 ssl.sh: #1434: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:11 EST 2016 ssl.sh: #1435: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:12 EST 2016 ssl.sh: #1436: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:12 EST 2016 ssl.sh: #1437: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:13 EST 2016 ssl.sh: #1438: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:13 EST 2016 ssl.sh: #1439: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:14 EST 2016 ssl.sh: #1440: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:14 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1441: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:15 EST 2016 ssl.sh: #1442: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:16 EST 2016 ssl.sh: #1443: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:16 EST 2016 ssl.sh: #1444: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:17 EST 2016 ssl.sh: #1445: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:17 EST 2016 ssl.sh: #1446: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:18 EST 2016 ssl.sh: #1447: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:18 EST 2016 ssl.sh: #1448: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:19 EST 2016 ssl.sh: #1449: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:19 EST 2016 ssl.sh: #1450: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:20 EST 2016 ssl.sh: #1451: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:21 EST 2016 ssl.sh: #1452: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:21 EST 2016 ssl.sh: #1453: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15427 found at Fri Jan 8 02:52:22 EST 2016 ssl.sh: #1454: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 15427 at Fri Jan 8 02:52:22 EST 2016 kill -USR1 15427 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15427 killed at Fri Jan 8 02:52:22 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:52:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:52:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:52:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1455: Waiting for Server - FAILED kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:28 EST 2016 selfserv_9591 with PID 16864 started at Fri Jan 8 02:52:28 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:29 EST 2016 ssl.sh: #1456: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:29 EST 2016 ssl.sh: #1457: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:30 EST 2016 ssl.sh: #1458: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:30 EST 2016 ssl.sh: #1459: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:31 EST 2016 ssl.sh: #1460: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:31 EST 2016 ssl.sh: #1461: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:32 EST 2016 ssl.sh: #1462: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:33 EST 2016 ssl.sh: #1463: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:33 EST 2016 ssl.sh: #1464: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:34 EST 2016 ssl.sh: #1465: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:34 EST 2016 ssl.sh: #1466: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:35 EST 2016 ssl.sh: #1467: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:35 EST 2016 ssl.sh: #1468: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:36 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1469: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:36 EST 2016 ssl.sh: #1470: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:37 EST 2016 ssl.sh: #1471: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:38 EST 2016 ssl.sh: #1472: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:38 EST 2016 ssl.sh: #1473: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:39 EST 2016 ssl.sh: #1474: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:39 EST 2016 ssl.sh: #1475: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:40 EST 2016 ssl.sh: #1476: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:40 EST 2016 ssl.sh: #1477: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:41 EST 2016 ssl.sh: #1478: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:41 EST 2016 ssl.sh: #1479: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:42 EST 2016 ssl.sh: #1480: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:43 EST 2016 ssl.sh: #1481: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:43 EST 2016 ssl.sh: #1482: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:44 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1483: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:44 EST 2016 ssl.sh: #1484: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:45 EST 2016 ssl.sh: #1485: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:45 EST 2016 ssl.sh: #1486: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:46 EST 2016 ssl.sh: #1487: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:46 EST 2016 ssl.sh: #1488: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:47 EST 2016 ssl.sh: #1489: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:48 EST 2016 ssl.sh: #1490: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:48 EST 2016 ssl.sh: #1491: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:49 EST 2016 ssl.sh: #1492: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:49 EST 2016 ssl.sh: #1493: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:50 EST 2016 ssl.sh: #1494: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:50 EST 2016 ssl.sh: #1495: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16864 found at Fri Jan 8 02:52:51 EST 2016 ssl.sh: #1496: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 16864 at Fri Jan 8 02:52:51 EST 2016 kill -USR1 16864 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16864 killed at Fri Jan 8 02:52:51 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:52:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:52:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:52:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1497: Waiting for Server - FAILED kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:52:57 EST 2016 selfserv_9591 with PID 18299 started at Fri Jan 8 02:52:57 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:52:58 EST 2016 ssl.sh: #1498: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:52:58 EST 2016 ssl.sh: #1499: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:52:59 EST 2016 ssl.sh: #1500: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:00 EST 2016 ssl.sh: #1501: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:00 EST 2016 ssl.sh: #1502: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:01 EST 2016 ssl.sh: #1503: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:01 EST 2016 ssl.sh: #1504: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:02 EST 2016 ssl.sh: #1505: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:02 EST 2016 ssl.sh: #1506: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:03 EST 2016 ssl.sh: #1507: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:03 EST 2016 ssl.sh: #1508: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:04 EST 2016 ssl.sh: #1509: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:05 EST 2016 ssl.sh: #1510: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:05 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1511: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:06 EST 2016 ssl.sh: #1512: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:06 EST 2016 ssl.sh: #1513: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:07 EST 2016 ssl.sh: #1514: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:07 EST 2016 ssl.sh: #1515: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:08 EST 2016 ssl.sh: #1516: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:08 EST 2016 ssl.sh: #1517: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:09 EST 2016 ssl.sh: #1518: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:10 EST 2016 ssl.sh: #1519: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:10 EST 2016 ssl.sh: #1520: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:11 EST 2016 ssl.sh: #1521: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:11 EST 2016 ssl.sh: #1522: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:12 EST 2016 ssl.sh: #1523: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:12 EST 2016 ssl.sh: #1524: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:13 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1525: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:13 EST 2016 ssl.sh: #1526: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:14 EST 2016 ssl.sh: #1527: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:15 EST 2016 ssl.sh: #1528: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:15 EST 2016 ssl.sh: #1529: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:16 EST 2016 ssl.sh: #1530: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:16 EST 2016 ssl.sh: #1531: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:17 EST 2016 ssl.sh: #1532: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:17 EST 2016 ssl.sh: #1533: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:18 EST 2016 ssl.sh: #1534: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:18 EST 2016 ssl.sh: #1535: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:19 EST 2016 ssl.sh: #1536: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:20 EST 2016 ssl.sh: #1537: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18299 found at Fri Jan 8 02:53:20 EST 2016 ssl.sh: #1538: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 18299 at Fri Jan 8 02:53:20 EST 2016 kill -USR1 18299 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18299 killed at Fri Jan 8 02:53:21 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:53:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:53:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:53:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1539: Waiting for Server - FAILED kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:27 EST 2016 selfserv_9591 with PID 19739 started at Fri Jan 8 02:53:27 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:27 EST 2016 ssl.sh: #1540: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:28 EST 2016 ssl.sh: #1541: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:28 EST 2016 ssl.sh: #1542: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:29 EST 2016 ssl.sh: #1543: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:29 EST 2016 ssl.sh: #1544: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:30 EST 2016 ssl.sh: #1545: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:30 EST 2016 ssl.sh: #1546: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:31 EST 2016 ssl.sh: #1547: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:32 EST 2016 ssl.sh: #1548: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:32 EST 2016 ssl.sh: #1549: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:33 EST 2016 ssl.sh: #1550: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:33 EST 2016 ssl.sh: #1551: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:34 EST 2016 ssl.sh: #1552: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:34 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1553: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:35 EST 2016 ssl.sh: #1554: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:35 EST 2016 ssl.sh: #1555: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:36 EST 2016 ssl.sh: #1556: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:37 EST 2016 ssl.sh: #1557: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:37 EST 2016 ssl.sh: #1558: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:38 EST 2016 ssl.sh: #1559: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:38 EST 2016 ssl.sh: #1560: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:39 EST 2016 ssl.sh: #1561: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:39 EST 2016 ssl.sh: #1562: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:40 EST 2016 ssl.sh: #1563: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:41 EST 2016 ssl.sh: #1564: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:41 EST 2016 ssl.sh: #1565: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:42 EST 2016 ssl.sh: #1566: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:42 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1567: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:43 EST 2016 ssl.sh: #1568: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:43 EST 2016 ssl.sh: #1569: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:44 EST 2016 ssl.sh: #1570: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:44 EST 2016 ssl.sh: #1571: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:45 EST 2016 ssl.sh: #1572: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:45 EST 2016 ssl.sh: #1573: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:46 EST 2016 ssl.sh: #1574: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:47 EST 2016 ssl.sh: #1575: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:47 EST 2016 ssl.sh: #1576: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:48 EST 2016 ssl.sh: #1577: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:48 EST 2016 ssl.sh: #1578: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:49 EST 2016 ssl.sh: #1579: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19739 found at Fri Jan 8 02:53:49 EST 2016 ssl.sh: #1580: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 19739 at Fri Jan 8 02:53:50 EST 2016 kill -USR1 19739 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19739 killed at Fri Jan 8 02:53:50 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:53:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:53:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:53:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1581: Waiting for Server - FAILED kill -0 21176 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21176 found at Fri Jan 8 02:53:56 EST 2016 selfserv_9591 with PID 21176 started at Fri Jan 8 02:53:56 EST 2016 trying to kill selfserv_9591 with PID 21176 at Fri Jan 8 02:53:56 EST 2016 kill -USR1 21176 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21176 killed at Fri Jan 8 02:53:56 EST 2016 selfserv_9591 starting at Fri Jan 8 02:53:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:53:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:54:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1582: Waiting for Server - FAILED kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:02 EST 2016 selfserv_9591 with PID 21230 started at Fri Jan 8 02:54:02 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:03 EST 2016 ssl.sh: #1583: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:03 EST 2016 ssl.sh: #1584: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:04 EST 2016 ssl.sh: #1585: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:05 EST 2016 ssl.sh: #1586: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:05 EST 2016 ssl.sh: #1587: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:06 EST 2016 ssl.sh: #1588: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:06 EST 2016 ssl.sh: #1589: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:07 EST 2016 ssl.sh: #1590: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:07 EST 2016 ssl.sh: #1591: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:08 EST 2016 ssl.sh: #1592: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:08 EST 2016 ssl.sh: #1593: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:09 EST 2016 ssl.sh: #1594: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:10 EST 2016 ssl.sh: #1595: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:10 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1596: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:11 EST 2016 ssl.sh: #1597: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:11 EST 2016 ssl.sh: #1598: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:12 EST 2016 ssl.sh: #1599: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:12 EST 2016 ssl.sh: #1600: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:13 EST 2016 ssl.sh: #1601: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:13 EST 2016 ssl.sh: #1602: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:14 EST 2016 ssl.sh: #1603: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:14 EST 2016 ssl.sh: #1604: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:15 EST 2016 ssl.sh: #1605: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:16 EST 2016 ssl.sh: #1606: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:16 EST 2016 ssl.sh: #1607: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:17 EST 2016 ssl.sh: #1608: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:17 EST 2016 ssl.sh: #1609: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:18 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1610: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:18 EST 2016 ssl.sh: #1611: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:19 EST 2016 ssl.sh: #1612: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:19 EST 2016 ssl.sh: #1613: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:20 EST 2016 ssl.sh: #1614: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:21 EST 2016 ssl.sh: #1615: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:21 EST 2016 ssl.sh: #1616: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:22 EST 2016 ssl.sh: #1617: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:22 EST 2016 ssl.sh: #1618: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:23 EST 2016 ssl.sh: #1619: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:23 EST 2016 ssl.sh: #1620: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:24 EST 2016 ssl.sh: #1621: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:25 EST 2016 ssl.sh: #1622: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21230 found at Fri Jan 8 02:54:25 EST 2016 ssl.sh: #1623: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 21230 at Fri Jan 8 02:54:25 EST 2016 kill -USR1 21230 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21230 killed at Fri Jan 8 02:54:26 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:54:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:54:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:54:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1624: Waiting for Server - FAILED kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:32 EST 2016 selfserv_9591 with PID 22666 started at Fri Jan 8 02:54:32 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:32 EST 2016 ssl.sh: #1625: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:33 EST 2016 ssl.sh: #1626: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:33 EST 2016 ssl.sh: #1627: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:34 EST 2016 ssl.sh: #1628: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:34 EST 2016 ssl.sh: #1629: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:35 EST 2016 ssl.sh: #1630: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:35 EST 2016 ssl.sh: #1631: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:36 EST 2016 ssl.sh: #1632: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:37 EST 2016 ssl.sh: #1633: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:37 EST 2016 ssl.sh: #1634: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:38 EST 2016 ssl.sh: #1635: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:38 EST 2016 ssl.sh: #1636: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:39 EST 2016 ssl.sh: #1637: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:39 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1638: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:40 EST 2016 ssl.sh: #1639: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:40 EST 2016 ssl.sh: #1640: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:41 EST 2016 ssl.sh: #1641: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:42 EST 2016 ssl.sh: #1642: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:42 EST 2016 ssl.sh: #1643: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:43 EST 2016 ssl.sh: #1644: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:43 EST 2016 ssl.sh: #1645: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:44 EST 2016 ssl.sh: #1646: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:44 EST 2016 ssl.sh: #1647: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:45 EST 2016 ssl.sh: #1648: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:46 EST 2016 ssl.sh: #1649: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:46 EST 2016 ssl.sh: #1650: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:47 EST 2016 ssl.sh: #1651: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:47 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1652: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:48 EST 2016 ssl.sh: #1653: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:48 EST 2016 ssl.sh: #1654: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:49 EST 2016 ssl.sh: #1655: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:49 EST 2016 ssl.sh: #1656: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:50 EST 2016 ssl.sh: #1657: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:50 EST 2016 ssl.sh: #1658: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:51 EST 2016 ssl.sh: #1659: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:52 EST 2016 ssl.sh: #1660: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:52 EST 2016 ssl.sh: #1661: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:53 EST 2016 ssl.sh: #1662: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:53 EST 2016 ssl.sh: #1663: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:54 EST 2016 ssl.sh: #1664: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22666 found at Fri Jan 8 02:54:54 EST 2016 ssl.sh: #1665: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 22666 at Fri Jan 8 02:54:55 EST 2016 kill -USR1 22666 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22666 killed at Fri Jan 8 02:54:55 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:54:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:54:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:55:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1666: Waiting for Server - FAILED kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:01 EST 2016 selfserv_9591 with PID 24104 started at Fri Jan 8 02:55:01 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:01 EST 2016 ssl.sh: #1667: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:02 EST 2016 ssl.sh: #1668: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:03 EST 2016 ssl.sh: #1669: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:03 EST 2016 ssl.sh: #1670: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:04 EST 2016 ssl.sh: #1671: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:04 EST 2016 ssl.sh: #1672: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:05 EST 2016 ssl.sh: #1673: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:05 EST 2016 ssl.sh: #1674: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:06 EST 2016 ssl.sh: #1675: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:06 EST 2016 ssl.sh: #1676: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:07 EST 2016 ssl.sh: #1677: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:08 EST 2016 ssl.sh: #1678: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:08 EST 2016 ssl.sh: #1679: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:09 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1680: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:09 EST 2016 ssl.sh: #1681: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:10 EST 2016 ssl.sh: #1682: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:10 EST 2016 ssl.sh: #1683: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:11 EST 2016 ssl.sh: #1684: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:11 EST 2016 ssl.sh: #1685: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:12 EST 2016 ssl.sh: #1686: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:13 EST 2016 ssl.sh: #1687: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:13 EST 2016 ssl.sh: #1688: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:14 EST 2016 ssl.sh: #1689: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:14 EST 2016 ssl.sh: #1690: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:15 EST 2016 ssl.sh: #1691: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:15 EST 2016 ssl.sh: #1692: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:16 EST 2016 ssl.sh: #1693: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:16 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1694: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:17 EST 2016 ssl.sh: #1695: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:18 EST 2016 ssl.sh: #1696: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:18 EST 2016 ssl.sh: #1697: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:19 EST 2016 ssl.sh: #1698: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:19 EST 2016 ssl.sh: #1699: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:20 EST 2016 ssl.sh: #1700: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:20 EST 2016 ssl.sh: #1701: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:21 EST 2016 ssl.sh: #1702: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:21 EST 2016 ssl.sh: #1703: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:22 EST 2016 ssl.sh: #1704: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:23 EST 2016 ssl.sh: #1705: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:23 EST 2016 ssl.sh: #1706: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24104 found at Fri Jan 8 02:55:24 EST 2016 ssl.sh: #1707: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 24104 at Fri Jan 8 02:55:24 EST 2016 kill -USR1 24104 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24104 killed at Fri Jan 8 02:55:24 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:55:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:55:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:55:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1708: Waiting for Server - FAILED kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:30 EST 2016 selfserv_9591 with PID 25543 started at Fri Jan 8 02:55:30 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:31 EST 2016 ssl.sh: #1709: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:31 EST 2016 ssl.sh: #1710: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:32 EST 2016 ssl.sh: #1711: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:32 EST 2016 ssl.sh: #1712: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:33 EST 2016 ssl.sh: #1713: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:34 EST 2016 ssl.sh: #1714: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:34 EST 2016 ssl.sh: #1715: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:35 EST 2016 ssl.sh: #1716: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:35 EST 2016 ssl.sh: #1717: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:36 EST 2016 ssl.sh: #1718: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:36 EST 2016 ssl.sh: #1719: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:37 EST 2016 ssl.sh: #1720: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:38 EST 2016 ssl.sh: #1721: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:38 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1722: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:39 EST 2016 ssl.sh: #1723: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:39 EST 2016 ssl.sh: #1724: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:40 EST 2016 ssl.sh: #1725: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:40 EST 2016 ssl.sh: #1726: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:41 EST 2016 ssl.sh: #1727: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:41 EST 2016 ssl.sh: #1728: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:42 EST 2016 ssl.sh: #1729: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:42 EST 2016 ssl.sh: #1730: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:43 EST 2016 ssl.sh: #1731: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:44 EST 2016 ssl.sh: #1732: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:44 EST 2016 ssl.sh: #1733: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:45 EST 2016 ssl.sh: #1734: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:45 EST 2016 ssl.sh: #1735: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:46 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1736: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:46 EST 2016 ssl.sh: #1737: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:47 EST 2016 ssl.sh: #1738: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:47 EST 2016 ssl.sh: #1739: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:48 EST 2016 ssl.sh: #1740: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:49 EST 2016 ssl.sh: #1741: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:49 EST 2016 ssl.sh: #1742: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:50 EST 2016 ssl.sh: #1743: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:50 EST 2016 ssl.sh: #1744: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:51 EST 2016 ssl.sh: #1745: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:51 EST 2016 ssl.sh: #1746: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:52 EST 2016 ssl.sh: #1747: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:53 EST 2016 ssl.sh: #1748: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25543 found at Fri Jan 8 02:55:53 EST 2016 ssl.sh: #1749: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 25543 at Fri Jan 8 02:55:53 EST 2016 kill -USR1 25543 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25543 killed at Fri Jan 8 02:55:54 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:55:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:55:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:55:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1750: Waiting for Server - FAILED kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:00 EST 2016 selfserv_9591 with PID 26978 started at Fri Jan 8 02:56:00 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:00 EST 2016 ssl.sh: #1751: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:01 EST 2016 ssl.sh: #1752: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:01 EST 2016 ssl.sh: #1753: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:02 EST 2016 ssl.sh: #1754: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:02 EST 2016 ssl.sh: #1755: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:03 EST 2016 ssl.sh: #1756: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:03 EST 2016 ssl.sh: #1757: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:04 EST 2016 ssl.sh: #1758: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:05 EST 2016 ssl.sh: #1759: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:05 EST 2016 ssl.sh: #1760: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:06 EST 2016 ssl.sh: #1761: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:06 EST 2016 ssl.sh: #1762: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:07 EST 2016 ssl.sh: #1763: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:07 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1764: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:08 EST 2016 ssl.sh: #1765: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:08 EST 2016 ssl.sh: #1766: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:09 EST 2016 ssl.sh: #1767: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:10 EST 2016 ssl.sh: #1768: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:10 EST 2016 ssl.sh: #1769: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:11 EST 2016 ssl.sh: #1770: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:11 EST 2016 ssl.sh: #1771: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:12 EST 2016 ssl.sh: #1772: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:12 EST 2016 ssl.sh: #1773: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:13 EST 2016 ssl.sh: #1774: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:14 EST 2016 ssl.sh: #1775: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:14 EST 2016 ssl.sh: #1776: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:15 EST 2016 ssl.sh: #1777: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:15 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1778: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:16 EST 2016 ssl.sh: #1779: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:16 EST 2016 ssl.sh: #1780: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:17 EST 2016 ssl.sh: #1781: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:17 EST 2016 ssl.sh: #1782: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:18 EST 2016 ssl.sh: #1783: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:18 EST 2016 ssl.sh: #1784: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:19 EST 2016 ssl.sh: #1785: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:20 EST 2016 ssl.sh: #1786: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:20 EST 2016 ssl.sh: #1787: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:21 EST 2016 ssl.sh: #1788: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:21 EST 2016 ssl.sh: #1789: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:22 EST 2016 ssl.sh: #1790: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26978 found at Fri Jan 8 02:56:22 EST 2016 ssl.sh: #1791: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26978 at Fri Jan 8 02:56:23 EST 2016 kill -USR1 26978 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26978 killed at Fri Jan 8 02:56:23 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:56:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:56:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:56:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1792: Waiting for Server - FAILED kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:29 EST 2016 selfserv_9591 with PID 28419 started at Fri Jan 8 02:56:29 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:29 EST 2016 ssl.sh: #1793: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:30 EST 2016 ssl.sh: #1794: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:31 EST 2016 ssl.sh: #1795: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:31 EST 2016 ssl.sh: #1796: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:32 EST 2016 ssl.sh: #1797: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:32 EST 2016 ssl.sh: #1798: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:33 EST 2016 ssl.sh: #1799: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:33 EST 2016 ssl.sh: #1800: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:34 EST 2016 ssl.sh: #1801: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:34 EST 2016 ssl.sh: #1802: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:35 EST 2016 ssl.sh: #1803: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:36 EST 2016 ssl.sh: #1804: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:36 EST 2016 ssl.sh: #1805: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:37 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1806: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:37 EST 2016 ssl.sh: #1807: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:38 EST 2016 ssl.sh: #1808: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:38 EST 2016 ssl.sh: #1809: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:39 EST 2016 ssl.sh: #1810: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:39 EST 2016 ssl.sh: #1811: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:40 EST 2016 ssl.sh: #1812: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:41 EST 2016 ssl.sh: #1813: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:41 EST 2016 ssl.sh: #1814: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:42 EST 2016 ssl.sh: #1815: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:42 EST 2016 ssl.sh: #1816: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:43 EST 2016 ssl.sh: #1817: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:43 EST 2016 ssl.sh: #1818: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:44 EST 2016 ssl.sh: #1819: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:45 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1820: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:45 EST 2016 ssl.sh: #1821: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:46 EST 2016 ssl.sh: #1822: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:46 EST 2016 ssl.sh: #1823: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:47 EST 2016 ssl.sh: #1824: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:47 EST 2016 ssl.sh: #1825: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:48 EST 2016 ssl.sh: #1826: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:48 EST 2016 ssl.sh: #1827: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:49 EST 2016 ssl.sh: #1828: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:49 EST 2016 ssl.sh: #1829: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:50 EST 2016 ssl.sh: #1830: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:51 EST 2016 ssl.sh: #1831: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:51 EST 2016 ssl.sh: #1832: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28419 found at Fri Jan 8 02:56:52 EST 2016 ssl.sh: #1833: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 28419 at Fri Jan 8 02:56:52 EST 2016 kill -USR1 28419 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28419 killed at Fri Jan 8 02:56:52 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:56:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:56:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:56:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1834: Waiting for Server - FAILED kill -0 29855 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29855 found at Fri Jan 8 02:56:58 EST 2016 selfserv_9591 with PID 29855 started at Fri Jan 8 02:56:58 EST 2016 trying to kill selfserv_9591 with PID 29855 at Fri Jan 8 02:56:58 EST 2016 kill -USR1 29855 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29855 killed at Fri Jan 8 02:56:59 EST 2016 ssl.sh: SSL Cipher Coverage - server bypass/client normal - with ECC =============================== selfserv_9591 starting at Fri Jan 8 02:56:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:56:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:57:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1835: Waiting for Server - FAILED kill -0 29915 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:05 EST 2016 selfserv_9591 with PID 29915 started at Fri Jan 8 02:57:05 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1836: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1837: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1838: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1839: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1840: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1841: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1842: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1843: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1844: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1845: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1846: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1847: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1848: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1849: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1850: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1851: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1852: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1853: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1854: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1855: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1856: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1857: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1858: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1859: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1860: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1861: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1862: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1863: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1864: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1865: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1866: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1867: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1868: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1869: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1870: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1871: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1872: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1873: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1874: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1875: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1876: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1877: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1878: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1879: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1880: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1881: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1882: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1883: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1884: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1885: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1886: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1887: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1888: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1889: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1890: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1891: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1892: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1893: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1894: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1895: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1896: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1897: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1898: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1899: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1900: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1901: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1902: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29915 >/dev/null 2>/dev/null selfserv_9591 with PID 29915 found at Fri Jan 8 02:57:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1903: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 29915 at Fri Jan 8 02:57:41 EST 2016 kill -USR1 29915 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29915 killed at Fri Jan 8 02:57:42 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 02:57:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:57:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:57:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1904: Waiting for Server - FAILED kill -0 32017 >/dev/null 2>/dev/null selfserv_9591 with PID 32017 found at Fri Jan 8 02:57:48 EST 2016 selfserv_9591 with PID 32017 started at Fri Jan 8 02:57:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1905: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 32017 >/dev/null 2>/dev/null selfserv_9591 with PID 32017 found at Fri Jan 8 02:57:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1906: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32017 >/dev/null 2>/dev/null selfserv_9591 with PID 32017 found at Fri Jan 8 02:57:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1907: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32017 >/dev/null 2>/dev/null selfserv_9591 with PID 32017 found at Fri Jan 8 02:57:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1908: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32017 >/dev/null 2>/dev/null selfserv_9591 with PID 32017 found at Fri Jan 8 02:57:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1909: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 32017 at Fri Jan 8 02:57:50 EST 2016 kill -USR1 32017 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32017 killed at Fri Jan 8 02:57:51 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 02:57:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:57:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:57:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1910: Waiting for Server - FAILED kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:57:57 EST 2016 selfserv_9591 with PID 32183 started at Fri Jan 8 02:57:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1911: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:57:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1912: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:57:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1913: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:57:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1914: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:57:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1915: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:57:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1916: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:58:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1917: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:58:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1918: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:58:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1919: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:58:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1920: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:58:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1921: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:58:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1922: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:58:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1923: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:58:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1924: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32183 >/dev/null 2>/dev/null selfserv_9591 with PID 32183 found at Fri Jan 8 02:58:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1925: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 32183 at Fri Jan 8 02:58:04 EST 2016 kill -USR1 32183 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32183 killed at Fri Jan 8 02:58:05 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 02:58:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:58:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:58:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1926: Waiting for Server - FAILED kill -0 32596 >/dev/null 2>/dev/null selfserv_9591 with PID 32596 found at Fri Jan 8 02:58:11 EST 2016 selfserv_9591 with PID 32596 started at Fri Jan 8 02:58:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1927: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 32596 >/dev/null 2>/dev/null selfserv_9591 with PID 32596 found at Fri Jan 8 02:58:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1928: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32596 >/dev/null 2>/dev/null selfserv_9591 with PID 32596 found at Fri Jan 8 02:58:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1929: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32596 >/dev/null 2>/dev/null selfserv_9591 with PID 32596 found at Fri Jan 8 02:58:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1930: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32596 >/dev/null 2>/dev/null selfserv_9591 with PID 32596 found at Fri Jan 8 02:58:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1931: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 32596 at Fri Jan 8 02:58:13 EST 2016 kill -USR1 32596 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32596 killed at Fri Jan 8 02:58:14 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 02:58:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:58:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:58:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1932: Waiting for Server - FAILED kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:20 EST 2016 selfserv_9591 with PID 32762 started at Fri Jan 8 02:58:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1933: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1934: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1935: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1936: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1937: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1938: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1939: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1940: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1941: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1942: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1943: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1944: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1945: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1946: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32762 >/dev/null 2>/dev/null selfserv_9591 with PID 32762 found at Fri Jan 8 02:58:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1947: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 32762 at Fri Jan 8 02:58:28 EST 2016 kill -USR1 32762 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32762 killed at Fri Jan 8 02:58:28 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 02:58:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:58:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:58:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1948: Waiting for Server - FAILED kill -0 737 >/dev/null 2>/dev/null selfserv_9591 with PID 737 found at Fri Jan 8 02:58:34 EST 2016 selfserv_9591 with PID 737 started at Fri Jan 8 02:58:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1949: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 737 >/dev/null 2>/dev/null selfserv_9591 with PID 737 found at Fri Jan 8 02:58:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1950: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 737 >/dev/null 2>/dev/null selfserv_9591 with PID 737 found at Fri Jan 8 02:58:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1951: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 737 >/dev/null 2>/dev/null selfserv_9591 with PID 737 found at Fri Jan 8 02:58:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1952: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 737 >/dev/null 2>/dev/null selfserv_9591 with PID 737 found at Fri Jan 8 02:58:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1953: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 737 at Fri Jan 8 02:58:36 EST 2016 kill -USR1 737 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 737 killed at Fri Jan 8 02:58:37 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 02:58:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:58:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:58:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1954: Waiting for Server - FAILED kill -0 902 >/dev/null 2>/dev/null selfserv_9591 with PID 902 found at Fri Jan 8 02:58:43 EST 2016 selfserv_9591 with PID 902 started at Fri Jan 8 02:58:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1955: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 902 >/dev/null 2>/dev/null selfserv_9591 with PID 902 found at Fri Jan 8 02:58:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1956: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 902 >/dev/null 2>/dev/null selfserv_9591 with PID 902 found at Fri Jan 8 02:58:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1957: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 902 >/dev/null 2>/dev/null selfserv_9591 with PID 902 found at Fri Jan 8 02:58:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1958: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 902 >/dev/null 2>/dev/null selfserv_9591 with PID 902 found at Fri Jan 8 02:58:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1959: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 902 >/dev/null 2>/dev/null selfserv_9591 with PID 902 found at Fri Jan 8 02:58:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1960: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 902 >/dev/null 2>/dev/null selfserv_9591 with PID 902 found at Fri Jan 8 02:58:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1961: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 902 >/dev/null 2>/dev/null selfserv_9591 with PID 902 found at Fri Jan 8 02:58:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1962: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 902 >/dev/null 2>/dev/null selfserv_9591 with PID 902 found at Fri Jan 8 02:58:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1963: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 902 >/dev/null 2>/dev/null selfserv_9591 with PID 902 found at Fri Jan 8 02:58:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1964: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 902 >/dev/null 2>/dev/null selfserv_9591 with PID 902 found at Fri Jan 8 02:58:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1965: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 902 >/dev/null 2>/dev/null selfserv_9591 with PID 902 found at Fri Jan 8 02:58:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1966: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 902 >/dev/null 2>/dev/null selfserv_9591 with PID 902 found at Fri Jan 8 02:58:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1967: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 902 at Fri Jan 8 02:58:50 EST 2016 kill -USR1 902 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 902 killed at Fri Jan 8 02:58:50 EST 2016 ssl.sh: SSL Client Authentication - server bypass/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:58:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:58:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:58:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1968: Waiting for Server - FAILED kill -0 1313 >/dev/null 2>/dev/null selfserv_9591 with PID 1313 found at Fri Jan 8 02:58:56 EST 2016 selfserv_9591 with PID 1313 started at Fri Jan 8 02:58:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1969: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1313 at Fri Jan 8 02:58:57 EST 2016 kill -USR1 1313 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1313 killed at Fri Jan 8 02:58:57 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:58:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:58:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:59:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1970: Waiting for Server - FAILED kill -0 1382 >/dev/null 2>/dev/null selfserv_9591 with PID 1382 found at Fri Jan 8 02:59:03 EST 2016 selfserv_9591 with PID 1382 started at Fri Jan 8 02:59:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1971: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1382 at Fri Jan 8 02:59:04 EST 2016 kill -USR1 1382 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1382 killed at Fri Jan 8 02:59:04 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:59:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:59:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:59:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1972: Waiting for Server - FAILED kill -0 1451 >/dev/null 2>/dev/null selfserv_9591 with PID 1451 found at Fri Jan 8 02:59:10 EST 2016 selfserv_9591 with PID 1451 started at Fri Jan 8 02:59:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1973: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1451 at Fri Jan 8 02:59:10 EST 2016 kill -USR1 1451 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1451 killed at Fri Jan 8 02:59:11 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:59:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:59:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:59:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1974: Waiting for Server - FAILED kill -0 1521 >/dev/null 2>/dev/null selfserv_9591 with PID 1521 found at Fri Jan 8 02:59:17 EST 2016 selfserv_9591 with PID 1521 started at Fri Jan 8 02:59:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1975: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1521 at Fri Jan 8 02:59:17 EST 2016 kill -USR1 1521 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1521 killed at Fri Jan 8 02:59:18 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:59:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:59:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:59:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1976: Waiting for Server - FAILED kill -0 1590 >/dev/null 2>/dev/null selfserv_9591 with PID 1590 found at Fri Jan 8 02:59:24 EST 2016 selfserv_9591 with PID 1590 started at Fri Jan 8 02:59:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1977: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1590 at Fri Jan 8 02:59:24 EST 2016 kill -USR1 1590 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1590 killed at Fri Jan 8 02:59:25 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:59:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:59:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:59:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1978: Waiting for Server - FAILED kill -0 1659 >/dev/null 2>/dev/null selfserv_9591 with PID 1659 found at Fri Jan 8 02:59:31 EST 2016 selfserv_9591 with PID 1659 started at Fri Jan 8 02:59:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1979: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1659 at Fri Jan 8 02:59:31 EST 2016 kill -USR1 1659 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1659 killed at Fri Jan 8 02:59:32 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:59:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:59:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:59:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1980: Waiting for Server - FAILED kill -0 1729 >/dev/null 2>/dev/null selfserv_9591 with PID 1729 found at Fri Jan 8 02:59:38 EST 2016 selfserv_9591 with PID 1729 started at Fri Jan 8 02:59:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1981: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1729 at Fri Jan 8 02:59:38 EST 2016 kill -USR1 1729 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1729 killed at Fri Jan 8 02:59:39 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:59:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:59:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:59:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1982: Waiting for Server - FAILED kill -0 1798 >/dev/null 2>/dev/null selfserv_9591 with PID 1798 found at Fri Jan 8 02:59:44 EST 2016 selfserv_9591 with PID 1798 started at Fri Jan 8 02:59:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1983: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1798 at Fri Jan 8 02:59:45 EST 2016 kill -USR1 1798 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1798 killed at Fri Jan 8 02:59:45 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 02:59:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:59:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:59:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1984: Waiting for Server - FAILED kill -0 1872 >/dev/null 2>/dev/null selfserv_9591 with PID 1872 found at Fri Jan 8 02:59:51 EST 2016 selfserv_9591 with PID 1872 started at Fri Jan 8 02:59:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1985: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1872 at Fri Jan 8 02:59:52 EST 2016 kill -USR1 1872 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1872 killed at Fri Jan 8 02:59:52 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 02:59:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:59:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 02:59:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1986: Waiting for Server - FAILED kill -0 1942 >/dev/null 2>/dev/null selfserv_9591 with PID 1942 found at Fri Jan 8 02:59:58 EST 2016 selfserv_9591 with PID 1942 started at Fri Jan 8 02:59:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1987: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1942 at Fri Jan 8 02:59:59 EST 2016 kill -USR1 1942 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1942 killed at Fri Jan 8 02:59:59 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 02:59:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 02:59:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:00:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1988: Waiting for Server - FAILED kill -0 2011 >/dev/null 2>/dev/null selfserv_9591 with PID 2011 found at Fri Jan 8 03:00:05 EST 2016 selfserv_9591 with PID 2011 started at Fri Jan 8 03:00:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1989: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2011 at Fri Jan 8 03:00:06 EST 2016 kill -USR1 2011 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2011 killed at Fri Jan 8 03:00:06 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:00:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:00:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:00:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1990: Waiting for Server - FAILED kill -0 2080 >/dev/null 2>/dev/null selfserv_9591 with PID 2080 found at Fri Jan 8 03:00:12 EST 2016 selfserv_9591 with PID 2080 started at Fri Jan 8 03:00:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1991: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2080 at Fri Jan 8 03:00:13 EST 2016 kill -USR1 2080 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2080 killed at Fri Jan 8 03:00:13 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:00:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:00:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:00:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1992: Waiting for Server - FAILED kill -0 2151 >/dev/null 2>/dev/null selfserv_9591 with PID 2151 found at Fri Jan 8 03:00:19 EST 2016 selfserv_9591 with PID 2151 started at Fri Jan 8 03:00:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1993: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2151 at Fri Jan 8 03:00:20 EST 2016 kill -USR1 2151 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2151 killed at Fri Jan 8 03:00:20 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:00:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:00:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:00:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1994: Waiting for Server - FAILED kill -0 2220 >/dev/null 2>/dev/null selfserv_9591 with PID 2220 found at Fri Jan 8 03:00:26 EST 2016 selfserv_9591 with PID 2220 started at Fri Jan 8 03:00:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1995: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2220 at Fri Jan 8 03:00:26 EST 2016 kill -USR1 2220 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2220 killed at Fri Jan 8 03:00:27 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:00:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:00:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:00:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1996: Waiting for Server - FAILED kill -0 2289 >/dev/null 2>/dev/null selfserv_9591 with PID 2289 found at Fri Jan 8 03:00:33 EST 2016 selfserv_9591 with PID 2289 started at Fri Jan 8 03:00:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1997: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2289 at Fri Jan 8 03:00:33 EST 2016 kill -USR1 2289 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2289 killed at Fri Jan 8 03:00:34 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:00:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:00:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:00:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1998: Waiting for Server - FAILED kill -0 2359 >/dev/null 2>/dev/null selfserv_9591 with PID 2359 found at Fri Jan 8 03:00:40 EST 2016 selfserv_9591 with PID 2359 started at Fri Jan 8 03:00:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1999: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2359 at Fri Jan 8 03:00:40 EST 2016 kill -USR1 2359 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2359 killed at Fri Jan 8 03:00:41 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:00:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:00:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:00:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2000: Waiting for Server - FAILED kill -0 2428 >/dev/null 2>/dev/null selfserv_9591 with PID 2428 found at Fri Jan 8 03:00:47 EST 2016 selfserv_9591 with PID 2428 started at Fri Jan 8 03:00:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2001: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2428 at Fri Jan 8 03:00:47 EST 2016 kill -USR1 2428 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2428 killed at Fri Jan 8 03:00:48 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:00:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:00:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:00:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2002: Waiting for Server - FAILED kill -0 2497 >/dev/null 2>/dev/null selfserv_9591 with PID 2497 found at Fri Jan 8 03:00:54 EST 2016 selfserv_9591 with PID 2497 started at Fri Jan 8 03:00:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2003: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2497 at Fri Jan 8 03:00:54 EST 2016 kill -USR1 2497 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2497 killed at Fri Jan 8 03:00:55 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:00:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:00:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:01:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2004: Waiting for Server - FAILED kill -0 2567 >/dev/null 2>/dev/null selfserv_9591 with PID 2567 found at Fri Jan 8 03:01:01 EST 2016 selfserv_9591 with PID 2567 started at Fri Jan 8 03:01:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2005: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2567 at Fri Jan 8 03:01:01 EST 2016 kill -USR1 2567 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2567 killed at Fri Jan 8 03:01:01 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:01:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:01:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:01:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2006: Waiting for Server - FAILED kill -0 2654 >/dev/null 2>/dev/null selfserv_9591 with PID 2654 found at Fri Jan 8 03:01:07 EST 2016 selfserv_9591 with PID 2654 started at Fri Jan 8 03:01:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2007: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2654 at Fri Jan 8 03:01:08 EST 2016 kill -USR1 2654 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2654 killed at Fri Jan 8 03:01:08 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:01:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:01:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:01:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2008: Waiting for Server - FAILED kill -0 2723 >/dev/null 2>/dev/null selfserv_9591 with PID 2723 found at Fri Jan 8 03:01:14 EST 2016 selfserv_9591 with PID 2723 started at Fri Jan 8 03:01:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2009: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2723 at Fri Jan 8 03:01:15 EST 2016 kill -USR1 2723 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2723 killed at Fri Jan 8 03:01:15 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:01:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:01:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:01:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2010: Waiting for Server - FAILED kill -0 2793 >/dev/null 2>/dev/null selfserv_9591 with PID 2793 found at Fri Jan 8 03:01:21 EST 2016 selfserv_9591 with PID 2793 started at Fri Jan 8 03:01:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2011: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2793 at Fri Jan 8 03:01:22 EST 2016 kill -USR1 2793 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2793 killed at Fri Jan 8 03:01:22 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:01:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:01:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:01:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2012: Waiting for Server - FAILED kill -0 2862 >/dev/null 2>/dev/null selfserv_9591 with PID 2862 found at Fri Jan 8 03:01:28 EST 2016 selfserv_9591 with PID 2862 started at Fri Jan 8 03:01:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2013: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2862 at Fri Jan 8 03:01:29 EST 2016 kill -USR1 2862 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2862 killed at Fri Jan 8 03:01:29 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:01:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:01:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:01:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2014: Waiting for Server - FAILED kill -0 2931 >/dev/null 2>/dev/null selfserv_9591 with PID 2931 found at Fri Jan 8 03:01:35 EST 2016 selfserv_9591 with PID 2931 started at Fri Jan 8 03:01:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2015: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2931 at Fri Jan 8 03:01:36 EST 2016 kill -USR1 2931 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2931 killed at Fri Jan 8 03:01:36 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:01:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:01:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:01:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2016: Waiting for Server - FAILED kill -0 3001 >/dev/null 2>/dev/null selfserv_9591 with PID 3001 found at Fri Jan 8 03:01:42 EST 2016 selfserv_9591 with PID 3001 started at Fri Jan 8 03:01:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2017: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3001 at Fri Jan 8 03:01:42 EST 2016 kill -USR1 3001 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3001 killed at Fri Jan 8 03:01:43 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:01:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:01:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:01:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2018: Waiting for Server - FAILED kill -0 3070 >/dev/null 2>/dev/null selfserv_9591 with PID 3070 found at Fri Jan 8 03:01:49 EST 2016 selfserv_9591 with PID 3070 started at Fri Jan 8 03:01:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2019: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3070 at Fri Jan 8 03:01:49 EST 2016 kill -USR1 3070 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3070 killed at Fri Jan 8 03:01:50 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:01:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:01:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:01:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2020: Waiting for Server - FAILED kill -0 3139 >/dev/null 2>/dev/null selfserv_9591 with PID 3139 found at Fri Jan 8 03:01:56 EST 2016 selfserv_9591 with PID 3139 started at Fri Jan 8 03:01:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2021: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3139 at Fri Jan 8 03:01:56 EST 2016 kill -USR1 3139 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3139 killed at Fri Jan 8 03:01:57 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:01:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:01:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:02:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2022: Waiting for Server - FAILED kill -0 3209 >/dev/null 2>/dev/null selfserv_9591 with PID 3209 found at Fri Jan 8 03:02:03 EST 2016 selfserv_9591 with PID 3209 started at Fri Jan 8 03:02:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2023: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3209 at Fri Jan 8 03:02:03 EST 2016 kill -USR1 3209 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3209 killed at Fri Jan 8 03:02:04 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:02:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:02:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:02:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2024: Waiting for Server - FAILED kill -0 3278 >/dev/null 2>/dev/null selfserv_9591 with PID 3278 found at Fri Jan 8 03:02:10 EST 2016 selfserv_9591 with PID 3278 started at Fri Jan 8 03:02:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2025: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3278 at Fri Jan 8 03:02:10 EST 2016 kill -USR1 3278 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3278 killed at Fri Jan 8 03:02:11 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:02:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:02:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:02:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2026: Waiting for Server - FAILED kill -0 3347 >/dev/null 2>/dev/null selfserv_9591 with PID 3347 found at Fri Jan 8 03:02:17 EST 2016 selfserv_9591 with PID 3347 started at Fri Jan 8 03:02:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2027: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3347 at Fri Jan 8 03:02:17 EST 2016 kill -USR1 3347 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3347 killed at Fri Jan 8 03:02:17 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:02:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:02:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:02:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2028: Waiting for Server - FAILED kill -0 3432 >/dev/null 2>/dev/null selfserv_9591 with PID 3432 found at Fri Jan 8 03:02:23 EST 2016 selfserv_9591 with PID 3432 started at Fri Jan 8 03:02:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2029: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3432 at Fri Jan 8 03:02:24 EST 2016 kill -USR1 3432 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3432 killed at Fri Jan 8 03:02:24 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:02:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:02:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:02:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2030: Waiting for Server - FAILED kill -0 3501 >/dev/null 2>/dev/null selfserv_9591 with PID 3501 found at Fri Jan 8 03:02:30 EST 2016 selfserv_9591 with PID 3501 started at Fri Jan 8 03:02:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2031: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3501 at Fri Jan 8 03:02:31 EST 2016 kill -USR1 3501 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3501 killed at Fri Jan 8 03:02:31 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:02:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:02:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:02:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2032: Waiting for Server - FAILED kill -0 3570 >/dev/null 2>/dev/null selfserv_9591 with PID 3570 found at Fri Jan 8 03:02:37 EST 2016 selfserv_9591 with PID 3570 started at Fri Jan 8 03:02:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2033: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3570 at Fri Jan 8 03:02:38 EST 2016 kill -USR1 3570 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3570 killed at Fri Jan 8 03:02:38 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:02:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:02:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:02:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2034: Waiting for Server - FAILED kill -0 3640 >/dev/null 2>/dev/null selfserv_9591 with PID 3640 found at Fri Jan 8 03:02:44 EST 2016 selfserv_9591 with PID 3640 started at Fri Jan 8 03:02:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2035: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3640 at Fri Jan 8 03:02:45 EST 2016 kill -USR1 3640 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3640 killed at Fri Jan 8 03:02:45 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:02:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:02:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:02:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2036: Waiting for Server - FAILED kill -0 3709 >/dev/null 2>/dev/null selfserv_9591 with PID 3709 found at Fri Jan 8 03:02:51 EST 2016 selfserv_9591 with PID 3709 started at Fri Jan 8 03:02:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2037: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3709 at Fri Jan 8 03:02:52 EST 2016 kill -USR1 3709 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3709 killed at Fri Jan 8 03:02:52 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:02:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:02:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:02:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2038: Waiting for Server - FAILED kill -0 3778 >/dev/null 2>/dev/null selfserv_9591 with PID 3778 found at Fri Jan 8 03:02:58 EST 2016 selfserv_9591 with PID 3778 started at Fri Jan 8 03:02:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2039: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3778 at Fri Jan 8 03:02:59 EST 2016 kill -USR1 3778 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3778 killed at Fri Jan 8 03:02:59 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:02:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:02:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:03:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2040: Waiting for Server - FAILED kill -0 3848 >/dev/null 2>/dev/null selfserv_9591 with PID 3848 found at Fri Jan 8 03:03:05 EST 2016 selfserv_9591 with PID 3848 started at Fri Jan 8 03:03:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2041: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3848 at Fri Jan 8 03:03:05 EST 2016 kill -USR1 3848 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3848 killed at Fri Jan 8 03:03:06 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:03:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:03:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:03:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2042: Waiting for Server - FAILED kill -0 3917 >/dev/null 2>/dev/null selfserv_9591 with PID 3917 found at Fri Jan 8 03:03:12 EST 2016 selfserv_9591 with PID 3917 started at Fri Jan 8 03:03:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2043: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3917 at Fri Jan 8 03:03:12 EST 2016 kill -USR1 3917 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3917 killed at Fri Jan 8 03:03:13 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:03:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:03:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:03:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2044: Waiting for Server - FAILED kill -0 3986 >/dev/null 2>/dev/null selfserv_9591 with PID 3986 found at Fri Jan 8 03:03:19 EST 2016 selfserv_9591 with PID 3986 started at Fri Jan 8 03:03:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2045: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3986 at Fri Jan 8 03:03:19 EST 2016 kill -USR1 3986 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3986 killed at Fri Jan 8 03:03:20 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:03:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:03:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:03:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2046: Waiting for Server - FAILED kill -0 4056 >/dev/null 2>/dev/null selfserv_9591 with PID 4056 found at Fri Jan 8 03:03:26 EST 2016 selfserv_9591 with PID 4056 started at Fri Jan 8 03:03:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2047: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4056 at Fri Jan 8 03:03:26 EST 2016 kill -USR1 4056 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4056 killed at Fri Jan 8 03:03:27 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:03:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:03:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:03:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2048: Waiting for Server - FAILED kill -0 4125 >/dev/null 2>/dev/null selfserv_9591 with PID 4125 found at Fri Jan 8 03:03:33 EST 2016 selfserv_9591 with PID 4125 started at Fri Jan 8 03:03:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2049: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4125 at Fri Jan 8 03:03:33 EST 2016 kill -USR1 4125 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4125 killed at Fri Jan 8 03:03:34 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:03:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:03:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:03:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2050: Waiting for Server - FAILED kill -0 4194 >/dev/null 2>/dev/null selfserv_9591 with PID 4194 found at Fri Jan 8 03:03:39 EST 2016 selfserv_9591 with PID 4194 started at Fri Jan 8 03:03:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2051: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4194 at Fri Jan 8 03:03:40 EST 2016 kill -USR1 4194 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4194 killed at Fri Jan 8 03:03:40 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:03:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:03:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:03:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2052: Waiting for Server - FAILED kill -0 4264 >/dev/null 2>/dev/null selfserv_9591 with PID 4264 found at Fri Jan 8 03:03:46 EST 2016 selfserv_9591 with PID 4264 started at Fri Jan 8 03:03:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2053: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4264 at Fri Jan 8 03:03:47 EST 2016 kill -USR1 4264 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4264 killed at Fri Jan 8 03:03:47 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:03:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:03:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:03:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2054: Waiting for Server - FAILED kill -0 4333 >/dev/null 2>/dev/null selfserv_9591 with PID 4333 found at Fri Jan 8 03:03:53 EST 2016 selfserv_9591 with PID 4333 started at Fri Jan 8 03:03:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2055: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4333 at Fri Jan 8 03:03:54 EST 2016 kill -USR1 4333 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4333 killed at Fri Jan 8 03:03:54 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:03:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:03:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:04:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2056: Waiting for Server - FAILED kill -0 4402 >/dev/null 2>/dev/null selfserv_9591 with PID 4402 found at Fri Jan 8 03:04:00 EST 2016 selfserv_9591 with PID 4402 started at Fri Jan 8 03:04:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2057: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4402 at Fri Jan 8 03:04:01 EST 2016 kill -USR1 4402 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4402 killed at Fri Jan 8 03:04:01 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:04:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:04:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:04:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2058: Waiting for Server - FAILED kill -0 4472 >/dev/null 2>/dev/null selfserv_9591 with PID 4472 found at Fri Jan 8 03:04:07 EST 2016 selfserv_9591 with PID 4472 started at Fri Jan 8 03:04:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2059: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4472 at Fri Jan 8 03:04:08 EST 2016 kill -USR1 4472 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4472 killed at Fri Jan 8 03:04:08 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:04:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:04:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:04:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2060: Waiting for Server - FAILED kill -0 4541 >/dev/null 2>/dev/null selfserv_9591 with PID 4541 found at Fri Jan 8 03:04:14 EST 2016 selfserv_9591 with PID 4541 started at Fri Jan 8 03:04:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2061: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4541 at Fri Jan 8 03:04:15 EST 2016 kill -USR1 4541 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4541 killed at Fri Jan 8 03:04:15 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:04:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:04:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:04:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2062: Waiting for Server - FAILED kill -0 4610 >/dev/null 2>/dev/null selfserv_9591 with PID 4610 found at Fri Jan 8 03:04:21 EST 2016 selfserv_9591 with PID 4610 started at Fri Jan 8 03:04:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2063: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4610 at Fri Jan 8 03:04:21 EST 2016 kill -USR1 4610 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4610 killed at Fri Jan 8 03:04:22 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:04:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:04:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:04:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2064: Waiting for Server - FAILED kill -0 4680 >/dev/null 2>/dev/null selfserv_9591 with PID 4680 found at Fri Jan 8 03:04:28 EST 2016 selfserv_9591 with PID 4680 started at Fri Jan 8 03:04:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2065: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4680 at Fri Jan 8 03:04:28 EST 2016 kill -USR1 4680 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4680 killed at Fri Jan 8 03:04:29 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:04:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:04:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:04:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2066: Waiting for Server - FAILED kill -0 4749 >/dev/null 2>/dev/null selfserv_9591 with PID 4749 found at Fri Jan 8 03:04:35 EST 2016 selfserv_9591 with PID 4749 started at Fri Jan 8 03:04:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2067: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4749 at Fri Jan 8 03:04:35 EST 2016 kill -USR1 4749 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4749 killed at Fri Jan 8 03:04:36 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 03:04:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:04:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:04:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2068: Waiting for Server - FAILED kill -0 4839 >/dev/null 2>/dev/null selfserv_9591 with PID 4839 found at Fri Jan 8 03:04:42 EST 2016 selfserv_9591 with PID 4839 started at Fri Jan 8 03:04:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2069: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4839 at Fri Jan 8 03:04:42 EST 2016 kill -USR1 4839 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4839 killed at Fri Jan 8 03:04:43 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9591 starting at Fri Jan 8 03:04:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:04:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:04:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2070: Waiting for Server - FAILED kill -0 4915 >/dev/null 2>/dev/null selfserv_9591 with PID 4915 found at Fri Jan 8 03:04:49 EST 2016 selfserv_9591 with PID 4915 started at Fri Jan 8 03:04:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2071: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4915 at Fri Jan 8 03:04:49 EST 2016 kill -USR1 4915 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4915 killed at Fri Jan 8 03:04:50 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9591 starting at Fri Jan 8 03:04:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:04:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:04:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2072: Waiting for Server - FAILED kill -0 4990 >/dev/null 2>/dev/null selfserv_9591 with PID 4990 found at Fri Jan 8 03:04:56 EST 2016 selfserv_9591 with PID 4990 started at Fri Jan 8 03:04:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2073: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4990 at Fri Jan 8 03:04:56 EST 2016 kill -USR1 4990 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4990 killed at Fri Jan 8 03:04:57 EST 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 03:04:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:04:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:05:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2074: Waiting for Server - FAILED kill -0 5065 >/dev/null 2>/dev/null selfserv_9591 with PID 5065 found at Fri Jan 8 03:05:03 EST 2016 selfserv_9591 with PID 5065 started at Fri Jan 8 03:05:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2075: SSL3 Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5065 at Fri Jan 8 03:05:03 EST 2016 kill -USR1 5065 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5065 killed at Fri Jan 8 03:05:03 EST 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9591 starting at Fri Jan 8 03:05:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:05:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:05:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2076: Waiting for Server - FAILED kill -0 5141 >/dev/null 2>/dev/null selfserv_9591 with PID 5141 found at Fri Jan 8 03:05:10 EST 2016 selfserv_9591 with PID 5141 started at Fri Jan 8 03:05:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c vssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2077: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5141 at Fri Jan 8 03:05:10 EST 2016 kill -USR1 5141 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5141 killed at Fri Jan 8 03:05:10 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 03:05:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:05:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:05:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2078: Waiting for Server - FAILED kill -0 5216 >/dev/null 2>/dev/null selfserv_9591 with PID 5216 found at Fri Jan 8 03:05:16 EST 2016 selfserv_9591 with PID 5216 started at Fri Jan 8 03:05:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2079: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5216 at Fri Jan 8 03:05:17 EST 2016 kill -USR1 5216 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5216 killed at Fri Jan 8 03:05:17 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9591 starting at Fri Jan 8 03:05:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:05:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:05:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2080: Waiting for Server - FAILED kill -0 5291 >/dev/null 2>/dev/null selfserv_9591 with PID 5291 found at Fri Jan 8 03:05:23 EST 2016 selfserv_9591 with PID 5291 started at Fri Jan 8 03:05:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2081: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5291 at Fri Jan 8 03:05:24 EST 2016 kill -USR1 5291 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5291 killed at Fri Jan 8 03:05:24 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9591 starting at Fri Jan 8 03:05:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:05:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:05:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2082: Waiting for Server - FAILED kill -0 5367 >/dev/null 2>/dev/null selfserv_9591 with PID 5367 found at Fri Jan 8 03:05:30 EST 2016 selfserv_9591 with PID 5367 started at Fri Jan 8 03:05:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2083: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5367 at Fri Jan 8 03:05:31 EST 2016 kill -USR1 5367 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5367 killed at Fri Jan 8 03:05:31 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9591 starting at Fri Jan 8 03:05:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:05:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:05:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2084: Waiting for Server - FAILED kill -0 5442 >/dev/null 2>/dev/null selfserv_9591 with PID 5442 found at Fri Jan 8 03:05:37 EST 2016 selfserv_9591 with PID 5442 started at Fri Jan 8 03:05:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2085: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5442 at Fri Jan 8 03:05:38 EST 2016 kill -USR1 5442 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5442 killed at Fri Jan 8 03:05:38 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9591 starting at Fri Jan 8 03:05:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:05:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:05:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2086: Waiting for Server - FAILED kill -0 5518 >/dev/null 2>/dev/null selfserv_9591 with PID 5518 found at Fri Jan 8 03:05:44 EST 2016 selfserv_9591 with PID 5518 started at Fri Jan 8 03:05:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2087: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5518 at Fri Jan 8 03:05:45 EST 2016 kill -USR1 5518 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5518 killed at Fri Jan 8 03:05:45 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server bypass/client normal - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9591 starting at Fri Jan 8 03:05:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:05:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:05:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2088: Waiting for Server - FAILED kill -0 5579 >/dev/null 2>/dev/null selfserv_9591 with PID 5579 found at Fri Jan 8 03:05:51 EST 2016 selfserv_9591 with PID 5579 started at Fri Jan 8 03:05:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2089: OCSP stapling, signed response, good status produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5579 at Fri Jan 8 03:05:52 EST 2016 kill -USR1 5579 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5579 killed at Fri Jan 8 03:05:52 EST 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9591 starting at Fri Jan 8 03:05:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:05:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:05:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2090: Waiting for Server - FAILED kill -0 5640 >/dev/null 2>/dev/null selfserv_9591 with PID 5640 found at Fri Jan 8 03:05:58 EST 2016 selfserv_9591 with PID 5640 started at Fri Jan 8 03:05:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2091: OCSP stapling, signed response, revoked status produced a returncode of 1, expected is 3 - FAILED trying to kill selfserv_9591 with PID 5640 at Fri Jan 8 03:05:58 EST 2016 kill -USR1 5640 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5640 killed at Fri Jan 8 03:05:59 EST 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9591 starting at Fri Jan 8 03:05:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:05:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:06:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2092: Waiting for Server - FAILED kill -0 5702 >/dev/null 2>/dev/null selfserv_9591 with PID 5702 found at Fri Jan 8 03:06:05 EST 2016 selfserv_9591 with PID 5702 started at Fri Jan 8 03:06:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2093: OCSP stapling, signed response, unknown status produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 5702 at Fri Jan 8 03:06:05 EST 2016 kill -USR1 5702 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5702 killed at Fri Jan 8 03:06:06 EST 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9591 starting at Fri Jan 8 03:06:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:06:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:06:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2094: Waiting for Server - FAILED kill -0 5763 >/dev/null 2>/dev/null selfserv_9591 with PID 5763 found at Fri Jan 8 03:06:12 EST 2016 selfserv_9591 with PID 5763 started at Fri Jan 8 03:06:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2095: OCSP stapling, unsigned failure response produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 5763 at Fri Jan 8 03:06:12 EST 2016 kill -USR1 5763 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5763 killed at Fri Jan 8 03:06:13 EST 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9591 starting at Fri Jan 8 03:06:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:06:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:06:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2096: Waiting for Server - FAILED kill -0 5824 >/dev/null 2>/dev/null selfserv_9591 with PID 5824 found at Fri Jan 8 03:06:19 EST 2016 selfserv_9591 with PID 5824 started at Fri Jan 8 03:06:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2097: OCSP stapling, good status, bad signature produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 5824 at Fri Jan 8 03:06:19 EST 2016 kill -USR1 5824 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5824 killed at Fri Jan 8 03:06:19 EST 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9591 starting at Fri Jan 8 03:06:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:06:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:06:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2098: Waiting for Server - FAILED kill -0 5886 >/dev/null 2>/dev/null selfserv_9591 with PID 5886 found at Fri Jan 8 03:06:25 EST 2016 selfserv_9591 with PID 5886 started at Fri Jan 8 03:06:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2099: OCSP stapling, invalid cert status data produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 5886 at Fri Jan 8 03:06:26 EST 2016 kill -USR1 5886 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5886 killed at Fri Jan 8 03:06:26 EST 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9591 starting at Fri Jan 8 03:06:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:06:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:06:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2100: Waiting for Server - FAILED kill -0 5947 >/dev/null 2>/dev/null selfserv_9591 with PID 5947 found at Fri Jan 8 03:06:32 EST 2016 selfserv_9591 with PID 5947 started at Fri Jan 8 03:06:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2101: Valid cert, Server doesn't staple produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 5947 at Fri Jan 8 03:06:33 EST 2016 kill -USR1 5947 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5947 killed at Fri Jan 8 03:06:33 EST 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9591 starting at Fri Jan 8 03:06:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:06:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:06:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2102: Waiting for Server - FAILED kill -0 6008 >/dev/null 2>/dev/null selfserv_9591 with PID 6008 found at Fri Jan 8 03:06:39 EST 2016 selfserv_9591 with PID 6008 started at Fri Jan 8 03:06:39 EST 2016 strsclnt -q -p 9591 -d ../client -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Fri Jan 8 03:06:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:06:40 EST 2016 ssl.sh: #2103: Stress OCSP stapling, server uses random status produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6008 at Fri Jan 8 03:06:40 EST 2016 kill -USR1 6008 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6008 killed at Fri Jan 8 03:06:40 EST 2016 ssl.sh: SSL Stress Test - server bypass/client normal - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 03:06:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:06:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:06:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2104: Waiting for Server - FAILED kill -0 6161 >/dev/null 2>/dev/null selfserv_9591 with PID 6161 found at Fri Jan 8 03:06:46 EST 2016 selfserv_9591 with PID 6161 started at Fri Jan 8 03:06:47 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 03:06:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:06:47 EST 2016 ssl.sh: #2105: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 6161 at Fri Jan 8 03:06:47 EST 2016 kill -USR1 6161 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6161 killed at Fri Jan 8 03:06:48 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 03:06:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:06:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:06:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2106: Waiting for Server - FAILED kill -0 6240 >/dev/null 2>/dev/null selfserv_9591 with PID 6240 found at Fri Jan 8 03:06:54 EST 2016 selfserv_9591 with PID 6240 started at Fri Jan 8 03:06:54 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 03:06:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:06:54 EST 2016 ssl.sh: #2107: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 6240 at Fri Jan 8 03:06:54 EST 2016 kill -USR1 6240 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6240 killed at Fri Jan 8 03:06:55 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9591 starting at Fri Jan 8 03:06:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:06:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:07:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2108: Waiting for Server - FAILED kill -0 6319 >/dev/null 2>/dev/null selfserv_9591 with PID 6319 found at Fri Jan 8 03:07:01 EST 2016 selfserv_9591 with PID 6319 started at Fri Jan 8 03:07:01 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:07:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:07:01 EST 2016 ssl.sh: #2109: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 6319 at Fri Jan 8 03:07:01 EST 2016 kill -USR1 6319 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6319 killed at Fri Jan 8 03:07:02 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9591 starting at Fri Jan 8 03:07:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:07:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:07:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2110: Waiting for Server - FAILED kill -0 6399 >/dev/null 2>/dev/null selfserv_9591 with PID 6399 found at Fri Jan 8 03:07:08 EST 2016 selfserv_9591 with PID 6399 started at Fri Jan 8 03:07:08 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:07:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:07:08 EST 2016 ssl.sh: #2111: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6399 at Fri Jan 8 03:07:08 EST 2016 kill -USR1 6399 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6399 killed at Fri Jan 8 03:07:09 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9591 starting at Fri Jan 8 03:07:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:07:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:07:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2112: Waiting for Server - FAILED kill -0 6478 >/dev/null 2>/dev/null selfserv_9591 with PID 6478 found at Fri Jan 8 03:07:15 EST 2016 selfserv_9591 with PID 6478 started at Fri Jan 8 03:07:15 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:07:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:07:15 EST 2016 ssl.sh: #2113: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 6478 at Fri Jan 8 03:07:15 EST 2016 kill -USR1 6478 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6478 killed at Fri Jan 8 03:07:16 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9591 starting at Fri Jan 8 03:07:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:07:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:07:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2114: Waiting for Server - FAILED kill -0 6557 >/dev/null 2>/dev/null selfserv_9591 with PID 6557 found at Fri Jan 8 03:07:22 EST 2016 selfserv_9591 with PID 6557 started at Fri Jan 8 03:07:22 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:07:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:07:22 EST 2016 ssl.sh: #2115: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6557 at Fri Jan 8 03:07:22 EST 2016 kill -USR1 6557 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6557 killed at Fri Jan 8 03:07:23 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9591 starting at Fri Jan 8 03:07:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:07:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:07:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2116: Waiting for Server - FAILED kill -0 6637 >/dev/null 2>/dev/null selfserv_9591 with PID 6637 found at Fri Jan 8 03:07:29 EST 2016 selfserv_9591 with PID 6637 started at Fri Jan 8 03:07:29 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:07:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:07:29 EST 2016 ssl.sh: #2117: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6637 at Fri Jan 8 03:07:29 EST 2016 kill -USR1 6637 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6637 killed at Fri Jan 8 03:07:30 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9591 starting at Fri Jan 8 03:07:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:07:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:07:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2118: Waiting for Server - FAILED kill -0 6722 >/dev/null 2>/dev/null selfserv_9591 with PID 6722 found at Fri Jan 8 03:07:36 EST 2016 selfserv_9591 with PID 6722 started at Fri Jan 8 03:07:36 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:07:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:07:36 EST 2016 ssl.sh: #2119: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6722 at Fri Jan 8 03:07:36 EST 2016 kill -USR1 6722 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6722 killed at Fri Jan 8 03:07:37 EST 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:07:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:07:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:07:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2120: Waiting for Server - FAILED kill -0 6829 >/dev/null 2>/dev/null selfserv_9591 with PID 6829 found at Fri Jan 8 03:07:43 EST 2016 selfserv_9591 with PID 6829 started at Fri Jan 8 03:07:43 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 03:07:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:07:43 EST 2016 ssl.sh: #2121: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6829 at Fri Jan 8 03:07:43 EST 2016 kill -USR1 6829 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6829 killed at Fri Jan 8 03:07:44 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:07:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:07:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:07:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2122: Waiting for Server - FAILED kill -0 6909 >/dev/null 2>/dev/null selfserv_9591 with PID 6909 found at Fri Jan 8 03:07:50 EST 2016 selfserv_9591 with PID 6909 started at Fri Jan 8 03:07:50 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 03:07:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:07:50 EST 2016 ssl.sh: #2123: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6909 at Fri Jan 8 03:07:50 EST 2016 kill -USR1 6909 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6909 killed at Fri Jan 8 03:07:51 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:07:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:07:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:07:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2124: Waiting for Server - FAILED kill -0 6988 >/dev/null 2>/dev/null selfserv_9591 with PID 6988 found at Fri Jan 8 03:07:57 EST 2016 selfserv_9591 with PID 6988 started at Fri Jan 8 03:07:57 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:07:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:07:57 EST 2016 ssl.sh: #2125: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6988 at Fri Jan 8 03:07:57 EST 2016 kill -USR1 6988 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6988 killed at Fri Jan 8 03:07:58 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:07:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:07:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:08:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2126: Waiting for Server - FAILED kill -0 7067 >/dev/null 2>/dev/null selfserv_9591 with PID 7067 found at Fri Jan 8 03:08:04 EST 2016 selfserv_9591 with PID 7067 started at Fri Jan 8 03:08:04 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:08:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:08:04 EST 2016 ssl.sh: #2127: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 7067 at Fri Jan 8 03:08:04 EST 2016 kill -USR1 7067 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7067 killed at Fri Jan 8 03:08:05 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 03:08:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:08:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:08:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2128: Waiting for Server - FAILED kill -0 7148 >/dev/null 2>/dev/null selfserv_9591 with PID 7148 found at Fri Jan 8 03:08:11 EST 2016 selfserv_9591 with PID 7148 started at Fri Jan 8 03:08:11 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:08:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:08:11 EST 2016 ssl.sh: #2129: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 7148 at Fri Jan 8 03:08:11 EST 2016 kill -USR1 7148 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7148 killed at Fri Jan 8 03:08:12 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:08:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:08:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:08:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2130: Waiting for Server - FAILED kill -0 7227 >/dev/null 2>/dev/null selfserv_9591 with PID 7227 found at Fri Jan 8 03:08:18 EST 2016 selfserv_9591 with PID 7227 started at Fri Jan 8 03:08:18 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:08:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:08:18 EST 2016 ssl.sh: #2131: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7227 at Fri Jan 8 03:08:19 EST 2016 kill -USR1 7227 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7227 killed at Fri Jan 8 03:08:19 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 03:08:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:08:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:08:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2132: Waiting for Server - FAILED kill -0 7306 >/dev/null 2>/dev/null selfserv_9591 with PID 7306 found at Fri Jan 8 03:08:25 EST 2016 selfserv_9591 with PID 7306 started at Fri Jan 8 03:08:25 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:08:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:08:25 EST 2016 ssl.sh: #2133: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7306 at Fri Jan 8 03:08:26 EST 2016 kill -USR1 7306 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7306 killed at Fri Jan 8 03:08:26 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9591 starting at Fri Jan 8 03:08:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:08:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:08:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2134: Waiting for Server - FAILED kill -0 7392 >/dev/null 2>/dev/null selfserv_9591 with PID 7392 found at Fri Jan 8 03:08:32 EST 2016 selfserv_9591 with PID 7392 started at Fri Jan 8 03:08:32 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:08:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:08:32 EST 2016 ssl.sh: #2135: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7392 at Fri Jan 8 03:08:33 EST 2016 kill -USR1 7392 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7392 killed at Fri Jan 8 03:08:33 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9591 starting at Fri Jan 8 03:08:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:08:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:08:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2136: Waiting for Server - FAILED kill -0 7477 >/dev/null 2>/dev/null selfserv_9591 with PID 7477 found at Fri Jan 8 03:08:39 EST 2016 selfserv_9591 with PID 7477 started at Fri Jan 8 03:08:39 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Fri Jan 8 03:08:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:08:40 EST 2016 ssl.sh: #2137: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7477 at Fri Jan 8 03:08:40 EST 2016 kill -USR1 7477 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7477 killed at Fri Jan 8 03:08:40 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:08:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:08:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:08:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2138: Waiting for Server - FAILED kill -0 7577 >/dev/null 2>/dev/null selfserv_9591 with PID 7577 found at Fri Jan 8 03:08:46 EST 2016 selfserv_9591 with PID 7577 started at Fri Jan 8 03:08:46 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:08:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:08:47 EST 2016 ssl.sh: #2139: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7577 at Fri Jan 8 03:08:47 EST 2016 kill -USR1 7577 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7577 killed at Fri Jan 8 03:08:47 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:08:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:08:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:08:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2140: Waiting for Server - FAILED kill -0 7657 >/dev/null 2>/dev/null selfserv_9591 with PID 7657 found at Fri Jan 8 03:08:53 EST 2016 selfserv_9591 with PID 7657 started at Fri Jan 8 03:08:53 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:08:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:08:54 EST 2016 ssl.sh: #2141: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7657 at Fri Jan 8 03:08:54 EST 2016 kill -USR1 7657 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7657 killed at Fri Jan 8 03:08:54 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:08:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:08:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:09:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2142: Waiting for Server - FAILED kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 03:09:00 EST 2016 selfserv_9591 with PID 7736 started at Fri Jan 8 03:09:00 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:09:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:09:01 EST 2016 ssl.sh: #2143: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7736 at Fri Jan 8 03:09:01 EST 2016 kill -USR1 7736 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7736 killed at Fri Jan 8 03:09:01 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:09:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:09:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:09:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2144: Waiting for Server - FAILED kill -0 7815 >/dev/null 2>/dev/null selfserv_9591 with PID 7815 found at Fri Jan 8 03:09:07 EST 2016 selfserv_9591 with PID 7815 started at Fri Jan 8 03:09:07 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:09:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:09:08 EST 2016 ssl.sh: #2145: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7815 at Fri Jan 8 03:09:08 EST 2016 kill -USR1 7815 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7815 killed at Fri Jan 8 03:09:08 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:09:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:09:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:09:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2146: Waiting for Server - FAILED kill -0 7896 >/dev/null 2>/dev/null selfserv_9591 with PID 7896 found at Fri Jan 8 03:09:14 EST 2016 selfserv_9591 with PID 7896 started at Fri Jan 8 03:09:14 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:09:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:09:15 EST 2016 ssl.sh: #2147: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7896 at Fri Jan 8 03:09:15 EST 2016 kill -USR1 7896 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7896 killed at Fri Jan 8 03:09:15 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9591 starting at Fri Jan 8 03:09:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:09:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:09:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2148: Waiting for Server - FAILED kill -0 7975 >/dev/null 2>/dev/null selfserv_9591 with PID 7975 found at Fri Jan 8 03:09:21 EST 2016 selfserv_9591 with PID 7975 started at Fri Jan 8 03:09:21 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 03:09:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:09:22 EST 2016 ssl.sh: #2149: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 7975 at Fri Jan 8 03:09:22 EST 2016 kill -USR1 7975 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7975 killed at Fri Jan 8 03:09:22 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9591 starting at Fri Jan 8 03:09:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:09:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:09:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2150: Waiting for Server - FAILED kill -0 8054 >/dev/null 2>/dev/null selfserv_9591 with PID 8054 found at Fri Jan 8 03:09:28 EST 2016 selfserv_9591 with PID 8054 started at Fri Jan 8 03:09:28 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 03:09:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:09:29 EST 2016 ssl.sh: #2151: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 8054 at Fri Jan 8 03:09:29 EST 2016 kill -USR1 8054 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8054 killed at Fri Jan 8 03:09:29 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9591 starting at Fri Jan 8 03:09:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:09:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:09:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2152: Waiting for Server - FAILED kill -0 8135 >/dev/null 2>/dev/null selfserv_9591 with PID 8135 found at Fri Jan 8 03:09:35 EST 2016 selfserv_9591 with PID 8135 started at Fri Jan 8 03:09:35 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 03:09:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:09:36 EST 2016 ssl.sh: #2153: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 8135 at Fri Jan 8 03:09:36 EST 2016 kill -USR1 8135 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8135 killed at Fri Jan 8 03:09:36 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 03:09:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:09:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:09:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2154: Waiting for Server - FAILED kill -0 8215 >/dev/null 2>/dev/null selfserv_9591 with PID 8215 found at Fri Jan 8 03:09:42 EST 2016 selfserv_9591 with PID 8215 started at Fri Jan 8 03:09:42 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:09:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:09:43 EST 2016 ssl.sh: #2155: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8215 at Fri Jan 8 03:09:43 EST 2016 kill -USR1 8215 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8215 killed at Fri Jan 8 03:09:43 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 03:09:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:09:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:09:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2156: Waiting for Server - FAILED kill -0 8294 >/dev/null 2>/dev/null selfserv_9591 with PID 8294 found at Fri Jan 8 03:09:49 EST 2016 selfserv_9591 with PID 8294 started at Fri Jan 8 03:09:49 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:09:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:09:50 EST 2016 ssl.sh: #2157: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8294 at Fri Jan 8 03:09:50 EST 2016 kill -USR1 8294 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8294 killed at Fri Jan 8 03:09:50 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:09:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:09:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:09:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2158: Waiting for Server - FAILED kill -0 8395 >/dev/null 2>/dev/null selfserv_9591 with PID 8395 found at Fri Jan 8 03:09:56 EST 2016 selfserv_9591 with PID 8395 started at Fri Jan 8 03:09:56 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:09:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:09:57 EST 2016 ssl.sh: #2159: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8395 at Fri Jan 8 03:09:57 EST 2016 kill -USR1 8395 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8395 killed at Fri Jan 8 03:09:57 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:09:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:09:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:10:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2160: Waiting for Server - FAILED kill -0 8474 >/dev/null 2>/dev/null selfserv_9591 with PID 8474 found at Fri Jan 8 03:10:03 EST 2016 selfserv_9591 with PID 8474 started at Fri Jan 8 03:10:03 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:10:03 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:10:04 EST 2016 ssl.sh: #2161: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 8474 at Fri Jan 8 03:10:04 EST 2016 kill -USR1 8474 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8474 killed at Fri Jan 8 03:10:04 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:10:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:10:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:10:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2162: Waiting for Server - FAILED kill -0 8553 >/dev/null 2>/dev/null selfserv_9591 with PID 8553 found at Fri Jan 8 03:10:10 EST 2016 selfserv_9591 with PID 8553 started at Fri Jan 8 03:10:10 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:10:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:10:11 EST 2016 ssl.sh: #2163: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8553 at Fri Jan 8 03:10:11 EST 2016 kill -USR1 8553 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8553 killed at Fri Jan 8 03:10:11 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:10:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:10:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:10:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2164: Waiting for Server - FAILED kill -0 8633 >/dev/null 2>/dev/null selfserv_9591 with PID 8633 found at Fri Jan 8 03:10:17 EST 2016 selfserv_9591 with PID 8633 started at Fri Jan 8 03:10:18 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 03:10:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:10:18 EST 2016 ssl.sh: #2165: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8633 at Fri Jan 8 03:10:18 EST 2016 kill -USR1 8633 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8633 killed at Fri Jan 8 03:10:19 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9591 starting at Fri Jan 8 03:10:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:10:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:10:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2166: Waiting for Server - FAILED kill -0 8712 >/dev/null 2>/dev/null selfserv_9591 with PID 8712 found at Fri Jan 8 03:10:25 EST 2016 selfserv_9591 with PID 8712 started at Fri Jan 8 03:10:25 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:10:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:10:25 EST 2016 ssl.sh: #2167: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 8712 at Fri Jan 8 03:10:25 EST 2016 kill -USR1 8712 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8712 killed at Fri Jan 8 03:10:26 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:10:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:10:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:10:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2168: Waiting for Server - FAILED kill -0 8792 >/dev/null 2>/dev/null selfserv_9591 with PID 8792 found at Fri Jan 8 03:10:32 EST 2016 selfserv_9591 with PID 8792 started at Fri Jan 8 03:10:32 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:10:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:10:32 EST 2016 ssl.sh: #2169: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8792 at Fri Jan 8 03:10:32 EST 2016 kill -USR1 8792 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8792 killed at Fri Jan 8 03:10:33 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:10:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:10:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:10:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2170: Waiting for Server - FAILED kill -0 8892 >/dev/null 2>/dev/null selfserv_9591 with PID 8892 found at Fri Jan 8 03:10:39 EST 2016 selfserv_9591 with PID 8892 started at Fri Jan 8 03:10:39 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:10:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:10:39 EST 2016 ssl.sh: #2171: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8892 at Fri Jan 8 03:10:39 EST 2016 kill -USR1 8892 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8892 killed at Fri Jan 8 03:10:40 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9591 starting at Fri Jan 8 03:10:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:10:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:10:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2172: Waiting for Server - FAILED kill -0 8971 >/dev/null 2>/dev/null selfserv_9591 with PID 8971 found at Fri Jan 8 03:10:46 EST 2016 selfserv_9591 with PID 8971 started at Fri Jan 8 03:10:46 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 03:10:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:10:46 EST 2016 ssl.sh: #2173: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 8971 at Fri Jan 8 03:10:46 EST 2016 kill -USR1 8971 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8971 killed at Fri Jan 8 03:10:47 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:10:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:10:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:10:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2174: Waiting for Server - FAILED kill -0 9051 >/dev/null 2>/dev/null selfserv_9591 with PID 9051 found at Fri Jan 8 03:10:53 EST 2016 selfserv_9591 with PID 9051 started at Fri Jan 8 03:10:53 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:10:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:10:53 EST 2016 ssl.sh: #2175: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9051 at Fri Jan 8 03:10:53 EST 2016 kill -USR1 9051 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9051 killed at Fri Jan 8 03:10:54 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:10:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:10:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:10:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2176: Waiting for Server - FAILED kill -0 9130 >/dev/null 2>/dev/null selfserv_9591 with PID 9130 found at Fri Jan 8 03:11:00 EST 2016 selfserv_9591 with PID 9130 started at Fri Jan 8 03:11:00 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:11:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:11:00 EST 2016 ssl.sh: #2177: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9130 at Fri Jan 8 03:11:00 EST 2016 kill -USR1 9130 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9130 killed at Fri Jan 8 03:11:01 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:11:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:11:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:11:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2178: Waiting for Server - FAILED kill -0 9223 >/dev/null 2>/dev/null selfserv_9591 with PID 9223 found at Fri Jan 8 03:11:07 EST 2016 selfserv_9591 with PID 9223 started at Fri Jan 8 03:11:07 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:11:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:11:07 EST 2016 ssl.sh: #2179: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9223 at Fri Jan 8 03:11:07 EST 2016 kill -USR1 9223 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9223 killed at Fri Jan 8 03:11:08 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9591 starting at Fri Jan 8 03:11:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:11:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:11:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2180: Waiting for Server - FAILED kill -0 9317 >/dev/null 2>/dev/null selfserv_9591 with PID 9317 found at Fri Jan 8 03:11:14 EST 2016 selfserv_9591 with PID 9317 started at Fri Jan 8 03:11:14 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:11:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:11:14 EST 2016 ssl.sh: #2181: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9317 at Fri Jan 8 03:11:14 EST 2016 kill -USR1 9317 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9317 killed at Fri Jan 8 03:11:15 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:11:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:11:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:11:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2182: Waiting for Server - FAILED kill -0 9396 >/dev/null 2>/dev/null selfserv_9591 with PID 9396 found at Fri Jan 8 03:11:21 EST 2016 selfserv_9591 with PID 9396 started at Fri Jan 8 03:11:21 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:11:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:11:21 EST 2016 ssl.sh: #2183: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9396 at Fri Jan 8 03:11:21 EST 2016 kill -USR1 9396 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9396 killed at Fri Jan 8 03:11:22 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:11:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:11:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:11:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2184: Waiting for Server - FAILED kill -0 9475 >/dev/null 2>/dev/null selfserv_9591 with PID 9475 found at Fri Jan 8 03:11:28 EST 2016 selfserv_9591 with PID 9475 started at Fri Jan 8 03:11:28 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:11:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:11:28 EST 2016 ssl.sh: #2185: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9475 at Fri Jan 8 03:11:28 EST 2016 kill -USR1 9475 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9475 killed at Fri Jan 8 03:11:29 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:11:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:11:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:11:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2186: Waiting for Server - FAILED kill -0 9576 >/dev/null 2>/dev/null selfserv_9591 with PID 9576 found at Fri Jan 8 03:11:35 EST 2016 selfserv_9591 with PID 9576 started at Fri Jan 8 03:11:35 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 03:11:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:11:36 EST 2016 ssl.sh: #2187: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9576 at Fri Jan 8 03:11:36 EST 2016 kill -USR1 9576 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9576 killed at Fri Jan 8 03:11:36 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:11:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:11:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:11:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2188: Waiting for Server - FAILED kill -0 9657 >/dev/null 2>/dev/null selfserv_9591 with PID 9657 found at Fri Jan 8 03:11:42 EST 2016 selfserv_9591 with PID 9657 started at Fri Jan 8 03:11:42 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 03:11:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:11:43 EST 2016 ssl.sh: #2189: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 9657 at Fri Jan 8 03:11:43 EST 2016 kill -USR1 9657 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9657 killed at Fri Jan 8 03:11:43 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:11:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:11:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:11:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2190: Waiting for Server - FAILED kill -0 9750 >/dev/null 2>/dev/null selfserv_9591 with PID 9750 found at Fri Jan 8 03:11:49 EST 2016 selfserv_9591 with PID 9750 started at Fri Jan 8 03:11:49 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 03:11:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:11:50 EST 2016 ssl.sh: #2191: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9750 at Fri Jan 8 03:11:50 EST 2016 kill -USR1 9750 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9750 killed at Fri Jan 8 03:11:50 EST 2016 ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal - with ECC =============================== selfserv_9591 starting at Fri Jan 8 03:11:50 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:11:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:11:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2192: Waiting for Server - FAILED kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:11:56 EST 2016 selfserv_9591 with PID 9817 started at Fri Jan 8 03:11:56 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping A SSL2_RC4_128_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping F SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:11:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2193: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:11:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2194: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:11:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2195: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:11:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2196: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:11:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2197: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:11:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2198: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2199: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2200: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2201: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2202: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2203: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2204: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2205: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2206: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2207: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2208: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2209: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2210: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2211: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2212: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2213: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2214: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2215: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2216: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2217: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2218: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2219: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2220: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2221: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2222: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2223: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2224: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2225: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2226: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2227: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2228: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2229: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2230: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2231: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2232: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2233: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2234: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2235: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2236: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2237: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2238: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2239: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2240: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2241: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2242: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2243: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2244: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2245: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2246: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2247: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2248: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2249: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2250: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2251: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2252: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2253: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2254: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2255: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2256: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2257: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2258: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2259: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9817 >/dev/null 2>/dev/null selfserv_9591 with PID 9817 found at Fri Jan 8 03:12:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2260: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 9817 at Fri Jan 8 03:12:33 EST 2016 kill -USR1 9817 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9817 killed at Fri Jan 8 03:12:33 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:12:33 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:12:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:12:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2261: Waiting for Server - FAILED kill -0 11897 >/dev/null 2>/dev/null selfserv_9591 with PID 11897 found at Fri Jan 8 03:12:39 EST 2016 selfserv_9591 with PID 11897 started at Fri Jan 8 03:12:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2262: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11897 >/dev/null 2>/dev/null selfserv_9591 with PID 11897 found at Fri Jan 8 03:12:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2263: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11897 >/dev/null 2>/dev/null selfserv_9591 with PID 11897 found at Fri Jan 8 03:12:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2264: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11897 >/dev/null 2>/dev/null selfserv_9591 with PID 11897 found at Fri Jan 8 03:12:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2265: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11897 >/dev/null 2>/dev/null selfserv_9591 with PID 11897 found at Fri Jan 8 03:12:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2266: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 11897 at Fri Jan 8 03:12:42 EST 2016 kill -USR1 11897 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11897 killed at Fri Jan 8 03:12:42 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:12:42 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:12:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:12:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2267: Waiting for Server - FAILED kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:48 EST 2016 selfserv_9591 with PID 12062 started at Fri Jan 8 03:12:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2268: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2269: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2270: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2271: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2272: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2273: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2274: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2275: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2276: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2277: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2278: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2279: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2280: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2281: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12062 >/dev/null 2>/dev/null selfserv_9591 with PID 12062 found at Fri Jan 8 03:12:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2282: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 12062 at Fri Jan 8 03:12:56 EST 2016 kill -USR1 12062 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12062 killed at Fri Jan 8 03:12:56 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:12:56 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:12:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:13:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2283: Waiting for Server - FAILED kill -0 12476 >/dev/null 2>/dev/null selfserv_9591 with PID 12476 found at Fri Jan 8 03:13:02 EST 2016 selfserv_9591 with PID 12476 started at Fri Jan 8 03:13:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2284: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 12476 >/dev/null 2>/dev/null selfserv_9591 with PID 12476 found at Fri Jan 8 03:13:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2285: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12476 >/dev/null 2>/dev/null selfserv_9591 with PID 12476 found at Fri Jan 8 03:13:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2286: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12476 >/dev/null 2>/dev/null selfserv_9591 with PID 12476 found at Fri Jan 8 03:13:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2287: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12476 >/dev/null 2>/dev/null selfserv_9591 with PID 12476 found at Fri Jan 8 03:13:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2288: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 12476 at Fri Jan 8 03:13:05 EST 2016 kill -USR1 12476 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12476 killed at Fri Jan 8 03:13:05 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:13:05 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:13:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:13:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2289: Waiting for Server - FAILED kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:11 EST 2016 selfserv_9591 with PID 12641 started at Fri Jan 8 03:13:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2290: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2291: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2292: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2293: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2294: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2295: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2296: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2297: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2298: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2299: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2300: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2301: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2302: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2303: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12641 >/dev/null 2>/dev/null selfserv_9591 with PID 12641 found at Fri Jan 8 03:13:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2304: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 12641 at Fri Jan 8 03:13:19 EST 2016 kill -USR1 12641 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12641 killed at Fri Jan 8 03:13:20 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:13:20 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:13:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:13:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2305: Waiting for Server - FAILED kill -0 13055 >/dev/null 2>/dev/null selfserv_9591 with PID 13055 found at Fri Jan 8 03:13:25 EST 2016 selfserv_9591 with PID 13055 started at Fri Jan 8 03:13:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2306: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13055 >/dev/null 2>/dev/null selfserv_9591 with PID 13055 found at Fri Jan 8 03:13:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2307: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13055 >/dev/null 2>/dev/null selfserv_9591 with PID 13055 found at Fri Jan 8 03:13:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2308: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13055 >/dev/null 2>/dev/null selfserv_9591 with PID 13055 found at Fri Jan 8 03:13:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2309: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13055 >/dev/null 2>/dev/null selfserv_9591 with PID 13055 found at Fri Jan 8 03:13:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2310: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 13055 at Fri Jan 8 03:13:28 EST 2016 kill -USR1 13055 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13055 killed at Fri Jan 8 03:13:29 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:13:29 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:13:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:13:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2311: Waiting for Server - FAILED kill -0 13220 >/dev/null 2>/dev/null selfserv_9591 with PID 13220 found at Fri Jan 8 03:13:34 EST 2016 selfserv_9591 with PID 13220 started at Fri Jan 8 03:13:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2312: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13220 >/dev/null 2>/dev/null selfserv_9591 with PID 13220 found at Fri Jan 8 03:13:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2313: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13220 >/dev/null 2>/dev/null selfserv_9591 with PID 13220 found at Fri Jan 8 03:13:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2314: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13220 >/dev/null 2>/dev/null selfserv_9591 with PID 13220 found at Fri Jan 8 03:13:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2315: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13220 >/dev/null 2>/dev/null selfserv_9591 with PID 13220 found at Fri Jan 8 03:13:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2316: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 13220 >/dev/null 2>/dev/null selfserv_9591 with PID 13220 found at Fri Jan 8 03:13:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2317: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 13220 >/dev/null 2>/dev/null selfserv_9591 with PID 13220 found at Fri Jan 8 03:13:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2318: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 13220 >/dev/null 2>/dev/null selfserv_9591 with PID 13220 found at Fri Jan 8 03:13:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2319: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 13220 >/dev/null 2>/dev/null selfserv_9591 with PID 13220 found at Fri Jan 8 03:13:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2320: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 13220 >/dev/null 2>/dev/null selfserv_9591 with PID 13220 found at Fri Jan 8 03:13:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2321: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 13220 >/dev/null 2>/dev/null selfserv_9591 with PID 13220 found at Fri Jan 8 03:13:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2322: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 13220 >/dev/null 2>/dev/null selfserv_9591 with PID 13220 found at Fri Jan 8 03:13:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2323: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 13220 >/dev/null 2>/dev/null selfserv_9591 with PID 13220 found at Fri Jan 8 03:13:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2324: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13220 at Fri Jan 8 03:13:41 EST 2016 kill -USR1 13220 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13220 killed at Fri Jan 8 03:13:42 EST 2016 ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:13:42 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:13:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:13:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2325: Waiting for Server - FAILED kill -0 13628 >/dev/null 2>/dev/null selfserv_9591 with PID 13628 found at Fri Jan 8 03:13:48 EST 2016 selfserv_9591 with PID 13628 started at Fri Jan 8 03:13:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2326: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13628 at Fri Jan 8 03:13:48 EST 2016 kill -USR1 13628 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13628 killed at Fri Jan 8 03:13:49 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:13:49 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:13:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:13:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2327: Waiting for Server - FAILED kill -0 13697 >/dev/null 2>/dev/null selfserv_9591 with PID 13697 found at Fri Jan 8 03:13:55 EST 2016 selfserv_9591 with PID 13697 started at Fri Jan 8 03:13:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2328: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13697 at Fri Jan 8 03:13:55 EST 2016 kill -USR1 13697 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13697 killed at Fri Jan 8 03:13:56 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:13:56 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:13:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:14:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2329: Waiting for Server - FAILED kill -0 13767 >/dev/null 2>/dev/null selfserv_9591 with PID 13767 found at Fri Jan 8 03:14:02 EST 2016 selfserv_9591 with PID 13767 started at Fri Jan 8 03:14:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2330: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13767 at Fri Jan 8 03:14:02 EST 2016 kill -USR1 13767 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13767 killed at Fri Jan 8 03:14:03 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:14:03 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:14:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:14:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2331: Waiting for Server - FAILED kill -0 13836 >/dev/null 2>/dev/null selfserv_9591 with PID 13836 found at Fri Jan 8 03:14:09 EST 2016 selfserv_9591 with PID 13836 started at Fri Jan 8 03:14:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2332: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13836 at Fri Jan 8 03:14:09 EST 2016 kill -USR1 13836 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13836 killed at Fri Jan 8 03:14:09 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:14:10 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:14:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:14:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2333: Waiting for Server - FAILED kill -0 13905 >/dev/null 2>/dev/null selfserv_9591 with PID 13905 found at Fri Jan 8 03:14:15 EST 2016 selfserv_9591 with PID 13905 started at Fri Jan 8 03:14:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2334: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13905 at Fri Jan 8 03:14:16 EST 2016 kill -USR1 13905 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13905 killed at Fri Jan 8 03:14:16 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:14:16 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:14:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:14:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2335: Waiting for Server - FAILED kill -0 13975 >/dev/null 2>/dev/null selfserv_9591 with PID 13975 found at Fri Jan 8 03:14:22 EST 2016 selfserv_9591 with PID 13975 started at Fri Jan 8 03:14:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2336: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13975 at Fri Jan 8 03:14:23 EST 2016 kill -USR1 13975 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13975 killed at Fri Jan 8 03:14:23 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:14:23 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:14:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:14:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2337: Waiting for Server - FAILED kill -0 14044 >/dev/null 2>/dev/null selfserv_9591 with PID 14044 found at Fri Jan 8 03:14:29 EST 2016 selfserv_9591 with PID 14044 started at Fri Jan 8 03:14:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2338: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14044 at Fri Jan 8 03:14:30 EST 2016 kill -USR1 14044 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14044 killed at Fri Jan 8 03:14:30 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:14:30 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:14:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:14:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2339: Waiting for Server - FAILED kill -0 14113 >/dev/null 2>/dev/null selfserv_9591 with PID 14113 found at Fri Jan 8 03:14:36 EST 2016 selfserv_9591 with PID 14113 started at Fri Jan 8 03:14:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2340: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14113 at Fri Jan 8 03:14:37 EST 2016 kill -USR1 14113 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14113 killed at Fri Jan 8 03:14:37 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:14:37 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:14:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:14:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2341: Waiting for Server - FAILED kill -0 14183 >/dev/null 2>/dev/null selfserv_9591 with PID 14183 found at Fri Jan 8 03:14:43 EST 2016 selfserv_9591 with PID 14183 started at Fri Jan 8 03:14:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2342: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14183 at Fri Jan 8 03:14:44 EST 2016 kill -USR1 14183 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14183 killed at Fri Jan 8 03:14:44 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:14:44 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:14:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:14:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2343: Waiting for Server - FAILED kill -0 14252 >/dev/null 2>/dev/null selfserv_9591 with PID 14252 found at Fri Jan 8 03:14:50 EST 2016 selfserv_9591 with PID 14252 started at Fri Jan 8 03:14:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2344: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14252 at Fri Jan 8 03:14:50 EST 2016 kill -USR1 14252 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14252 killed at Fri Jan 8 03:14:51 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:14:51 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:14:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:14:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2345: Waiting for Server - FAILED kill -0 14321 >/dev/null 2>/dev/null selfserv_9591 with PID 14321 found at Fri Jan 8 03:14:57 EST 2016 selfserv_9591 with PID 14321 started at Fri Jan 8 03:14:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2346: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14321 at Fri Jan 8 03:14:57 EST 2016 kill -USR1 14321 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14321 killed at Fri Jan 8 03:14:58 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:14:58 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:14:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:15:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2347: Waiting for Server - FAILED kill -0 14391 >/dev/null 2>/dev/null selfserv_9591 with PID 14391 found at Fri Jan 8 03:15:04 EST 2016 selfserv_9591 with PID 14391 started at Fri Jan 8 03:15:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2348: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14391 at Fri Jan 8 03:15:04 EST 2016 kill -USR1 14391 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14391 killed at Fri Jan 8 03:15:05 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:15:05 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:15:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:15:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2349: Waiting for Server - FAILED kill -0 14461 >/dev/null 2>/dev/null selfserv_9591 with PID 14461 found at Fri Jan 8 03:15:11 EST 2016 selfserv_9591 with PID 14461 started at Fri Jan 8 03:15:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2350: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14461 at Fri Jan 8 03:15:11 EST 2016 kill -USR1 14461 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14461 killed at Fri Jan 8 03:15:12 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:15:12 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:15:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:15:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2351: Waiting for Server - FAILED kill -0 14530 >/dev/null 2>/dev/null selfserv_9591 with PID 14530 found at Fri Jan 8 03:15:18 EST 2016 selfserv_9591 with PID 14530 started at Fri Jan 8 03:15:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2352: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14530 at Fri Jan 8 03:15:18 EST 2016 kill -USR1 14530 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14530 killed at Fri Jan 8 03:15:19 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:15:19 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:15:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:15:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2353: Waiting for Server - FAILED kill -0 14600 >/dev/null 2>/dev/null selfserv_9591 with PID 14600 found at Fri Jan 8 03:15:25 EST 2016 selfserv_9591 with PID 14600 started at Fri Jan 8 03:15:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2354: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14600 at Fri Jan 8 03:15:25 EST 2016 kill -USR1 14600 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14600 killed at Fri Jan 8 03:15:25 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:15:26 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:15:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:15:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2355: Waiting for Server - FAILED kill -0 14669 >/dev/null 2>/dev/null selfserv_9591 with PID 14669 found at Fri Jan 8 03:15:31 EST 2016 selfserv_9591 with PID 14669 started at Fri Jan 8 03:15:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2356: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14669 at Fri Jan 8 03:15:32 EST 2016 kill -USR1 14669 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14669 killed at Fri Jan 8 03:15:32 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:15:32 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:15:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:15:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2357: Waiting for Server - FAILED kill -0 14738 >/dev/null 2>/dev/null selfserv_9591 with PID 14738 found at Fri Jan 8 03:15:38 EST 2016 selfserv_9591 with PID 14738 started at Fri Jan 8 03:15:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2358: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14738 at Fri Jan 8 03:15:39 EST 2016 kill -USR1 14738 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14738 killed at Fri Jan 8 03:15:39 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:15:39 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:15:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:15:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2359: Waiting for Server - FAILED kill -0 14808 >/dev/null 2>/dev/null selfserv_9591 with PID 14808 found at Fri Jan 8 03:15:45 EST 2016 selfserv_9591 with PID 14808 started at Fri Jan 8 03:15:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2360: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14808 at Fri Jan 8 03:15:46 EST 2016 kill -USR1 14808 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14808 killed at Fri Jan 8 03:15:46 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:15:46 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:15:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:15:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2361: Waiting for Server - FAILED kill -0 14877 >/dev/null 2>/dev/null selfserv_9591 with PID 14877 found at Fri Jan 8 03:15:52 EST 2016 selfserv_9591 with PID 14877 started at Fri Jan 8 03:15:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2362: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14877 at Fri Jan 8 03:15:53 EST 2016 kill -USR1 14877 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14877 killed at Fri Jan 8 03:15:53 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:15:53 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:15:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:15:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2363: Waiting for Server - FAILED kill -0 14946 >/dev/null 2>/dev/null selfserv_9591 with PID 14946 found at Fri Jan 8 03:15:59 EST 2016 selfserv_9591 with PID 14946 started at Fri Jan 8 03:15:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2364: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14946 at Fri Jan 8 03:16:00 EST 2016 kill -USR1 14946 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14946 killed at Fri Jan 8 03:16:00 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:16:00 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:16:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:16:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2365: Waiting for Server - FAILED kill -0 15016 >/dev/null 2>/dev/null selfserv_9591 with PID 15016 found at Fri Jan 8 03:16:06 EST 2016 selfserv_9591 with PID 15016 started at Fri Jan 8 03:16:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2366: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15016 at Fri Jan 8 03:16:07 EST 2016 kill -USR1 15016 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15016 killed at Fri Jan 8 03:16:07 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:16:07 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:16:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:16:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2367: Waiting for Server - FAILED kill -0 15085 >/dev/null 2>/dev/null selfserv_9591 with PID 15085 found at Fri Jan 8 03:16:13 EST 2016 selfserv_9591 with PID 15085 started at Fri Jan 8 03:16:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2368: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 15085 at Fri Jan 8 03:16:13 EST 2016 kill -USR1 15085 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15085 killed at Fri Jan 8 03:16:14 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:16:14 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:16:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:16:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2369: Waiting for Server - FAILED kill -0 15154 >/dev/null 2>/dev/null selfserv_9591 with PID 15154 found at Fri Jan 8 03:16:20 EST 2016 selfserv_9591 with PID 15154 started at Fri Jan 8 03:16:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2370: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 15154 at Fri Jan 8 03:16:20 EST 2016 kill -USR1 15154 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15154 killed at Fri Jan 8 03:16:21 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:16:21 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:16:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:16:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2371: Waiting for Server - FAILED kill -0 15224 >/dev/null 2>/dev/null selfserv_9591 with PID 15224 found at Fri Jan 8 03:16:27 EST 2016 selfserv_9591 with PID 15224 started at Fri Jan 8 03:16:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2372: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15224 at Fri Jan 8 03:16:27 EST 2016 kill -USR1 15224 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15224 killed at Fri Jan 8 03:16:28 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:16:28 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:16:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:16:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2373: Waiting for Server - FAILED kill -0 15293 >/dev/null 2>/dev/null selfserv_9591 with PID 15293 found at Fri Jan 8 03:16:34 EST 2016 selfserv_9591 with PID 15293 started at Fri Jan 8 03:16:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2374: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15293 at Fri Jan 8 03:16:34 EST 2016 kill -USR1 15293 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15293 killed at Fri Jan 8 03:16:35 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:16:35 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:16:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:16:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2375: Waiting for Server - FAILED kill -0 15362 >/dev/null 2>/dev/null selfserv_9591 with PID 15362 found at Fri Jan 8 03:16:41 EST 2016 selfserv_9591 with PID 15362 started at Fri Jan 8 03:16:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2376: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15362 at Fri Jan 8 03:16:41 EST 2016 kill -USR1 15362 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15362 killed at Fri Jan 8 03:16:42 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:16:42 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:16:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:16:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2377: Waiting for Server - FAILED kill -0 15432 >/dev/null 2>/dev/null selfserv_9591 with PID 15432 found at Fri Jan 8 03:16:47 EST 2016 selfserv_9591 with PID 15432 started at Fri Jan 8 03:16:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2378: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15432 at Fri Jan 8 03:16:48 EST 2016 kill -USR1 15432 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15432 killed at Fri Jan 8 03:16:48 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:16:49 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:16:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:16:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2379: Waiting for Server - FAILED kill -0 15501 >/dev/null 2>/dev/null selfserv_9591 with PID 15501 found at Fri Jan 8 03:16:54 EST 2016 selfserv_9591 with PID 15501 started at Fri Jan 8 03:16:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2380: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 15501 at Fri Jan 8 03:16:55 EST 2016 kill -USR1 15501 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15501 killed at Fri Jan 8 03:16:55 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:16:55 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:16:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:17:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2381: Waiting for Server - FAILED kill -0 15570 >/dev/null 2>/dev/null selfserv_9591 with PID 15570 found at Fri Jan 8 03:17:01 EST 2016 selfserv_9591 with PID 15570 started at Fri Jan 8 03:17:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2382: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 15570 at Fri Jan 8 03:17:02 EST 2016 kill -USR1 15570 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15570 killed at Fri Jan 8 03:17:02 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:17:02 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:17:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:17:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2383: Waiting for Server - FAILED kill -0 15640 >/dev/null 2>/dev/null selfserv_9591 with PID 15640 found at Fri Jan 8 03:17:08 EST 2016 selfserv_9591 with PID 15640 started at Fri Jan 8 03:17:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2384: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15640 at Fri Jan 8 03:17:09 EST 2016 kill -USR1 15640 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15640 killed at Fri Jan 8 03:17:09 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:17:09 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:17:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:17:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2385: Waiting for Server - FAILED kill -0 15724 >/dev/null 2>/dev/null selfserv_9591 with PID 15724 found at Fri Jan 8 03:17:15 EST 2016 selfserv_9591 with PID 15724 started at Fri Jan 8 03:17:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2386: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15724 at Fri Jan 8 03:17:16 EST 2016 kill -USR1 15724 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15724 killed at Fri Jan 8 03:17:16 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:17:16 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:17:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:17:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2387: Waiting for Server - FAILED kill -0 15794 >/dev/null 2>/dev/null selfserv_9591 with PID 15794 found at Fri Jan 8 03:17:22 EST 2016 selfserv_9591 with PID 15794 started at Fri Jan 8 03:17:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2388: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15794 at Fri Jan 8 03:17:23 EST 2016 kill -USR1 15794 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15794 killed at Fri Jan 8 03:17:23 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:17:23 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:17:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:17:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2389: Waiting for Server - FAILED kill -0 15864 >/dev/null 2>/dev/null selfserv_9591 with PID 15864 found at Fri Jan 8 03:17:29 EST 2016 selfserv_9591 with PID 15864 started at Fri Jan 8 03:17:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2390: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 15864 at Fri Jan 8 03:17:30 EST 2016 kill -USR1 15864 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15864 killed at Fri Jan 8 03:17:30 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:17:30 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:17:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:17:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2391: Waiting for Server - FAILED kill -0 15933 >/dev/null 2>/dev/null selfserv_9591 with PID 15933 found at Fri Jan 8 03:17:36 EST 2016 selfserv_9591 with PID 15933 started at Fri Jan 8 03:17:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2392: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15933 at Fri Jan 8 03:17:36 EST 2016 kill -USR1 15933 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15933 killed at Fri Jan 8 03:17:37 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:17:37 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:17:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:17:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2393: Waiting for Server - FAILED kill -0 16003 >/dev/null 2>/dev/null selfserv_9591 with PID 16003 found at Fri Jan 8 03:17:43 EST 2016 selfserv_9591 with PID 16003 started at Fri Jan 8 03:17:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2394: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16003 at Fri Jan 8 03:17:43 EST 2016 kill -USR1 16003 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16003 killed at Fri Jan 8 03:17:44 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:17:44 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:17:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:17:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2395: Waiting for Server - FAILED kill -0 16072 >/dev/null 2>/dev/null selfserv_9591 with PID 16072 found at Fri Jan 8 03:17:50 EST 2016 selfserv_9591 with PID 16072 started at Fri Jan 8 03:17:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2396: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16072 at Fri Jan 8 03:17:50 EST 2016 kill -USR1 16072 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16072 killed at Fri Jan 8 03:17:51 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:17:51 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:17:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:17:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2397: Waiting for Server - FAILED kill -0 16141 >/dev/null 2>/dev/null selfserv_9591 with PID 16141 found at Fri Jan 8 03:17:57 EST 2016 selfserv_9591 with PID 16141 started at Fri Jan 8 03:17:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2398: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 16141 at Fri Jan 8 03:17:57 EST 2016 kill -USR1 16141 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16141 killed at Fri Jan 8 03:17:58 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:17:58 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:17:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:18:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2399: Waiting for Server - FAILED kill -0 16211 >/dev/null 2>/dev/null selfserv_9591 with PID 16211 found at Fri Jan 8 03:18:04 EST 2016 selfserv_9591 with PID 16211 started at Fri Jan 8 03:18:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2400: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16211 at Fri Jan 8 03:18:04 EST 2016 kill -USR1 16211 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16211 killed at Fri Jan 8 03:18:05 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:18:05 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:18:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:18:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2401: Waiting for Server - FAILED kill -0 16280 >/dev/null 2>/dev/null selfserv_9591 with PID 16280 found at Fri Jan 8 03:18:11 EST 2016 selfserv_9591 with PID 16280 started at Fri Jan 8 03:18:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2402: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16280 at Fri Jan 8 03:18:11 EST 2016 kill -USR1 16280 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16280 killed at Fri Jan 8 03:18:11 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:18:12 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:18:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:18:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2403: Waiting for Server - FAILED kill -0 16349 >/dev/null 2>/dev/null selfserv_9591 with PID 16349 found at Fri Jan 8 03:18:17 EST 2016 selfserv_9591 with PID 16349 started at Fri Jan 8 03:18:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2404: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16349 at Fri Jan 8 03:18:18 EST 2016 kill -USR1 16349 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16349 killed at Fri Jan 8 03:18:18 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:18:18 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:18:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:18:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2405: Waiting for Server - FAILED kill -0 16419 >/dev/null 2>/dev/null selfserv_9591 with PID 16419 found at Fri Jan 8 03:18:24 EST 2016 selfserv_9591 with PID 16419 started at Fri Jan 8 03:18:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2406: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 16419 at Fri Jan 8 03:18:25 EST 2016 kill -USR1 16419 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16419 killed at Fri Jan 8 03:18:25 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:18:25 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:18:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:18:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2407: Waiting for Server - FAILED kill -0 16488 >/dev/null 2>/dev/null selfserv_9591 with PID 16488 found at Fri Jan 8 03:18:31 EST 2016 selfserv_9591 with PID 16488 started at Fri Jan 8 03:18:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2408: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16488 at Fri Jan 8 03:18:32 EST 2016 kill -USR1 16488 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16488 killed at Fri Jan 8 03:18:32 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:18:32 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:18:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:18:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2409: Waiting for Server - FAILED kill -0 16557 >/dev/null 2>/dev/null selfserv_9591 with PID 16557 found at Fri Jan 8 03:18:38 EST 2016 selfserv_9591 with PID 16557 started at Fri Jan 8 03:18:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2410: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16557 at Fri Jan 8 03:18:39 EST 2016 kill -USR1 16557 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16557 killed at Fri Jan 8 03:18:39 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:18:39 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:18:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:18:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2411: Waiting for Server - FAILED kill -0 16627 >/dev/null 2>/dev/null selfserv_9591 with PID 16627 found at Fri Jan 8 03:18:45 EST 2016 selfserv_9591 with PID 16627 started at Fri Jan 8 03:18:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2412: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16627 at Fri Jan 8 03:18:46 EST 2016 kill -USR1 16627 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16627 killed at Fri Jan 8 03:18:46 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:18:46 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:18:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:18:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2413: Waiting for Server - FAILED kill -0 16696 >/dev/null 2>/dev/null selfserv_9591 with PID 16696 found at Fri Jan 8 03:18:52 EST 2016 selfserv_9591 with PID 16696 started at Fri Jan 8 03:18:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2414: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 16696 at Fri Jan 8 03:18:52 EST 2016 kill -USR1 16696 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16696 killed at Fri Jan 8 03:18:53 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:18:53 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:18:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:18:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2415: Waiting for Server - FAILED kill -0 16765 >/dev/null 2>/dev/null selfserv_9591 with PID 16765 found at Fri Jan 8 03:18:59 EST 2016 selfserv_9591 with PID 16765 started at Fri Jan 8 03:18:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2416: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16765 at Fri Jan 8 03:18:59 EST 2016 kill -USR1 16765 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16765 killed at Fri Jan 8 03:19:00 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:19:00 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:19:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:19:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2417: Waiting for Server - FAILED kill -0 16835 >/dev/null 2>/dev/null selfserv_9591 with PID 16835 found at Fri Jan 8 03:19:06 EST 2016 selfserv_9591 with PID 16835 started at Fri Jan 8 03:19:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2418: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16835 at Fri Jan 8 03:19:06 EST 2016 kill -USR1 16835 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16835 killed at Fri Jan 8 03:19:07 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:19:07 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:19:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:19:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2419: Waiting for Server - FAILED kill -0 16904 >/dev/null 2>/dev/null selfserv_9591 with PID 16904 found at Fri Jan 8 03:19:13 EST 2016 selfserv_9591 with PID 16904 started at Fri Jan 8 03:19:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2420: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16904 at Fri Jan 8 03:19:13 EST 2016 kill -USR1 16904 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16904 killed at Fri Jan 8 03:19:14 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:19:14 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:19:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:19:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2421: Waiting for Server - FAILED kill -0 16973 >/dev/null 2>/dev/null selfserv_9591 with PID 16973 found at Fri Jan 8 03:19:20 EST 2016 selfserv_9591 with PID 16973 started at Fri Jan 8 03:19:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2422: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 16973 at Fri Jan 8 03:19:20 EST 2016 kill -USR1 16973 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16973 killed at Fri Jan 8 03:19:21 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:19:21 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:19:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:19:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2423: Waiting for Server - FAILED kill -0 17043 >/dev/null 2>/dev/null selfserv_9591 with PID 17043 found at Fri Jan 8 03:19:27 EST 2016 selfserv_9591 with PID 17043 started at Fri Jan 8 03:19:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2424: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17043 at Fri Jan 8 03:19:27 EST 2016 kill -USR1 17043 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17043 killed at Fri Jan 8 03:19:27 EST 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server bypass/client normal - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client normal - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 03:19:28 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:19:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:19:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2425: Waiting for Server - FAILED kill -0 17226 >/dev/null 2>/dev/null selfserv_9591 with PID 17226 found at Fri Jan 8 03:19:34 EST 2016 selfserv_9591 with PID 17226 started at Fri Jan 8 03:19:34 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 03:19:34 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:19:34 EST 2016 ssl.sh: #2426: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 17226 at Fri Jan 8 03:19:35 EST 2016 kill -USR1 17226 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17226 killed at Fri Jan 8 03:19:35 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 03:19:35 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:19:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:19:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2427: Waiting for Server - FAILED kill -0 17305 >/dev/null 2>/dev/null selfserv_9591 with PID 17305 found at Fri Jan 8 03:19:41 EST 2016 selfserv_9591 with PID 17305 started at Fri Jan 8 03:19:41 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 03:19:41 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:19:41 EST 2016 ssl.sh: #2428: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 17305 at Fri Jan 8 03:19:42 EST 2016 kill -USR1 17305 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17305 killed at Fri Jan 8 03:19:42 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9591 starting at Fri Jan 8 03:19:42 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:19:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:19:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2429: Waiting for Server - FAILED kill -0 17385 >/dev/null 2>/dev/null selfserv_9591 with PID 17385 found at Fri Jan 8 03:19:48 EST 2016 selfserv_9591 with PID 17385 started at Fri Jan 8 03:19:48 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:19:48 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:19:48 EST 2016 ssl.sh: #2430: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 17385 at Fri Jan 8 03:19:49 EST 2016 kill -USR1 17385 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17385 killed at Fri Jan 8 03:19:49 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9591 starting at Fri Jan 8 03:19:49 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:19:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:19:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2431: Waiting for Server - FAILED kill -0 17464 >/dev/null 2>/dev/null selfserv_9591 with PID 17464 found at Fri Jan 8 03:19:55 EST 2016 selfserv_9591 with PID 17464 started at Fri Jan 8 03:19:55 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:19:55 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:19:56 EST 2016 ssl.sh: #2432: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17464 at Fri Jan 8 03:19:56 EST 2016 kill -USR1 17464 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17464 killed at Fri Jan 8 03:19:56 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9591 starting at Fri Jan 8 03:19:56 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:19:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:20:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2433: Waiting for Server - FAILED kill -0 17543 >/dev/null 2>/dev/null selfserv_9591 with PID 17543 found at Fri Jan 8 03:20:02 EST 2016 selfserv_9591 with PID 17543 started at Fri Jan 8 03:20:02 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:20:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:20:03 EST 2016 ssl.sh: #2434: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 17543 at Fri Jan 8 03:20:03 EST 2016 kill -USR1 17543 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17543 killed at Fri Jan 8 03:20:03 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9591 starting at Fri Jan 8 03:20:03 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:20:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:20:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2435: Waiting for Server - FAILED kill -0 17623 >/dev/null 2>/dev/null selfserv_9591 with PID 17623 found at Fri Jan 8 03:20:09 EST 2016 selfserv_9591 with PID 17623 started at Fri Jan 8 03:20:09 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:20:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:20:10 EST 2016 ssl.sh: #2436: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17623 at Fri Jan 8 03:20:10 EST 2016 kill -USR1 17623 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17623 killed at Fri Jan 8 03:20:10 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9591 starting at Fri Jan 8 03:20:10 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:20:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:20:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2437: Waiting for Server - FAILED kill -0 17702 >/dev/null 2>/dev/null selfserv_9591 with PID 17702 found at Fri Jan 8 03:20:16 EST 2016 selfserv_9591 with PID 17702 started at Fri Jan 8 03:20:16 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:20:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:20:17 EST 2016 ssl.sh: #2438: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17702 at Fri Jan 8 03:20:17 EST 2016 kill -USR1 17702 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17702 killed at Fri Jan 8 03:20:17 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:20:17 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:20:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:20:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2439: Waiting for Server - FAILED kill -0 17810 >/dev/null 2>/dev/null selfserv_9591 with PID 17810 found at Fri Jan 8 03:20:23 EST 2016 selfserv_9591 with PID 17810 started at Fri Jan 8 03:20:23 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 03:20:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:20:24 EST 2016 ssl.sh: #2440: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17810 at Fri Jan 8 03:20:24 EST 2016 kill -USR1 17810 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17810 killed at Fri Jan 8 03:20:24 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:20:24 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:20:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:20:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2441: Waiting for Server - FAILED kill -0 17890 >/dev/null 2>/dev/null selfserv_9591 with PID 17890 found at Fri Jan 8 03:20:30 EST 2016 selfserv_9591 with PID 17890 started at Fri Jan 8 03:20:30 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 03:20:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:20:31 EST 2016 ssl.sh: #2442: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17890 at Fri Jan 8 03:20:31 EST 2016 kill -USR1 17890 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17890 killed at Fri Jan 8 03:20:31 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:20:31 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:20:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:20:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2443: Waiting for Server - FAILED kill -0 17969 >/dev/null 2>/dev/null selfserv_9591 with PID 17969 found at Fri Jan 8 03:20:37 EST 2016 selfserv_9591 with PID 17969 started at Fri Jan 8 03:20:37 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:20:37 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:20:38 EST 2016 ssl.sh: #2444: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17969 at Fri Jan 8 03:20:38 EST 2016 kill -USR1 17969 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17969 killed at Fri Jan 8 03:20:38 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:20:38 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:20:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:20:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2445: Waiting for Server - FAILED kill -0 18048 >/dev/null 2>/dev/null selfserv_9591 with PID 18048 found at Fri Jan 8 03:20:44 EST 2016 selfserv_9591 with PID 18048 started at Fri Jan 8 03:20:44 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:20:44 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:20:45 EST 2016 ssl.sh: #2446: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 18048 at Fri Jan 8 03:20:45 EST 2016 kill -USR1 18048 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18048 killed at Fri Jan 8 03:20:45 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 03:20:45 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:20:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:20:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2447: Waiting for Server - FAILED kill -0 18128 >/dev/null 2>/dev/null selfserv_9591 with PID 18128 found at Fri Jan 8 03:20:51 EST 2016 selfserv_9591 with PID 18128 started at Fri Jan 8 03:20:51 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:20:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:20:52 EST 2016 ssl.sh: #2448: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 18128 at Fri Jan 8 03:20:52 EST 2016 kill -USR1 18128 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18128 killed at Fri Jan 8 03:20:52 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:20:52 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:20:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:20:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2449: Waiting for Server - FAILED kill -0 18207 >/dev/null 2>/dev/null selfserv_9591 with PID 18207 found at Fri Jan 8 03:20:58 EST 2016 selfserv_9591 with PID 18207 started at Fri Jan 8 03:20:58 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:20:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:20:59 EST 2016 ssl.sh: #2450: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 18207 at Fri Jan 8 03:20:59 EST 2016 kill -USR1 18207 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18207 killed at Fri Jan 8 03:20:59 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 03:20:59 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:20:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:21:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2451: Waiting for Server - FAILED kill -0 18286 >/dev/null 2>/dev/null selfserv_9591 with PID 18286 found at Fri Jan 8 03:21:05 EST 2016 selfserv_9591 with PID 18286 started at Fri Jan 8 03:21:05 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:21:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:21:06 EST 2016 ssl.sh: #2452: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 18286 at Fri Jan 8 03:21:06 EST 2016 kill -USR1 18286 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18286 killed at Fri Jan 8 03:21:06 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:21:07 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:21:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:21:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2453: Waiting for Server - FAILED kill -0 18395 >/dev/null 2>/dev/null selfserv_9591 with PID 18395 found at Fri Jan 8 03:21:13 EST 2016 selfserv_9591 with PID 18395 started at Fri Jan 8 03:21:13 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:21:13 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:21:13 EST 2016 ssl.sh: #2454: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 18395 at Fri Jan 8 03:21:13 EST 2016 kill -USR1 18395 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18395 killed at Fri Jan 8 03:21:14 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:21:14 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:21:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:21:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2455: Waiting for Server - FAILED kill -0 18474 >/dev/null 2>/dev/null selfserv_9591 with PID 18474 found at Fri Jan 8 03:21:20 EST 2016 selfserv_9591 with PID 18474 started at Fri Jan 8 03:21:20 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:21:20 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:21:20 EST 2016 ssl.sh: #2456: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 18474 at Fri Jan 8 03:21:20 EST 2016 kill -USR1 18474 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18474 killed at Fri Jan 8 03:21:21 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:21:21 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:21:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:21:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2457: Waiting for Server - FAILED kill -0 18554 >/dev/null 2>/dev/null selfserv_9591 with PID 18554 found at Fri Jan 8 03:21:27 EST 2016 selfserv_9591 with PID 18554 started at Fri Jan 8 03:21:27 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:21:27 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:21:27 EST 2016 ssl.sh: #2458: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 18554 at Fri Jan 8 03:21:27 EST 2016 kill -USR1 18554 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18554 killed at Fri Jan 8 03:21:28 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:21:28 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:21:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:21:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2459: Waiting for Server - FAILED kill -0 18635 >/dev/null 2>/dev/null selfserv_9591 with PID 18635 found at Fri Jan 8 03:21:34 EST 2016 selfserv_9591 with PID 18635 started at Fri Jan 8 03:21:34 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:21:34 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:21:34 EST 2016 ssl.sh: #2460: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 18635 at Fri Jan 8 03:21:34 EST 2016 kill -USR1 18635 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18635 killed at Fri Jan 8 03:21:35 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:21:35 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:21:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:21:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2461: Waiting for Server - FAILED kill -0 18716 >/dev/null 2>/dev/null selfserv_9591 with PID 18716 found at Fri Jan 8 03:21:41 EST 2016 selfserv_9591 with PID 18716 started at Fri Jan 8 03:21:41 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:21:41 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:21:41 EST 2016 ssl.sh: #2462: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 18716 at Fri Jan 8 03:21:41 EST 2016 kill -USR1 18716 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18716 killed at Fri Jan 8 03:21:42 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9591 starting at Fri Jan 8 03:21:42 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:21:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:21:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2463: Waiting for Server - FAILED kill -0 18795 >/dev/null 2>/dev/null selfserv_9591 with PID 18795 found at Fri Jan 8 03:21:48 EST 2016 selfserv_9591 with PID 18795 started at Fri Jan 8 03:21:48 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 03:21:48 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:21:48 EST 2016 ssl.sh: #2464: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 18795 at Fri Jan 8 03:21:48 EST 2016 kill -USR1 18795 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18795 killed at Fri Jan 8 03:21:49 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9591 starting at Fri Jan 8 03:21:49 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:21:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:21:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2465: Waiting for Server - FAILED kill -0 18875 >/dev/null 2>/dev/null selfserv_9591 with PID 18875 found at Fri Jan 8 03:21:55 EST 2016 selfserv_9591 with PID 18875 started at Fri Jan 8 03:21:55 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 03:21:55 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:21:55 EST 2016 ssl.sh: #2466: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 18875 at Fri Jan 8 03:21:55 EST 2016 kill -USR1 18875 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18875 killed at Fri Jan 8 03:21:56 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9591 starting at Fri Jan 8 03:21:56 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:21:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:22:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2467: Waiting for Server - FAILED kill -0 18954 >/dev/null 2>/dev/null selfserv_9591 with PID 18954 found at Fri Jan 8 03:22:02 EST 2016 selfserv_9591 with PID 18954 started at Fri Jan 8 03:22:02 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 03:22:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:22:02 EST 2016 ssl.sh: #2468: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 18954 at Fri Jan 8 03:22:02 EST 2016 kill -USR1 18954 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18954 killed at Fri Jan 8 03:22:03 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 03:22:03 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:22:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:22:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2469: Waiting for Server - FAILED kill -0 19033 >/dev/null 2>/dev/null selfserv_9591 with PID 19033 found at Fri Jan 8 03:22:09 EST 2016 selfserv_9591 with PID 19033 started at Fri Jan 8 03:22:09 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:22:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:22:09 EST 2016 ssl.sh: #2470: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 19033 at Fri Jan 8 03:22:09 EST 2016 kill -USR1 19033 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19033 killed at Fri Jan 8 03:22:10 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 03:22:10 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:22:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:22:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2471: Waiting for Server - FAILED kill -0 19113 >/dev/null 2>/dev/null selfserv_9591 with PID 19113 found at Fri Jan 8 03:22:16 EST 2016 selfserv_9591 with PID 19113 started at Fri Jan 8 03:22:16 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:22:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:22:16 EST 2016 ssl.sh: #2472: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 19113 at Fri Jan 8 03:22:16 EST 2016 kill -USR1 19113 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19113 killed at Fri Jan 8 03:22:17 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:22:17 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:22:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:22:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2473: Waiting for Server - FAILED kill -0 19213 >/dev/null 2>/dev/null selfserv_9591 with PID 19213 found at Fri Jan 8 03:22:23 EST 2016 selfserv_9591 with PID 19213 started at Fri Jan 8 03:22:23 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:22:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:22:23 EST 2016 ssl.sh: #2474: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 19213 at Fri Jan 8 03:22:23 EST 2016 kill -USR1 19213 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19213 killed at Fri Jan 8 03:22:24 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:22:24 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:22:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:22:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2475: Waiting for Server - FAILED kill -0 19292 >/dev/null 2>/dev/null selfserv_9591 with PID 19292 found at Fri Jan 8 03:22:30 EST 2016 selfserv_9591 with PID 19292 started at Fri Jan 8 03:22:30 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:22:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:22:30 EST 2016 ssl.sh: #2476: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 19292 at Fri Jan 8 03:22:30 EST 2016 kill -USR1 19292 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19292 killed at Fri Jan 8 03:22:31 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:22:31 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:22:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:22:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2477: Waiting for Server - FAILED kill -0 19372 >/dev/null 2>/dev/null selfserv_9591 with PID 19372 found at Fri Jan 8 03:22:37 EST 2016 selfserv_9591 with PID 19372 started at Fri Jan 8 03:22:37 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:22:37 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:22:37 EST 2016 ssl.sh: #2478: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 19372 at Fri Jan 8 03:22:37 EST 2016 kill -USR1 19372 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19372 killed at Fri Jan 8 03:22:38 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:22:38 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:22:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:22:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2479: Waiting for Server - FAILED kill -0 19451 >/dev/null 2>/dev/null selfserv_9591 with PID 19451 found at Fri Jan 8 03:22:44 EST 2016 selfserv_9591 with PID 19451 started at Fri Jan 8 03:22:44 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 03:22:44 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:22:44 EST 2016 ssl.sh: #2480: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 19451 at Fri Jan 8 03:22:44 EST 2016 kill -USR1 19451 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19451 killed at Fri Jan 8 03:22:45 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9591 starting at Fri Jan 8 03:22:45 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:22:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:22:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2481: Waiting for Server - FAILED kill -0 19531 >/dev/null 2>/dev/null selfserv_9591 with PID 19531 found at Fri Jan 8 03:22:51 EST 2016 selfserv_9591 with PID 19531 started at Fri Jan 8 03:22:51 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:22:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:22:51 EST 2016 ssl.sh: #2482: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 19531 at Fri Jan 8 03:22:51 EST 2016 kill -USR1 19531 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19531 killed at Fri Jan 8 03:22:52 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:22:52 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:22:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:22:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2483: Waiting for Server - FAILED kill -0 19610 >/dev/null 2>/dev/null selfserv_9591 with PID 19610 found at Fri Jan 8 03:22:58 EST 2016 selfserv_9591 with PID 19610 started at Fri Jan 8 03:22:58 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:22:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:22:58 EST 2016 ssl.sh: #2484: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 19610 at Fri Jan 8 03:22:59 EST 2016 kill -USR1 19610 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19610 killed at Fri Jan 8 03:22:59 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:22:59 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:22:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:23:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2485: Waiting for Server - FAILED kill -0 19710 >/dev/null 2>/dev/null selfserv_9591 with PID 19710 found at Fri Jan 8 03:23:05 EST 2016 selfserv_9591 with PID 19710 started at Fri Jan 8 03:23:05 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:23:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:23:06 EST 2016 ssl.sh: #2486: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 19710 at Fri Jan 8 03:23:06 EST 2016 kill -USR1 19710 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19710 killed at Fri Jan 8 03:23:06 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9591 starting at Fri Jan 8 03:23:06 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:23:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:23:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2487: Waiting for Server - FAILED kill -0 19790 >/dev/null 2>/dev/null selfserv_9591 with PID 19790 found at Fri Jan 8 03:23:12 EST 2016 selfserv_9591 with PID 19790 started at Fri Jan 8 03:23:12 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 03:23:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:23:13 EST 2016 ssl.sh: #2488: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 19790 at Fri Jan 8 03:23:13 EST 2016 kill -USR1 19790 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19790 killed at Fri Jan 8 03:23:13 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:23:13 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:23:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:23:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2489: Waiting for Server - FAILED kill -0 19870 >/dev/null 2>/dev/null selfserv_9591 with PID 19870 found at Fri Jan 8 03:23:19 EST 2016 selfserv_9591 with PID 19870 started at Fri Jan 8 03:23:19 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:23:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:23:20 EST 2016 ssl.sh: #2490: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 19870 at Fri Jan 8 03:23:20 EST 2016 kill -USR1 19870 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19870 killed at Fri Jan 8 03:23:20 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:23:20 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:23:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:23:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2491: Waiting for Server - FAILED kill -0 19949 >/dev/null 2>/dev/null selfserv_9591 with PID 19949 found at Fri Jan 8 03:23:26 EST 2016 selfserv_9591 with PID 19949 started at Fri Jan 8 03:23:26 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:23:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:23:27 EST 2016 ssl.sh: #2492: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 19949 at Fri Jan 8 03:23:27 EST 2016 kill -USR1 19949 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19949 killed at Fri Jan 8 03:23:27 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:23:27 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:23:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:23:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2493: Waiting for Server - FAILED kill -0 20043 >/dev/null 2>/dev/null selfserv_9591 with PID 20043 found at Fri Jan 8 03:23:33 EST 2016 selfserv_9591 with PID 20043 started at Fri Jan 8 03:23:33 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:23:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:23:34 EST 2016 ssl.sh: #2494: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20043 at Fri Jan 8 03:23:34 EST 2016 kill -USR1 20043 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20043 killed at Fri Jan 8 03:23:34 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9591 starting at Fri Jan 8 03:23:34 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:23:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:23:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2495: Waiting for Server - FAILED kill -0 20136 >/dev/null 2>/dev/null selfserv_9591 with PID 20136 found at Fri Jan 8 03:23:40 EST 2016 selfserv_9591 with PID 20136 started at Fri Jan 8 03:23:40 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:23:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:23:41 EST 2016 ssl.sh: #2496: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20136 at Fri Jan 8 03:23:41 EST 2016 kill -USR1 20136 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20136 killed at Fri Jan 8 03:23:41 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:23:41 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:23:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:23:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2497: Waiting for Server - FAILED kill -0 20215 >/dev/null 2>/dev/null selfserv_9591 with PID 20215 found at Fri Jan 8 03:23:47 EST 2016 selfserv_9591 with PID 20215 started at Fri Jan 8 03:23:47 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:23:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:23:48 EST 2016 ssl.sh: #2498: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20215 at Fri Jan 8 03:23:48 EST 2016 kill -USR1 20215 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20215 killed at Fri Jan 8 03:23:48 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:23:48 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:23:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:23:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2499: Waiting for Server - FAILED kill -0 20295 >/dev/null 2>/dev/null selfserv_9591 with PID 20295 found at Fri Jan 8 03:23:54 EST 2016 selfserv_9591 with PID 20295 started at Fri Jan 8 03:23:54 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:23:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:23:55 EST 2016 ssl.sh: #2500: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20295 at Fri Jan 8 03:23:55 EST 2016 kill -USR1 20295 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20295 killed at Fri Jan 8 03:23:55 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:23:55 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:23:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:24:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2501: Waiting for Server - FAILED kill -0 20395 >/dev/null 2>/dev/null selfserv_9591 with PID 20395 found at Fri Jan 8 03:24:01 EST 2016 selfserv_9591 with PID 20395 started at Fri Jan 8 03:24:01 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 03:24:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:24:02 EST 2016 ssl.sh: #2502: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20395 at Fri Jan 8 03:24:02 EST 2016 kill -USR1 20395 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20395 killed at Fri Jan 8 03:24:02 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:24:03 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:24:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:24:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2503: Waiting for Server - FAILED kill -0 20474 >/dev/null 2>/dev/null selfserv_9591 with PID 20474 found at Fri Jan 8 03:24:08 EST 2016 selfserv_9591 with PID 20474 started at Fri Jan 8 03:24:08 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 03:24:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:24:09 EST 2016 ssl.sh: #2504: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 20474 at Fri Jan 8 03:24:09 EST 2016 kill -USR1 20474 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20474 killed at Fri Jan 8 03:24:09 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:24:10 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:24:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:24:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2505: Waiting for Server - FAILED kill -0 20568 >/dev/null 2>/dev/null selfserv_9591 with PID 20568 found at Fri Jan 8 03:24:15 EST 2016 selfserv_9591 with PID 20568 started at Fri Jan 8 03:24:16 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 03:24:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:24:16 EST 2016 ssl.sh: #2506: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20568 at Fri Jan 8 03:24:16 EST 2016 kill -USR1 20568 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20568 killed at Fri Jan 8 03:24:16 EST 2016 ssl.sh: SSL Cipher Coverage - server normal/client bypass - with ECC =============================== selfserv_9591 starting at Fri Jan 8 03:24:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:24:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:24:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2507: Waiting for Server - FAILED kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:22 EST 2016 selfserv_9591 with PID 20640 started at Fri Jan 8 03:24:22 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2508: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2509: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2510: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2511: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2512: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2513: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2514: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2515: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2516: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2517: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2518: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2519: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2520: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2521: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2522: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2523: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2524: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2525: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2526: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2527: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2528: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2529: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2530: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2531: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2532: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2533: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2534: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2535: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2536: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2537: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2538: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2539: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2540: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2541: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2542: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2543: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2544: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2545: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2546: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2547: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2548: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2549: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2550: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2551: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2552: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2553: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2554: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2555: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2556: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2557: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2558: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2559: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2560: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2561: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2562: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2563: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2564: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2565: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2566: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2567: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2568: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2569: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2570: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2571: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2572: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2573: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2574: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20640 >/dev/null 2>/dev/null selfserv_9591 with PID 20640 found at Fri Jan 8 03:24:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2575: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 20640 at Fri Jan 8 03:24:59 EST 2016 kill -USR1 20640 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20640 killed at Fri Jan 8 03:25:00 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:25:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:25:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:25:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2576: Waiting for Server - FAILED kill -0 22740 >/dev/null 2>/dev/null selfserv_9591 with PID 22740 found at Fri Jan 8 03:25:06 EST 2016 selfserv_9591 with PID 22740 started at Fri Jan 8 03:25:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2577: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 22740 >/dev/null 2>/dev/null selfserv_9591 with PID 22740 found at Fri Jan 8 03:25:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2578: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 22740 >/dev/null 2>/dev/null selfserv_9591 with PID 22740 found at Fri Jan 8 03:25:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2579: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 22740 >/dev/null 2>/dev/null selfserv_9591 with PID 22740 found at Fri Jan 8 03:25:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2580: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 22740 >/dev/null 2>/dev/null selfserv_9591 with PID 22740 found at Fri Jan 8 03:25:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2581: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 22740 at Fri Jan 8 03:25:08 EST 2016 kill -USR1 22740 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22740 killed at Fri Jan 8 03:25:09 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:25:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:25:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:25:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2582: Waiting for Server - FAILED kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:15 EST 2016 selfserv_9591 with PID 22906 started at Fri Jan 8 03:25:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2583: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2584: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2585: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2586: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2587: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2588: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2589: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2590: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2591: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2592: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2593: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2594: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2595: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2596: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 22906 >/dev/null 2>/dev/null selfserv_9591 with PID 22906 found at Fri Jan 8 03:25:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2597: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 22906 at Fri Jan 8 03:25:23 EST 2016 kill -USR1 22906 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22906 killed at Fri Jan 8 03:25:23 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:25:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:25:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:25:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2598: Waiting for Server - FAILED kill -0 23319 >/dev/null 2>/dev/null selfserv_9591 with PID 23319 found at Fri Jan 8 03:25:29 EST 2016 selfserv_9591 with PID 23319 started at Fri Jan 8 03:25:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2599: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23319 >/dev/null 2>/dev/null selfserv_9591 with PID 23319 found at Fri Jan 8 03:25:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2600: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23319 >/dev/null 2>/dev/null selfserv_9591 with PID 23319 found at Fri Jan 8 03:25:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2601: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23319 >/dev/null 2>/dev/null selfserv_9591 with PID 23319 found at Fri Jan 8 03:25:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2602: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23319 >/dev/null 2>/dev/null selfserv_9591 with PID 23319 found at Fri Jan 8 03:25:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2603: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 23319 at Fri Jan 8 03:25:32 EST 2016 kill -USR1 23319 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23319 killed at Fri Jan 8 03:25:32 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:25:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:25:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:25:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2604: Waiting for Server - FAILED kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:38 EST 2016 selfserv_9591 with PID 23485 started at Fri Jan 8 03:25:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2605: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2606: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2607: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2608: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2609: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2610: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2611: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2612: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2613: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2614: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2615: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2616: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2617: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2618: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23485 >/dev/null 2>/dev/null selfserv_9591 with PID 23485 found at Fri Jan 8 03:25:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2619: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 23485 at Fri Jan 8 03:25:46 EST 2016 kill -USR1 23485 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23485 killed at Fri Jan 8 03:25:46 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:25:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:25:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:25:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2620: Waiting for Server - FAILED kill -0 23901 >/dev/null 2>/dev/null selfserv_9591 with PID 23901 found at Fri Jan 8 03:25:52 EST 2016 selfserv_9591 with PID 23901 started at Fri Jan 8 03:25:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2621: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23901 >/dev/null 2>/dev/null selfserv_9591 with PID 23901 found at Fri Jan 8 03:25:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2622: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23901 >/dev/null 2>/dev/null selfserv_9591 with PID 23901 found at Fri Jan 8 03:25:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2623: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23901 >/dev/null 2>/dev/null selfserv_9591 with PID 23901 found at Fri Jan 8 03:25:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2624: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23901 >/dev/null 2>/dev/null selfserv_9591 with PID 23901 found at Fri Jan 8 03:25:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2625: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 23901 at Fri Jan 8 03:25:55 EST 2016 kill -USR1 23901 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23901 killed at Fri Jan 8 03:25:55 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:25:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:25:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:26:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2626: Waiting for Server - FAILED kill -0 24067 >/dev/null 2>/dev/null selfserv_9591 with PID 24067 found at Fri Jan 8 03:26:01 EST 2016 selfserv_9591 with PID 24067 started at Fri Jan 8 03:26:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2627: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 24067 >/dev/null 2>/dev/null selfserv_9591 with PID 24067 found at Fri Jan 8 03:26:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2628: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 24067 >/dev/null 2>/dev/null selfserv_9591 with PID 24067 found at Fri Jan 8 03:26:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2629: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 24067 >/dev/null 2>/dev/null selfserv_9591 with PID 24067 found at Fri Jan 8 03:26:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2630: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 24067 >/dev/null 2>/dev/null selfserv_9591 with PID 24067 found at Fri Jan 8 03:26:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2631: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 24067 >/dev/null 2>/dev/null selfserv_9591 with PID 24067 found at Fri Jan 8 03:26:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2632: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 24067 >/dev/null 2>/dev/null selfserv_9591 with PID 24067 found at Fri Jan 8 03:26:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2633: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 24067 >/dev/null 2>/dev/null selfserv_9591 with PID 24067 found at Fri Jan 8 03:26:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2634: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 24067 >/dev/null 2>/dev/null selfserv_9591 with PID 24067 found at Fri Jan 8 03:26:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2635: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 24067 >/dev/null 2>/dev/null selfserv_9591 with PID 24067 found at Fri Jan 8 03:26:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2636: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 24067 >/dev/null 2>/dev/null selfserv_9591 with PID 24067 found at Fri Jan 8 03:26:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2637: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 24067 >/dev/null 2>/dev/null selfserv_9591 with PID 24067 found at Fri Jan 8 03:26:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2638: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 24067 >/dev/null 2>/dev/null selfserv_9591 with PID 24067 found at Fri Jan 8 03:26:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2639: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24067 at Fri Jan 8 03:26:08 EST 2016 kill -USR1 24067 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24067 killed at Fri Jan 8 03:26:08 EST 2016 ssl.sh: SSL Client Authentication - server normal/client bypass - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:26:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:26:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:26:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2640: Waiting for Server - FAILED kill -0 24474 >/dev/null 2>/dev/null selfserv_9591 with PID 24474 found at Fri Jan 8 03:26:14 EST 2016 selfserv_9591 with PID 24474 started at Fri Jan 8 03:26:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2641: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24474 at Fri Jan 8 03:26:15 EST 2016 kill -USR1 24474 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24474 killed at Fri Jan 8 03:26:15 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:26:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:26:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:26:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2642: Waiting for Server - FAILED kill -0 24547 >/dev/null 2>/dev/null selfserv_9591 with PID 24547 found at Fri Jan 8 03:26:21 EST 2016 selfserv_9591 with PID 24547 started at Fri Jan 8 03:26:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2643: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24547 at Fri Jan 8 03:26:22 EST 2016 kill -USR1 24547 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24547 killed at Fri Jan 8 03:26:22 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:26:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:26:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:26:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2644: Waiting for Server - FAILED kill -0 24616 >/dev/null 2>/dev/null selfserv_9591 with PID 24616 found at Fri Jan 8 03:26:28 EST 2016 selfserv_9591 with PID 24616 started at Fri Jan 8 03:26:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2645: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24616 at Fri Jan 8 03:26:29 EST 2016 kill -USR1 24616 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24616 killed at Fri Jan 8 03:26:29 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:26:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:26:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:26:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2646: Waiting for Server - FAILED kill -0 24685 >/dev/null 2>/dev/null selfserv_9591 with PID 24685 found at Fri Jan 8 03:26:35 EST 2016 selfserv_9591 with PID 24685 started at Fri Jan 8 03:26:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2647: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 24685 at Fri Jan 8 03:26:36 EST 2016 kill -USR1 24685 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24685 killed at Fri Jan 8 03:26:36 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:26:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:26:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:26:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2648: Waiting for Server - FAILED kill -0 24755 >/dev/null 2>/dev/null selfserv_9591 with PID 24755 found at Fri Jan 8 03:26:42 EST 2016 selfserv_9591 with PID 24755 started at Fri Jan 8 03:26:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2649: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 24755 at Fri Jan 8 03:26:43 EST 2016 kill -USR1 24755 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24755 killed at Fri Jan 8 03:26:43 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:26:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:26:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:26:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2650: Waiting for Server - FAILED kill -0 24824 >/dev/null 2>/dev/null selfserv_9591 with PID 24824 found at Fri Jan 8 03:26:49 EST 2016 selfserv_9591 with PID 24824 started at Fri Jan 8 03:26:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2651: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24824 at Fri Jan 8 03:26:50 EST 2016 kill -USR1 24824 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24824 killed at Fri Jan 8 03:26:50 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:26:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:26:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:26:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2652: Waiting for Server - FAILED kill -0 24893 >/dev/null 2>/dev/null selfserv_9591 with PID 24893 found at Fri Jan 8 03:26:56 EST 2016 selfserv_9591 with PID 24893 started at Fri Jan 8 03:26:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2653: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24893 at Fri Jan 8 03:26:56 EST 2016 kill -USR1 24893 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24893 killed at Fri Jan 8 03:26:57 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:26:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:26:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:27:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2654: Waiting for Server - FAILED kill -0 24963 >/dev/null 2>/dev/null selfserv_9591 with PID 24963 found at Fri Jan 8 03:27:03 EST 2016 selfserv_9591 with PID 24963 started at Fri Jan 8 03:27:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2655: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24963 at Fri Jan 8 03:27:03 EST 2016 kill -USR1 24963 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24963 killed at Fri Jan 8 03:27:04 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:27:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:27:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:27:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2656: Waiting for Server - FAILED kill -0 25062 >/dev/null 2>/dev/null selfserv_9591 with PID 25062 found at Fri Jan 8 03:27:10 EST 2016 selfserv_9591 with PID 25062 started at Fri Jan 8 03:27:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2657: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25062 at Fri Jan 8 03:27:10 EST 2016 kill -USR1 25062 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25062 killed at Fri Jan 8 03:27:11 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:27:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:27:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:27:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2658: Waiting for Server - FAILED kill -0 25131 >/dev/null 2>/dev/null selfserv_9591 with PID 25131 found at Fri Jan 8 03:27:17 EST 2016 selfserv_9591 with PID 25131 started at Fri Jan 8 03:27:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2659: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 25131 at Fri Jan 8 03:27:17 EST 2016 kill -USR1 25131 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25131 killed at Fri Jan 8 03:27:18 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:27:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:27:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:27:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2660: Waiting for Server - FAILED kill -0 25201 >/dev/null 2>/dev/null selfserv_9591 with PID 25201 found at Fri Jan 8 03:27:24 EST 2016 selfserv_9591 with PID 25201 started at Fri Jan 8 03:27:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2661: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 25201 at Fri Jan 8 03:27:24 EST 2016 kill -USR1 25201 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25201 killed at Fri Jan 8 03:27:25 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:27:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:27:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:27:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2662: Waiting for Server - FAILED kill -0 25270 >/dev/null 2>/dev/null selfserv_9591 with PID 25270 found at Fri Jan 8 03:27:31 EST 2016 selfserv_9591 with PID 25270 started at Fri Jan 8 03:27:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2663: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25270 at Fri Jan 8 03:27:31 EST 2016 kill -USR1 25270 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25270 killed at Fri Jan 8 03:27:32 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:27:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:27:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:27:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2664: Waiting for Server - FAILED kill -0 25339 >/dev/null 2>/dev/null selfserv_9591 with PID 25339 found at Fri Jan 8 03:27:38 EST 2016 selfserv_9591 with PID 25339 started at Fri Jan 8 03:27:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2665: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25339 at Fri Jan 8 03:27:38 EST 2016 kill -USR1 25339 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25339 killed at Fri Jan 8 03:27:38 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:27:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:27:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:27:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2666: Waiting for Server - FAILED kill -0 25409 >/dev/null 2>/dev/null selfserv_9591 with PID 25409 found at Fri Jan 8 03:27:44 EST 2016 selfserv_9591 with PID 25409 started at Fri Jan 8 03:27:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2667: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25409 at Fri Jan 8 03:27:45 EST 2016 kill -USR1 25409 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25409 killed at Fri Jan 8 03:27:45 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:27:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:27:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:27:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2668: Waiting for Server - FAILED kill -0 25478 >/dev/null 2>/dev/null selfserv_9591 with PID 25478 found at Fri Jan 8 03:27:51 EST 2016 selfserv_9591 with PID 25478 started at Fri Jan 8 03:27:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2669: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25478 at Fri Jan 8 03:27:52 EST 2016 kill -USR1 25478 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25478 killed at Fri Jan 8 03:27:52 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:27:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:27:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:27:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2670: Waiting for Server - FAILED kill -0 25547 >/dev/null 2>/dev/null selfserv_9591 with PID 25547 found at Fri Jan 8 03:27:58 EST 2016 selfserv_9591 with PID 25547 started at Fri Jan 8 03:27:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2671: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 25547 at Fri Jan 8 03:27:59 EST 2016 kill -USR1 25547 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25547 killed at Fri Jan 8 03:27:59 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:27:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:27:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:28:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2672: Waiting for Server - FAILED kill -0 25617 >/dev/null 2>/dev/null selfserv_9591 with PID 25617 found at Fri Jan 8 03:28:05 EST 2016 selfserv_9591 with PID 25617 started at Fri Jan 8 03:28:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2673: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 25617 at Fri Jan 8 03:28:06 EST 2016 kill -USR1 25617 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25617 killed at Fri Jan 8 03:28:06 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:28:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:28:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:28:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2674: Waiting for Server - FAILED kill -0 25686 >/dev/null 2>/dev/null selfserv_9591 with PID 25686 found at Fri Jan 8 03:28:12 EST 2016 selfserv_9591 with PID 25686 started at Fri Jan 8 03:28:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2675: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25686 at Fri Jan 8 03:28:13 EST 2016 kill -USR1 25686 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25686 killed at Fri Jan 8 03:28:13 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:28:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:28:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:28:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2676: Waiting for Server - FAILED kill -0 25756 >/dev/null 2>/dev/null selfserv_9591 with PID 25756 found at Fri Jan 8 03:28:19 EST 2016 selfserv_9591 with PID 25756 started at Fri Jan 8 03:28:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2677: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25756 at Fri Jan 8 03:28:20 EST 2016 kill -USR1 25756 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25756 killed at Fri Jan 8 03:28:20 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:28:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:28:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:28:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2678: Waiting for Server - FAILED kill -0 25825 >/dev/null 2>/dev/null selfserv_9591 with PID 25825 found at Fri Jan 8 03:28:26 EST 2016 selfserv_9591 with PID 25825 started at Fri Jan 8 03:28:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2679: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25825 at Fri Jan 8 03:28:26 EST 2016 kill -USR1 25825 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25825 killed at Fri Jan 8 03:28:27 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:28:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:28:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:28:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2680: Waiting for Server - FAILED kill -0 25894 >/dev/null 2>/dev/null selfserv_9591 with PID 25894 found at Fri Jan 8 03:28:33 EST 2016 selfserv_9591 with PID 25894 started at Fri Jan 8 03:28:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2681: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25894 at Fri Jan 8 03:28:33 EST 2016 kill -USR1 25894 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25894 killed at Fri Jan 8 03:28:34 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:28:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:28:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:28:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2682: Waiting for Server - FAILED kill -0 25964 >/dev/null 2>/dev/null selfserv_9591 with PID 25964 found at Fri Jan 8 03:28:40 EST 2016 selfserv_9591 with PID 25964 started at Fri Jan 8 03:28:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2683: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 25964 at Fri Jan 8 03:28:40 EST 2016 kill -USR1 25964 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25964 killed at Fri Jan 8 03:28:41 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:28:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:28:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:28:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2684: Waiting for Server - FAILED kill -0 26033 >/dev/null 2>/dev/null selfserv_9591 with PID 26033 found at Fri Jan 8 03:28:47 EST 2016 selfserv_9591 with PID 26033 started at Fri Jan 8 03:28:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2685: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26033 at Fri Jan 8 03:28:47 EST 2016 kill -USR1 26033 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26033 killed at Fri Jan 8 03:28:48 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:28:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:28:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:28:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2686: Waiting for Server - FAILED kill -0 26102 >/dev/null 2>/dev/null selfserv_9591 with PID 26102 found at Fri Jan 8 03:28:54 EST 2016 selfserv_9591 with PID 26102 started at Fri Jan 8 03:28:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2687: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26102 at Fri Jan 8 03:28:54 EST 2016 kill -USR1 26102 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26102 killed at Fri Jan 8 03:28:54 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:28:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:28:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:29:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2688: Waiting for Server - FAILED kill -0 26172 >/dev/null 2>/dev/null selfserv_9591 with PID 26172 found at Fri Jan 8 03:29:00 EST 2016 selfserv_9591 with PID 26172 started at Fri Jan 8 03:29:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2689: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26172 at Fri Jan 8 03:29:01 EST 2016 kill -USR1 26172 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26172 killed at Fri Jan 8 03:29:01 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:29:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:29:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:29:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2690: Waiting for Server - FAILED kill -0 26241 >/dev/null 2>/dev/null selfserv_9591 with PID 26241 found at Fri Jan 8 03:29:07 EST 2016 selfserv_9591 with PID 26241 started at Fri Jan 8 03:29:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2691: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26241 at Fri Jan 8 03:29:08 EST 2016 kill -USR1 26241 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26241 killed at Fri Jan 8 03:29:08 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:29:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:29:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:29:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2692: Waiting for Server - FAILED kill -0 26310 >/dev/null 2>/dev/null selfserv_9591 with PID 26310 found at Fri Jan 8 03:29:14 EST 2016 selfserv_9591 with PID 26310 started at Fri Jan 8 03:29:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2693: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26310 at Fri Jan 8 03:29:15 EST 2016 kill -USR1 26310 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26310 killed at Fri Jan 8 03:29:15 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:29:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:29:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:29:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2694: Waiting for Server - FAILED kill -0 26380 >/dev/null 2>/dev/null selfserv_9591 with PID 26380 found at Fri Jan 8 03:29:21 EST 2016 selfserv_9591 with PID 26380 started at Fri Jan 8 03:29:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2695: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26380 at Fri Jan 8 03:29:22 EST 2016 kill -USR1 26380 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26380 killed at Fri Jan 8 03:29:22 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:29:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:29:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:29:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2696: Waiting for Server - FAILED kill -0 26449 >/dev/null 2>/dev/null selfserv_9591 with PID 26449 found at Fri Jan 8 03:29:28 EST 2016 selfserv_9591 with PID 26449 started at Fri Jan 8 03:29:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2697: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26449 at Fri Jan 8 03:29:29 EST 2016 kill -USR1 26449 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26449 killed at Fri Jan 8 03:29:29 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:29:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:29:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:29:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2698: Waiting for Server - FAILED kill -0 26518 >/dev/null 2>/dev/null selfserv_9591 with PID 26518 found at Fri Jan 8 03:29:35 EST 2016 selfserv_9591 with PID 26518 started at Fri Jan 8 03:29:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2699: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26518 at Fri Jan 8 03:29:36 EST 2016 kill -USR1 26518 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26518 killed at Fri Jan 8 03:29:36 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:29:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:29:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:29:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2700: Waiting for Server - FAILED kill -0 26603 >/dev/null 2>/dev/null selfserv_9591 with PID 26603 found at Fri Jan 8 03:29:42 EST 2016 selfserv_9591 with PID 26603 started at Fri Jan 8 03:29:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2701: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26603 at Fri Jan 8 03:29:43 EST 2016 kill -USR1 26603 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26603 killed at Fri Jan 8 03:29:43 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:29:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:29:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:29:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2702: Waiting for Server - FAILED kill -0 26672 >/dev/null 2>/dev/null selfserv_9591 with PID 26672 found at Fri Jan 8 03:29:49 EST 2016 selfserv_9591 with PID 26672 started at Fri Jan 8 03:29:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2703: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26672 at Fri Jan 8 03:29:49 EST 2016 kill -USR1 26672 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26672 killed at Fri Jan 8 03:29:50 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:29:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:29:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:29:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2704: Waiting for Server - FAILED kill -0 26741 >/dev/null 2>/dev/null selfserv_9591 with PID 26741 found at Fri Jan 8 03:29:56 EST 2016 selfserv_9591 with PID 26741 started at Fri Jan 8 03:29:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2705: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26741 at Fri Jan 8 03:29:56 EST 2016 kill -USR1 26741 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26741 killed at Fri Jan 8 03:29:57 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:29:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:29:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:30:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2706: Waiting for Server - FAILED kill -0 26811 >/dev/null 2>/dev/null selfserv_9591 with PID 26811 found at Fri Jan 8 03:30:03 EST 2016 selfserv_9591 with PID 26811 started at Fri Jan 8 03:30:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2707: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26811 at Fri Jan 8 03:30:03 EST 2016 kill -USR1 26811 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26811 killed at Fri Jan 8 03:30:04 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:30:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:30:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:30:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2708: Waiting for Server - FAILED kill -0 26880 >/dev/null 2>/dev/null selfserv_9591 with PID 26880 found at Fri Jan 8 03:30:10 EST 2016 selfserv_9591 with PID 26880 started at Fri Jan 8 03:30:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2709: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26880 at Fri Jan 8 03:30:10 EST 2016 kill -USR1 26880 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26880 killed at Fri Jan 8 03:30:11 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:30:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:30:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:30:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2710: Waiting for Server - FAILED kill -0 26949 >/dev/null 2>/dev/null selfserv_9591 with PID 26949 found at Fri Jan 8 03:30:17 EST 2016 selfserv_9591 with PID 26949 started at Fri Jan 8 03:30:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2711: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26949 at Fri Jan 8 03:30:17 EST 2016 kill -USR1 26949 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26949 killed at Fri Jan 8 03:30:18 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:30:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:30:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:30:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2712: Waiting for Server - FAILED kill -0 27019 >/dev/null 2>/dev/null selfserv_9591 with PID 27019 found at Fri Jan 8 03:30:23 EST 2016 selfserv_9591 with PID 27019 started at Fri Jan 8 03:30:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2713: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27019 at Fri Jan 8 03:30:24 EST 2016 kill -USR1 27019 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27019 killed at Fri Jan 8 03:30:24 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:30:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:30:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:30:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2714: Waiting for Server - FAILED kill -0 27088 >/dev/null 2>/dev/null selfserv_9591 with PID 27088 found at Fri Jan 8 03:30:30 EST 2016 selfserv_9591 with PID 27088 started at Fri Jan 8 03:30:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2715: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27088 at Fri Jan 8 03:30:31 EST 2016 kill -USR1 27088 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27088 killed at Fri Jan 8 03:30:31 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:30:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:30:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:30:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2716: Waiting for Server - FAILED kill -0 27158 >/dev/null 2>/dev/null selfserv_9591 with PID 27158 found at Fri Jan 8 03:30:37 EST 2016 selfserv_9591 with PID 27158 started at Fri Jan 8 03:30:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2717: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27158 at Fri Jan 8 03:30:38 EST 2016 kill -USR1 27158 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27158 killed at Fri Jan 8 03:30:38 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:30:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:30:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:30:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2718: Waiting for Server - FAILED kill -0 27228 >/dev/null 2>/dev/null selfserv_9591 with PID 27228 found at Fri Jan 8 03:30:44 EST 2016 selfserv_9591 with PID 27228 started at Fri Jan 8 03:30:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2719: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27228 at Fri Jan 8 03:30:45 EST 2016 kill -USR1 27228 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27228 killed at Fri Jan 8 03:30:45 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:30:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:30:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:30:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2720: Waiting for Server - FAILED kill -0 27297 >/dev/null 2>/dev/null selfserv_9591 with PID 27297 found at Fri Jan 8 03:30:51 EST 2016 selfserv_9591 with PID 27297 started at Fri Jan 8 03:30:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2721: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27297 at Fri Jan 8 03:30:52 EST 2016 kill -USR1 27297 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27297 killed at Fri Jan 8 03:30:52 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:30:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:30:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:30:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2722: Waiting for Server - FAILED kill -0 27366 >/dev/null 2>/dev/null selfserv_9591 with PID 27366 found at Fri Jan 8 03:30:58 EST 2016 selfserv_9591 with PID 27366 started at Fri Jan 8 03:30:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2723: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27366 at Fri Jan 8 03:30:59 EST 2016 kill -USR1 27366 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27366 killed at Fri Jan 8 03:30:59 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:30:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:30:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:31:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2724: Waiting for Server - FAILED kill -0 27436 >/dev/null 2>/dev/null selfserv_9591 with PID 27436 found at Fri Jan 8 03:31:05 EST 2016 selfserv_9591 with PID 27436 started at Fri Jan 8 03:31:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2725: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27436 at Fri Jan 8 03:31:05 EST 2016 kill -USR1 27436 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27436 killed at Fri Jan 8 03:31:06 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:31:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:31:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:31:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2726: Waiting for Server - FAILED kill -0 27507 >/dev/null 2>/dev/null selfserv_9591 with PID 27507 found at Fri Jan 8 03:31:12 EST 2016 selfserv_9591 with PID 27507 started at Fri Jan 8 03:31:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2727: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27507 at Fri Jan 8 03:31:12 EST 2016 kill -USR1 27507 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27507 killed at Fri Jan 8 03:31:13 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:31:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:31:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:31:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2728: Waiting for Server - FAILED kill -0 27578 >/dev/null 2>/dev/null selfserv_9591 with PID 27578 found at Fri Jan 8 03:31:19 EST 2016 selfserv_9591 with PID 27578 started at Fri Jan 8 03:31:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2729: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27578 at Fri Jan 8 03:31:19 EST 2016 kill -USR1 27578 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27578 killed at Fri Jan 8 03:31:20 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:31:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:31:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:31:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2730: Waiting for Server - FAILED kill -0 27648 >/dev/null 2>/dev/null selfserv_9591 with PID 27648 found at Fri Jan 8 03:31:26 EST 2016 selfserv_9591 with PID 27648 started at Fri Jan 8 03:31:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2731: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27648 at Fri Jan 8 03:31:26 EST 2016 kill -USR1 27648 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27648 killed at Fri Jan 8 03:31:27 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:31:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:31:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:31:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2732: Waiting for Server - FAILED kill -0 27717 >/dev/null 2>/dev/null selfserv_9591 with PID 27717 found at Fri Jan 8 03:31:33 EST 2016 selfserv_9591 with PID 27717 started at Fri Jan 8 03:31:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2733: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27717 at Fri Jan 8 03:31:33 EST 2016 kill -USR1 27717 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27717 killed at Fri Jan 8 03:31:34 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:31:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:31:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:31:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2734: Waiting for Server - FAILED kill -0 27786 >/dev/null 2>/dev/null selfserv_9591 with PID 27786 found at Fri Jan 8 03:31:40 EST 2016 selfserv_9591 with PID 27786 started at Fri Jan 8 03:31:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2735: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27786 at Fri Jan 8 03:31:40 EST 2016 kill -USR1 27786 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27786 killed at Fri Jan 8 03:31:40 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:31:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:31:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:31:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2736: Waiting for Server - FAILED kill -0 27856 >/dev/null 2>/dev/null selfserv_9591 with PID 27856 found at Fri Jan 8 03:31:46 EST 2016 selfserv_9591 with PID 27856 started at Fri Jan 8 03:31:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2737: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27856 at Fri Jan 8 03:31:47 EST 2016 kill -USR1 27856 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27856 killed at Fri Jan 8 03:31:47 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:31:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:31:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:31:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2738: Waiting for Server - FAILED kill -0 27925 >/dev/null 2>/dev/null selfserv_9591 with PID 27925 found at Fri Jan 8 03:31:53 EST 2016 selfserv_9591 with PID 27925 started at Fri Jan 8 03:31:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2739: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27925 at Fri Jan 8 03:31:54 EST 2016 kill -USR1 27925 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27925 killed at Fri Jan 8 03:31:54 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 03:31:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:31:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:32:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2740: Waiting for Server - FAILED kill -0 28015 >/dev/null 2>/dev/null selfserv_9591 with PID 28015 found at Fri Jan 8 03:32:00 EST 2016 selfserv_9591 with PID 28015 started at Fri Jan 8 03:32:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2741: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28015 at Fri Jan 8 03:32:01 EST 2016 kill -USR1 28015 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28015 killed at Fri Jan 8 03:32:01 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9591 starting at Fri Jan 8 03:32:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:32:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:32:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2742: Waiting for Server - FAILED kill -0 28091 >/dev/null 2>/dev/null selfserv_9591 with PID 28091 found at Fri Jan 8 03:32:07 EST 2016 selfserv_9591 with PID 28091 started at Fri Jan 8 03:32:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2743: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28091 at Fri Jan 8 03:32:08 EST 2016 kill -USR1 28091 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28091 killed at Fri Jan 8 03:32:08 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9591 starting at Fri Jan 8 03:32:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:32:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:32:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2744: Waiting for Server - FAILED kill -0 28166 >/dev/null 2>/dev/null selfserv_9591 with PID 28166 found at Fri Jan 8 03:32:14 EST 2016 selfserv_9591 with PID 28166 started at Fri Jan 8 03:32:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2745: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 28166 at Fri Jan 8 03:32:15 EST 2016 kill -USR1 28166 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28166 killed at Fri Jan 8 03:32:15 EST 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 03:32:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:32:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:32:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2746: Waiting for Server - FAILED kill -0 28241 >/dev/null 2>/dev/null selfserv_9591 with PID 28241 found at Fri Jan 8 03:32:21 EST 2016 selfserv_9591 with PID 28241 started at Fri Jan 8 03:32:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2747: SSL3 Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28241 at Fri Jan 8 03:32:22 EST 2016 kill -USR1 28241 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28241 killed at Fri Jan 8 03:32:22 EST 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9591 starting at Fri Jan 8 03:32:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:32:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:32:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2748: Waiting for Server - FAILED kill -0 28318 >/dev/null 2>/dev/null selfserv_9591 with PID 28318 found at Fri Jan 8 03:32:28 EST 2016 selfserv_9591 with PID 28318 started at Fri Jan 8 03:32:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c vssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2749: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 28318 at Fri Jan 8 03:32:29 EST 2016 kill -USR1 28318 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28318 killed at Fri Jan 8 03:32:29 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 03:32:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:32:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:32:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2750: Waiting for Server - FAILED kill -0 28393 >/dev/null 2>/dev/null selfserv_9591 with PID 28393 found at Fri Jan 8 03:32:35 EST 2016 selfserv_9591 with PID 28393 started at Fri Jan 8 03:32:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2751: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28393 at Fri Jan 8 03:32:36 EST 2016 kill -USR1 28393 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28393 killed at Fri Jan 8 03:32:36 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9591 starting at Fri Jan 8 03:32:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:32:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:32:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2752: Waiting for Server - FAILED kill -0 28468 >/dev/null 2>/dev/null selfserv_9591 with PID 28468 found at Fri Jan 8 03:32:42 EST 2016 selfserv_9591 with PID 28468 started at Fri Jan 8 03:32:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2753: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28468 at Fri Jan 8 03:32:43 EST 2016 kill -USR1 28468 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28468 killed at Fri Jan 8 03:32:43 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9591 starting at Fri Jan 8 03:32:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:32:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:32:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2754: Waiting for Server - FAILED kill -0 28544 >/dev/null 2>/dev/null selfserv_9591 with PID 28544 found at Fri Jan 8 03:32:49 EST 2016 selfserv_9591 with PID 28544 started at Fri Jan 8 03:32:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2755: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 28544 at Fri Jan 8 03:32:49 EST 2016 kill -USR1 28544 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28544 killed at Fri Jan 8 03:32:50 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9591 starting at Fri Jan 8 03:32:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:32:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:32:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2756: Waiting for Server - FAILED kill -0 28619 >/dev/null 2>/dev/null selfserv_9591 with PID 28619 found at Fri Jan 8 03:32:56 EST 2016 selfserv_9591 with PID 28619 started at Fri Jan 8 03:32:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2757: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 28619 at Fri Jan 8 03:32:56 EST 2016 kill -USR1 28619 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28619 killed at Fri Jan 8 03:32:57 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9591 starting at Fri Jan 8 03:32:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:32:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:33:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2758: Waiting for Server - FAILED kill -0 28694 >/dev/null 2>/dev/null selfserv_9591 with PID 28694 found at Fri Jan 8 03:33:03 EST 2016 selfserv_9591 with PID 28694 started at Fri Jan 8 03:33:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2759: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 28694 at Fri Jan 8 03:33:03 EST 2016 kill -USR1 28694 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28694 killed at Fri Jan 8 03:33:04 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client bypass - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9591 starting at Fri Jan 8 03:33:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:33:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:33:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2760: Waiting for Server - FAILED kill -0 28756 >/dev/null 2>/dev/null selfserv_9591 with PID 28756 found at Fri Jan 8 03:33:10 EST 2016 selfserv_9591 with PID 28756 started at Fri Jan 8 03:33:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2761: OCSP stapling, signed response, good status produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28756 at Fri Jan 8 03:33:10 EST 2016 kill -USR1 28756 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28756 killed at Fri Jan 8 03:33:11 EST 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9591 starting at Fri Jan 8 03:33:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:33:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:33:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2762: Waiting for Server - FAILED kill -0 28817 >/dev/null 2>/dev/null selfserv_9591 with PID 28817 found at Fri Jan 8 03:33:17 EST 2016 selfserv_9591 with PID 28817 started at Fri Jan 8 03:33:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2763: OCSP stapling, signed response, revoked status produced a returncode of 1, expected is 3 - FAILED trying to kill selfserv_9591 with PID 28817 at Fri Jan 8 03:33:17 EST 2016 kill -USR1 28817 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28817 killed at Fri Jan 8 03:33:18 EST 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9591 starting at Fri Jan 8 03:33:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:33:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:33:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2764: Waiting for Server - FAILED kill -0 28878 >/dev/null 2>/dev/null selfserv_9591 with PID 28878 found at Fri Jan 8 03:33:23 EST 2016 selfserv_9591 with PID 28878 started at Fri Jan 8 03:33:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2765: OCSP stapling, signed response, unknown status produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 28878 at Fri Jan 8 03:33:24 EST 2016 kill -USR1 28878 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28878 killed at Fri Jan 8 03:33:24 EST 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9591 starting at Fri Jan 8 03:33:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:33:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:33:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2766: Waiting for Server - FAILED kill -0 28940 >/dev/null 2>/dev/null selfserv_9591 with PID 28940 found at Fri Jan 8 03:33:30 EST 2016 selfserv_9591 with PID 28940 started at Fri Jan 8 03:33:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2767: OCSP stapling, unsigned failure response produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 28940 at Fri Jan 8 03:33:31 EST 2016 kill -USR1 28940 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28940 killed at Fri Jan 8 03:33:31 EST 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9591 starting at Fri Jan 8 03:33:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:33:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:33:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2768: Waiting for Server - FAILED kill -0 29001 >/dev/null 2>/dev/null selfserv_9591 with PID 29001 found at Fri Jan 8 03:33:37 EST 2016 selfserv_9591 with PID 29001 started at Fri Jan 8 03:33:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2769: OCSP stapling, good status, bad signature produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 29001 at Fri Jan 8 03:33:38 EST 2016 kill -USR1 29001 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29001 killed at Fri Jan 8 03:33:38 EST 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9591 starting at Fri Jan 8 03:33:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:33:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:33:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2770: Waiting for Server - FAILED kill -0 29062 >/dev/null 2>/dev/null selfserv_9591 with PID 29062 found at Fri Jan 8 03:33:44 EST 2016 selfserv_9591 with PID 29062 started at Fri Jan 8 03:33:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2771: OCSP stapling, invalid cert status data produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 29062 at Fri Jan 8 03:33:45 EST 2016 kill -USR1 29062 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29062 killed at Fri Jan 8 03:33:45 EST 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9591 starting at Fri Jan 8 03:33:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:33:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:33:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2772: Waiting for Server - FAILED kill -0 29124 >/dev/null 2>/dev/null selfserv_9591 with PID 29124 found at Fri Jan 8 03:33:51 EST 2016 selfserv_9591 with PID 29124 started at Fri Jan 8 03:33:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2773: Valid cert, Server doesn't staple produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 29124 at Fri Jan 8 03:33:51 EST 2016 kill -USR1 29124 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29124 killed at Fri Jan 8 03:33:52 EST 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9591 starting at Fri Jan 8 03:33:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:33:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:33:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2774: Waiting for Server - FAILED kill -0 29185 >/dev/null 2>/dev/null selfserv_9591 with PID 29185 found at Fri Jan 8 03:33:58 EST 2016 selfserv_9591 with PID 29185 started at Fri Jan 8 03:33:58 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Fri Jan 8 03:33:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:33:58 EST 2016 ssl.sh: #2775: Stress OCSP stapling, server uses random status produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 29185 at Fri Jan 8 03:33:58 EST 2016 kill -USR1 29185 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29185 killed at Fri Jan 8 03:33:59 EST 2016 ssl.sh: SSL Stress Test - server normal/client bypass - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 03:33:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:33:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:34:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2776: Waiting for Server - FAILED kill -0 29337 >/dev/null 2>/dev/null selfserv_9591 with PID 29337 found at Fri Jan 8 03:34:05 EST 2016 selfserv_9591 with PID 29337 started at Fri Jan 8 03:34:05 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 03:34:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:34:06 EST 2016 ssl.sh: #2777: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 29337 at Fri Jan 8 03:34:06 EST 2016 kill -USR1 29337 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29337 killed at Fri Jan 8 03:34:06 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 03:34:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:34:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:34:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2778: Waiting for Server - FAILED kill -0 29417 >/dev/null 2>/dev/null selfserv_9591 with PID 29417 found at Fri Jan 8 03:34:12 EST 2016 selfserv_9591 with PID 29417 started at Fri Jan 8 03:34:12 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 03:34:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:34:13 EST 2016 ssl.sh: #2779: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 29417 at Fri Jan 8 03:34:13 EST 2016 kill -USR1 29417 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29417 killed at Fri Jan 8 03:34:13 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9591 starting at Fri Jan 8 03:34:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:34:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:34:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2780: Waiting for Server - FAILED kill -0 29496 >/dev/null 2>/dev/null selfserv_9591 with PID 29496 found at Fri Jan 8 03:34:19 EST 2016 selfserv_9591 with PID 29496 started at Fri Jan 8 03:34:19 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:34:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:34:20 EST 2016 ssl.sh: #2781: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 29496 at Fri Jan 8 03:34:20 EST 2016 kill -USR1 29496 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29496 killed at Fri Jan 8 03:34:20 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9591 starting at Fri Jan 8 03:34:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:34:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:34:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2782: Waiting for Server - FAILED kill -0 29575 >/dev/null 2>/dev/null selfserv_9591 with PID 29575 found at Fri Jan 8 03:34:26 EST 2016 selfserv_9591 with PID 29575 started at Fri Jan 8 03:34:26 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:34:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:34:27 EST 2016 ssl.sh: #2783: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 29575 at Fri Jan 8 03:34:27 EST 2016 kill -USR1 29575 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29575 killed at Fri Jan 8 03:34:27 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9591 starting at Fri Jan 8 03:34:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:34:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:34:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2784: Waiting for Server - FAILED kill -0 29655 >/dev/null 2>/dev/null selfserv_9591 with PID 29655 found at Fri Jan 8 03:34:33 EST 2016 selfserv_9591 with PID 29655 started at Fri Jan 8 03:34:33 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:34:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:34:34 EST 2016 ssl.sh: #2785: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 29655 at Fri Jan 8 03:34:34 EST 2016 kill -USR1 29655 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29655 killed at Fri Jan 8 03:34:34 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9591 starting at Fri Jan 8 03:34:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:34:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:34:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2786: Waiting for Server - FAILED kill -0 29734 >/dev/null 2>/dev/null selfserv_9591 with PID 29734 found at Fri Jan 8 03:34:40 EST 2016 selfserv_9591 with PID 29734 started at Fri Jan 8 03:34:40 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:34:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:34:41 EST 2016 ssl.sh: #2787: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 29734 at Fri Jan 8 03:34:41 EST 2016 kill -USR1 29734 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29734 killed at Fri Jan 8 03:34:41 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9591 starting at Fri Jan 8 03:34:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:34:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:34:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2788: Waiting for Server - FAILED kill -0 29813 >/dev/null 2>/dev/null selfserv_9591 with PID 29813 found at Fri Jan 8 03:34:47 EST 2016 selfserv_9591 with PID 29813 started at Fri Jan 8 03:34:47 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:34:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:34:48 EST 2016 ssl.sh: #2789: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 29813 at Fri Jan 8 03:34:48 EST 2016 kill -USR1 29813 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29813 killed at Fri Jan 8 03:34:48 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9591 starting at Fri Jan 8 03:34:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:34:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:34:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2790: Waiting for Server - FAILED kill -0 29899 >/dev/null 2>/dev/null selfserv_9591 with PID 29899 found at Fri Jan 8 03:34:54 EST 2016 selfserv_9591 with PID 29899 started at Fri Jan 8 03:34:54 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:34:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:34:55 EST 2016 ssl.sh: #2791: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 29899 at Fri Jan 8 03:34:55 EST 2016 kill -USR1 29899 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29899 killed at Fri Jan 8 03:34:55 EST 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:34:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:34:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:35:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2792: Waiting for Server - FAILED kill -0 30006 >/dev/null 2>/dev/null selfserv_9591 with PID 30006 found at Fri Jan 8 03:35:02 EST 2016 selfserv_9591 with PID 30006 started at Fri Jan 8 03:35:02 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 03:35:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:35:02 EST 2016 ssl.sh: #2793: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30006 at Fri Jan 8 03:35:02 EST 2016 kill -USR1 30006 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30006 killed at Fri Jan 8 03:35:03 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:35:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:35:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:35:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2794: Waiting for Server - FAILED kill -0 30085 >/dev/null 2>/dev/null selfserv_9591 with PID 30085 found at Fri Jan 8 03:35:09 EST 2016 selfserv_9591 with PID 30085 started at Fri Jan 8 03:35:09 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 03:35:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:35:09 EST 2016 ssl.sh: #2795: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30085 at Fri Jan 8 03:35:09 EST 2016 kill -USR1 30085 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30085 killed at Fri Jan 8 03:35:10 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:35:10 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:35:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:35:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2796: Waiting for Server - FAILED kill -0 30165 >/dev/null 2>/dev/null selfserv_9591 with PID 30165 found at Fri Jan 8 03:35:16 EST 2016 selfserv_9591 with PID 30165 started at Fri Jan 8 03:35:16 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:35:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:35:16 EST 2016 ssl.sh: #2797: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30165 at Fri Jan 8 03:35:16 EST 2016 kill -USR1 30165 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30165 killed at Fri Jan 8 03:35:17 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:35:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:35:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:35:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2798: Waiting for Server - FAILED kill -0 30244 >/dev/null 2>/dev/null selfserv_9591 with PID 30244 found at Fri Jan 8 03:35:23 EST 2016 selfserv_9591 with PID 30244 started at Fri Jan 8 03:35:23 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:35:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:35:23 EST 2016 ssl.sh: #2799: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 30244 at Fri Jan 8 03:35:23 EST 2016 kill -USR1 30244 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30244 killed at Fri Jan 8 03:35:24 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 03:35:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:35:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:35:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2800: Waiting for Server - FAILED kill -0 30323 >/dev/null 2>/dev/null selfserv_9591 with PID 30323 found at Fri Jan 8 03:35:30 EST 2016 selfserv_9591 with PID 30323 started at Fri Jan 8 03:35:30 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:35:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:35:30 EST 2016 ssl.sh: #2801: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 30323 at Fri Jan 8 03:35:30 EST 2016 kill -USR1 30323 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30323 killed at Fri Jan 8 03:35:31 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:35:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:35:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:35:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2802: Waiting for Server - FAILED kill -0 30403 >/dev/null 2>/dev/null selfserv_9591 with PID 30403 found at Fri Jan 8 03:35:37 EST 2016 selfserv_9591 with PID 30403 started at Fri Jan 8 03:35:37 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:35:37 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:35:37 EST 2016 ssl.sh: #2803: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30403 at Fri Jan 8 03:35:37 EST 2016 kill -USR1 30403 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30403 killed at Fri Jan 8 03:35:38 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 03:35:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:35:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:35:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2804: Waiting for Server - FAILED kill -0 30484 >/dev/null 2>/dev/null selfserv_9591 with PID 30484 found at Fri Jan 8 03:35:44 EST 2016 selfserv_9591 with PID 30484 started at Fri Jan 8 03:35:44 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:35:44 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:35:44 EST 2016 ssl.sh: #2805: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30484 at Fri Jan 8 03:35:44 EST 2016 kill -USR1 30484 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30484 killed at Fri Jan 8 03:35:45 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9591 starting at Fri Jan 8 03:35:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:35:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:35:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2806: Waiting for Server - FAILED kill -0 30569 >/dev/null 2>/dev/null selfserv_9591 with PID 30569 found at Fri Jan 8 03:35:51 EST 2016 selfserv_9591 with PID 30569 started at Fri Jan 8 03:35:51 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:35:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:35:51 EST 2016 ssl.sh: #2807: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30569 at Fri Jan 8 03:35:51 EST 2016 kill -USR1 30569 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30569 killed at Fri Jan 8 03:35:52 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9591 starting at Fri Jan 8 03:35:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:35:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:35:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2808: Waiting for Server - FAILED kill -0 30655 >/dev/null 2>/dev/null selfserv_9591 with PID 30655 found at Fri Jan 8 03:35:58 EST 2016 selfserv_9591 with PID 30655 started at Fri Jan 8 03:35:58 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Fri Jan 8 03:35:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:35:58 EST 2016 ssl.sh: #2809: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30655 at Fri Jan 8 03:35:58 EST 2016 kill -USR1 30655 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30655 killed at Fri Jan 8 03:35:59 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:35:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:35:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:36:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2810: Waiting for Server - FAILED kill -0 30755 >/dev/null 2>/dev/null selfserv_9591 with PID 30755 found at Fri Jan 8 03:36:05 EST 2016 selfserv_9591 with PID 30755 started at Fri Jan 8 03:36:05 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:36:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:36:05 EST 2016 ssl.sh: #2811: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30755 at Fri Jan 8 03:36:06 EST 2016 kill -USR1 30755 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30755 killed at Fri Jan 8 03:36:06 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:36:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:36:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:36:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2812: Waiting for Server - FAILED kill -0 30835 >/dev/null 2>/dev/null selfserv_9591 with PID 30835 found at Fri Jan 8 03:36:12 EST 2016 selfserv_9591 with PID 30835 started at Fri Jan 8 03:36:12 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:36:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:36:12 EST 2016 ssl.sh: #2813: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30835 at Fri Jan 8 03:36:13 EST 2016 kill -USR1 30835 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30835 killed at Fri Jan 8 03:36:13 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:36:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:36:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:36:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2814: Waiting for Server - FAILED kill -0 30914 >/dev/null 2>/dev/null selfserv_9591 with PID 30914 found at Fri Jan 8 03:36:19 EST 2016 selfserv_9591 with PID 30914 started at Fri Jan 8 03:36:19 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:36:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:36:20 EST 2016 ssl.sh: #2815: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30914 at Fri Jan 8 03:36:20 EST 2016 kill -USR1 30914 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30914 killed at Fri Jan 8 03:36:20 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:36:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:36:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:36:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2816: Waiting for Server - FAILED kill -0 30993 >/dev/null 2>/dev/null selfserv_9591 with PID 30993 found at Fri Jan 8 03:36:26 EST 2016 selfserv_9591 with PID 30993 started at Fri Jan 8 03:36:26 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:36:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:36:27 EST 2016 ssl.sh: #2817: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30993 at Fri Jan 8 03:36:27 EST 2016 kill -USR1 30993 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30993 killed at Fri Jan 8 03:36:27 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:36:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:36:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:36:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2818: Waiting for Server - FAILED kill -0 31073 >/dev/null 2>/dev/null selfserv_9591 with PID 31073 found at Fri Jan 8 03:36:33 EST 2016 selfserv_9591 with PID 31073 started at Fri Jan 8 03:36:33 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:36:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:36:34 EST 2016 ssl.sh: #2819: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31073 at Fri Jan 8 03:36:34 EST 2016 kill -USR1 31073 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31073 killed at Fri Jan 8 03:36:34 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9591 starting at Fri Jan 8 03:36:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:36:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:36:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2820: Waiting for Server - FAILED kill -0 31152 >/dev/null 2>/dev/null selfserv_9591 with PID 31152 found at Fri Jan 8 03:36:40 EST 2016 selfserv_9591 with PID 31152 started at Fri Jan 8 03:36:40 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 03:36:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:36:41 EST 2016 ssl.sh: #2821: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 31152 at Fri Jan 8 03:36:41 EST 2016 kill -USR1 31152 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31152 killed at Fri Jan 8 03:36:41 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9591 starting at Fri Jan 8 03:36:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:36:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:36:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2822: Waiting for Server - FAILED kill -0 31231 >/dev/null 2>/dev/null selfserv_9591 with PID 31231 found at Fri Jan 8 03:36:47 EST 2016 selfserv_9591 with PID 31231 started at Fri Jan 8 03:36:47 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 03:36:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:36:48 EST 2016 ssl.sh: #2823: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 31231 at Fri Jan 8 03:36:48 EST 2016 kill -USR1 31231 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31231 killed at Fri Jan 8 03:36:48 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9591 starting at Fri Jan 8 03:36:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:36:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:36:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2824: Waiting for Server - FAILED kill -0 31311 >/dev/null 2>/dev/null selfserv_9591 with PID 31311 found at Fri Jan 8 03:36:54 EST 2016 selfserv_9591 with PID 31311 started at Fri Jan 8 03:36:54 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 03:36:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:36:55 EST 2016 ssl.sh: #2825: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 31311 at Fri Jan 8 03:36:55 EST 2016 kill -USR1 31311 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31311 killed at Fri Jan 8 03:36:55 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 03:36:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:36:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:37:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2826: Waiting for Server - FAILED kill -0 31390 >/dev/null 2>/dev/null selfserv_9591 with PID 31390 found at Fri Jan 8 03:37:01 EST 2016 selfserv_9591 with PID 31390 started at Fri Jan 8 03:37:01 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:37:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:37:02 EST 2016 ssl.sh: #2827: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31390 at Fri Jan 8 03:37:02 EST 2016 kill -USR1 31390 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31390 killed at Fri Jan 8 03:37:02 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 03:37:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:37:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:37:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2828: Waiting for Server - FAILED kill -0 31469 >/dev/null 2>/dev/null selfserv_9591 with PID 31469 found at Fri Jan 8 03:37:08 EST 2016 selfserv_9591 with PID 31469 started at Fri Jan 8 03:37:08 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:37:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:37:09 EST 2016 ssl.sh: #2829: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31469 at Fri Jan 8 03:37:09 EST 2016 kill -USR1 31469 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31469 killed at Fri Jan 8 03:37:09 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:37:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:37:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:37:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2830: Waiting for Server - FAILED kill -0 31570 >/dev/null 2>/dev/null selfserv_9591 with PID 31570 found at Fri Jan 8 03:37:15 EST 2016 selfserv_9591 with PID 31570 started at Fri Jan 8 03:37:15 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:37:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:37:16 EST 2016 ssl.sh: #2831: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31570 at Fri Jan 8 03:37:16 EST 2016 kill -USR1 31570 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31570 killed at Fri Jan 8 03:37:16 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:37:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:37:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:37:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2832: Waiting for Server - FAILED kill -0 31649 >/dev/null 2>/dev/null selfserv_9591 with PID 31649 found at Fri Jan 8 03:37:22 EST 2016 selfserv_9591 with PID 31649 started at Fri Jan 8 03:37:22 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:37:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:37:23 EST 2016 ssl.sh: #2833: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 31649 at Fri Jan 8 03:37:23 EST 2016 kill -USR1 31649 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31649 killed at Fri Jan 8 03:37:23 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:37:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:37:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:37:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2834: Waiting for Server - FAILED kill -0 31731 >/dev/null 2>/dev/null selfserv_9591 with PID 31731 found at Fri Jan 8 03:37:29 EST 2016 selfserv_9591 with PID 31731 started at Fri Jan 8 03:37:29 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:37:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:37:30 EST 2016 ssl.sh: #2835: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31731 at Fri Jan 8 03:37:30 EST 2016 kill -USR1 31731 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31731 killed at Fri Jan 8 03:37:30 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:37:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:37:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:37:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2836: Waiting for Server - FAILED kill -0 31811 >/dev/null 2>/dev/null selfserv_9591 with PID 31811 found at Fri Jan 8 03:37:36 EST 2016 selfserv_9591 with PID 31811 started at Fri Jan 8 03:37:36 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 03:37:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:37:37 EST 2016 ssl.sh: #2837: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31811 at Fri Jan 8 03:37:37 EST 2016 kill -USR1 31811 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31811 killed at Fri Jan 8 03:37:37 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9591 starting at Fri Jan 8 03:37:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:37:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:37:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2838: Waiting for Server - FAILED kill -0 31890 >/dev/null 2>/dev/null selfserv_9591 with PID 31890 found at Fri Jan 8 03:37:43 EST 2016 selfserv_9591 with PID 31890 started at Fri Jan 8 03:37:43 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:37:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:37:44 EST 2016 ssl.sh: #2839: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 31890 at Fri Jan 8 03:37:44 EST 2016 kill -USR1 31890 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31890 killed at Fri Jan 8 03:37:44 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:37:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:37:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:37:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2840: Waiting for Server - FAILED kill -0 31969 >/dev/null 2>/dev/null selfserv_9591 with PID 31969 found at Fri Jan 8 03:37:50 EST 2016 selfserv_9591 with PID 31969 started at Fri Jan 8 03:37:50 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:37:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:37:51 EST 2016 ssl.sh: #2841: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31969 at Fri Jan 8 03:37:51 EST 2016 kill -USR1 31969 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31969 killed at Fri Jan 8 03:37:51 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:37:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:37:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:37:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2842: Waiting for Server - FAILED kill -0 32070 >/dev/null 2>/dev/null selfserv_9591 with PID 32070 found at Fri Jan 8 03:37:58 EST 2016 selfserv_9591 with PID 32070 started at Fri Jan 8 03:37:58 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:37:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:37:58 EST 2016 ssl.sh: #2843: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 32070 at Fri Jan 8 03:37:58 EST 2016 kill -USR1 32070 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32070 killed at Fri Jan 8 03:37:59 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9591 starting at Fri Jan 8 03:37:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:37:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:38:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2844: Waiting for Server - FAILED kill -0 32149 >/dev/null 2>/dev/null selfserv_9591 with PID 32149 found at Fri Jan 8 03:38:05 EST 2016 selfserv_9591 with PID 32149 started at Fri Jan 8 03:38:05 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 03:38:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:38:05 EST 2016 ssl.sh: #2845: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 32149 at Fri Jan 8 03:38:05 EST 2016 kill -USR1 32149 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32149 killed at Fri Jan 8 03:38:06 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:38:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:38:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:38:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2846: Waiting for Server - FAILED kill -0 32228 >/dev/null 2>/dev/null selfserv_9591 with PID 32228 found at Fri Jan 8 03:38:12 EST 2016 selfserv_9591 with PID 32228 started at Fri Jan 8 03:38:12 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:38:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:38:12 EST 2016 ssl.sh: #2847: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 32228 at Fri Jan 8 03:38:12 EST 2016 kill -USR1 32228 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32228 killed at Fri Jan 8 03:38:13 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:38:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:38:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:38:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2848: Waiting for Server - FAILED kill -0 32308 >/dev/null 2>/dev/null selfserv_9591 with PID 32308 found at Fri Jan 8 03:38:19 EST 2016 selfserv_9591 with PID 32308 started at Fri Jan 8 03:38:19 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:38:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:38:19 EST 2016 ssl.sh: #2849: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 32308 at Fri Jan 8 03:38:19 EST 2016 kill -USR1 32308 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32308 killed at Fri Jan 8 03:38:20 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:38:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:38:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:38:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2850: Waiting for Server - FAILED kill -0 32401 >/dev/null 2>/dev/null selfserv_9591 with PID 32401 found at Fri Jan 8 03:38:26 EST 2016 selfserv_9591 with PID 32401 started at Fri Jan 8 03:38:26 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:38:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:38:26 EST 2016 ssl.sh: #2851: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 32401 at Fri Jan 8 03:38:26 EST 2016 kill -USR1 32401 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32401 killed at Fri Jan 8 03:38:27 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9591 starting at Fri Jan 8 03:38:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:38:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:38:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2852: Waiting for Server - FAILED kill -0 32494 >/dev/null 2>/dev/null selfserv_9591 with PID 32494 found at Fri Jan 8 03:38:33 EST 2016 selfserv_9591 with PID 32494 started at Fri Jan 8 03:38:33 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:38:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:38:33 EST 2016 ssl.sh: #2853: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 32494 at Fri Jan 8 03:38:33 EST 2016 kill -USR1 32494 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32494 killed at Fri Jan 8 03:38:34 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:38:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:38:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:38:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2854: Waiting for Server - FAILED kill -0 32574 >/dev/null 2>/dev/null selfserv_9591 with PID 32574 found at Fri Jan 8 03:38:40 EST 2016 selfserv_9591 with PID 32574 started at Fri Jan 8 03:38:40 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:38:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:38:40 EST 2016 ssl.sh: #2855: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 32574 at Fri Jan 8 03:38:40 EST 2016 kill -USR1 32574 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32574 killed at Fri Jan 8 03:38:41 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:38:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:38:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:38:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2856: Waiting for Server - FAILED kill -0 32653 >/dev/null 2>/dev/null selfserv_9591 with PID 32653 found at Fri Jan 8 03:38:47 EST 2016 selfserv_9591 with PID 32653 started at Fri Jan 8 03:38:47 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:38:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:38:47 EST 2016 ssl.sh: #2857: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 32653 at Fri Jan 8 03:38:47 EST 2016 kill -USR1 32653 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32653 killed at Fri Jan 8 03:38:48 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:38:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:38:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:38:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2858: Waiting for Server - FAILED kill -0 32753 >/dev/null 2>/dev/null selfserv_9591 with PID 32753 found at Fri Jan 8 03:38:54 EST 2016 selfserv_9591 with PID 32753 started at Fri Jan 8 03:38:54 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 03:38:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:38:54 EST 2016 ssl.sh: #2859: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 32753 at Fri Jan 8 03:38:55 EST 2016 kill -USR1 32753 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32753 killed at Fri Jan 8 03:38:55 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:38:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:38:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:39:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2860: Waiting for Server - FAILED kill -0 367 >/dev/null 2>/dev/null selfserv_9591 with PID 367 found at Fri Jan 8 03:39:01 EST 2016 selfserv_9591 with PID 367 started at Fri Jan 8 03:39:01 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 03:39:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:39:01 EST 2016 ssl.sh: #2861: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 367 at Fri Jan 8 03:39:02 EST 2016 kill -USR1 367 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 367 killed at Fri Jan 8 03:39:02 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:39:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:39:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:39:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2862: Waiting for Server - FAILED kill -0 467 >/dev/null 2>/dev/null selfserv_9591 with PID 467 found at Fri Jan 8 03:39:08 EST 2016 selfserv_9591 with PID 467 started at Fri Jan 8 03:39:08 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 03:39:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:39:09 EST 2016 ssl.sh: #2863: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 467 at Fri Jan 8 03:39:09 EST 2016 kill -USR1 467 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 467 killed at Fri Jan 8 03:39:09 EST 2016 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass - with ECC =============================== selfserv_9591 starting at Fri Jan 8 03:39:09 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:39:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:39:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2864: Waiting for Server - FAILED kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:15 EST 2016 selfserv_9591 with PID 550 started at Fri Jan 8 03:39:15 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping A SSL2_RC4_128_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping F SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2865: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2866: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2867: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2868: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2869: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2870: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2871: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2872: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2873: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2874: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2875: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2876: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2877: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2878: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2879: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2880: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2881: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2882: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2883: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2884: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2885: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2886: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2887: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2888: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2889: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2890: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2891: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2892: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2893: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2894: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2895: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2896: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2897: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2898: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2899: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2900: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2901: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2902: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2903: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2904: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2905: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2906: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2907: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2908: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2909: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2910: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2911: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2912: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2913: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2914: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2915: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2916: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2917: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2918: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2919: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2920: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2921: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2922: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2923: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2924: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2925: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2926: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2927: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2928: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2929: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2930: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2931: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 550 >/dev/null 2>/dev/null selfserv_9591 with PID 550 found at Fri Jan 8 03:39:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2932: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 550 at Fri Jan 8 03:39:52 EST 2016 kill -USR1 550 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 550 killed at Fri Jan 8 03:39:52 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:39:52 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:39:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:39:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2933: Waiting for Server - FAILED kill -0 2637 >/dev/null 2>/dev/null selfserv_9591 with PID 2637 found at Fri Jan 8 03:39:58 EST 2016 selfserv_9591 with PID 2637 started at Fri Jan 8 03:39:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2934: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 2637 >/dev/null 2>/dev/null selfserv_9591 with PID 2637 found at Fri Jan 8 03:39:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2935: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2637 >/dev/null 2>/dev/null selfserv_9591 with PID 2637 found at Fri Jan 8 03:39:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2936: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2637 >/dev/null 2>/dev/null selfserv_9591 with PID 2637 found at Fri Jan 8 03:40:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2937: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2637 >/dev/null 2>/dev/null selfserv_9591 with PID 2637 found at Fri Jan 8 03:40:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2938: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 2637 at Fri Jan 8 03:40:01 EST 2016 kill -USR1 2637 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2637 killed at Fri Jan 8 03:40:01 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:40:01 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:40:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:40:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2939: Waiting for Server - FAILED kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:07 EST 2016 selfserv_9591 with PID 2802 started at Fri Jan 8 03:40:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2940: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2941: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2942: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2943: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2944: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2945: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2946: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2947: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2948: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2949: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2950: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2951: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2952: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2953: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2802 >/dev/null 2>/dev/null selfserv_9591 with PID 2802 found at Fri Jan 8 03:40:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2954: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 2802 at Fri Jan 8 03:40:15 EST 2016 kill -USR1 2802 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2802 killed at Fri Jan 8 03:40:16 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:40:16 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:40:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:40:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2955: Waiting for Server - FAILED kill -0 3216 >/dev/null 2>/dev/null selfserv_9591 with PID 3216 found at Fri Jan 8 03:40:21 EST 2016 selfserv_9591 with PID 3216 started at Fri Jan 8 03:40:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2956: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 3216 >/dev/null 2>/dev/null selfserv_9591 with PID 3216 found at Fri Jan 8 03:40:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2957: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 3216 >/dev/null 2>/dev/null selfserv_9591 with PID 3216 found at Fri Jan 8 03:40:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2958: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 3216 >/dev/null 2>/dev/null selfserv_9591 with PID 3216 found at Fri Jan 8 03:40:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2959: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 3216 >/dev/null 2>/dev/null selfserv_9591 with PID 3216 found at Fri Jan 8 03:40:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2960: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 3216 at Fri Jan 8 03:40:24 EST 2016 kill -USR1 3216 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3216 killed at Fri Jan 8 03:40:25 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:40:25 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:40:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:40:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2961: Waiting for Server - FAILED kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:30 EST 2016 selfserv_9591 with PID 3381 started at Fri Jan 8 03:40:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2962: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2963: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2964: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2965: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2966: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2967: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2968: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2969: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2970: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2971: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2972: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2973: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2974: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2975: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 3381 >/dev/null 2>/dev/null selfserv_9591 with PID 3381 found at Fri Jan 8 03:40:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2976: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 3381 at Fri Jan 8 03:40:38 EST 2016 kill -USR1 3381 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3381 killed at Fri Jan 8 03:40:39 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:40:39 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:40:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:40:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2977: Waiting for Server - FAILED kill -0 3795 >/dev/null 2>/dev/null selfserv_9591 with PID 3795 found at Fri Jan 8 03:40:45 EST 2016 selfserv_9591 with PID 3795 started at Fri Jan 8 03:40:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2978: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 3795 >/dev/null 2>/dev/null selfserv_9591 with PID 3795 found at Fri Jan 8 03:40:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2979: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 3795 >/dev/null 2>/dev/null selfserv_9591 with PID 3795 found at Fri Jan 8 03:40:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2980: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 3795 >/dev/null 2>/dev/null selfserv_9591 with PID 3795 found at Fri Jan 8 03:40:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2981: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 3795 >/dev/null 2>/dev/null selfserv_9591 with PID 3795 found at Fri Jan 8 03:40:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2982: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 3795 at Fri Jan 8 03:40:47 EST 2016 kill -USR1 3795 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3795 killed at Fri Jan 8 03:40:48 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:40:48 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:40:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:40:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2983: Waiting for Server - FAILED kill -0 3960 >/dev/null 2>/dev/null selfserv_9591 with PID 3960 found at Fri Jan 8 03:40:54 EST 2016 selfserv_9591 with PID 3960 started at Fri Jan 8 03:40:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2984: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 3960 >/dev/null 2>/dev/null selfserv_9591 with PID 3960 found at Fri Jan 8 03:40:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2985: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 3960 >/dev/null 2>/dev/null selfserv_9591 with PID 3960 found at Fri Jan 8 03:40:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2986: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 3960 >/dev/null 2>/dev/null selfserv_9591 with PID 3960 found at Fri Jan 8 03:40:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2987: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 3960 >/dev/null 2>/dev/null selfserv_9591 with PID 3960 found at Fri Jan 8 03:40:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2988: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 3960 >/dev/null 2>/dev/null selfserv_9591 with PID 3960 found at Fri Jan 8 03:40:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2989: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 3960 >/dev/null 2>/dev/null selfserv_9591 with PID 3960 found at Fri Jan 8 03:40:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2990: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 3960 >/dev/null 2>/dev/null selfserv_9591 with PID 3960 found at Fri Jan 8 03:40:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2991: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 3960 >/dev/null 2>/dev/null selfserv_9591 with PID 3960 found at Fri Jan 8 03:40:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2992: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 3960 >/dev/null 2>/dev/null selfserv_9591 with PID 3960 found at Fri Jan 8 03:40:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2993: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 3960 >/dev/null 2>/dev/null selfserv_9591 with PID 3960 found at Fri Jan 8 03:40:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2994: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 3960 >/dev/null 2>/dev/null selfserv_9591 with PID 3960 found at Fri Jan 8 03:40:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2995: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 3960 >/dev/null 2>/dev/null selfserv_9591 with PID 3960 found at Fri Jan 8 03:41:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2996: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3960 at Fri Jan 8 03:41:00 EST 2016 kill -USR1 3960 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3960 killed at Fri Jan 8 03:41:01 EST 2016 ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:41:01 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:41:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:41:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2997: Waiting for Server - FAILED kill -0 4368 >/dev/null 2>/dev/null selfserv_9591 with PID 4368 found at Fri Jan 8 03:41:07 EST 2016 selfserv_9591 with PID 4368 started at Fri Jan 8 03:41:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2998: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4368 at Fri Jan 8 03:41:08 EST 2016 kill -USR1 4368 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4368 killed at Fri Jan 8 03:41:08 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:41:08 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:41:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:41:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2999: Waiting for Server - FAILED kill -0 4437 >/dev/null 2>/dev/null selfserv_9591 with PID 4437 found at Fri Jan 8 03:41:14 EST 2016 selfserv_9591 with PID 4437 started at Fri Jan 8 03:41:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3000: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4437 at Fri Jan 8 03:41:14 EST 2016 kill -USR1 4437 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4437 killed at Fri Jan 8 03:41:15 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:41:15 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:41:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:41:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3001: Waiting for Server - FAILED kill -0 4507 >/dev/null 2>/dev/null selfserv_9591 with PID 4507 found at Fri Jan 8 03:41:21 EST 2016 selfserv_9591 with PID 4507 started at Fri Jan 8 03:41:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3002: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4507 at Fri Jan 8 03:41:21 EST 2016 kill -USR1 4507 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4507 killed at Fri Jan 8 03:41:22 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:41:22 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:41:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:41:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3003: Waiting for Server - FAILED kill -0 4576 >/dev/null 2>/dev/null selfserv_9591 with PID 4576 found at Fri Jan 8 03:41:28 EST 2016 selfserv_9591 with PID 4576 started at Fri Jan 8 03:41:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3004: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4576 at Fri Jan 8 03:41:28 EST 2016 kill -USR1 4576 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4576 killed at Fri Jan 8 03:41:29 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:41:29 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:41:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:41:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3005: Waiting for Server - FAILED kill -0 4645 >/dev/null 2>/dev/null selfserv_9591 with PID 4645 found at Fri Jan 8 03:41:35 EST 2016 selfserv_9591 with PID 4645 started at Fri Jan 8 03:41:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3006: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4645 at Fri Jan 8 03:41:35 EST 2016 kill -USR1 4645 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4645 killed at Fri Jan 8 03:41:36 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:41:36 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:41:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:41:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3007: Waiting for Server - FAILED kill -0 4715 >/dev/null 2>/dev/null selfserv_9591 with PID 4715 found at Fri Jan 8 03:41:42 EST 2016 selfserv_9591 with PID 4715 started at Fri Jan 8 03:41:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3008: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4715 at Fri Jan 8 03:41:42 EST 2016 kill -USR1 4715 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4715 killed at Fri Jan 8 03:41:43 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:41:43 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:41:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:41:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3009: Waiting for Server - FAILED kill -0 4784 >/dev/null 2>/dev/null selfserv_9591 with PID 4784 found at Fri Jan 8 03:41:49 EST 2016 selfserv_9591 with PID 4784 started at Fri Jan 8 03:41:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3010: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4784 at Fri Jan 8 03:41:49 EST 2016 kill -USR1 4784 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4784 killed at Fri Jan 8 03:41:49 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:41:50 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:41:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:41:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3011: Waiting for Server - FAILED kill -0 4853 >/dev/null 2>/dev/null selfserv_9591 with PID 4853 found at Fri Jan 8 03:41:55 EST 2016 selfserv_9591 with PID 4853 started at Fri Jan 8 03:41:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3012: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4853 at Fri Jan 8 03:41:56 EST 2016 kill -USR1 4853 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4853 killed at Fri Jan 8 03:41:56 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:41:56 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:41:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:42:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3013: Waiting for Server - FAILED kill -0 4923 >/dev/null 2>/dev/null selfserv_9591 with PID 4923 found at Fri Jan 8 03:42:02 EST 2016 selfserv_9591 with PID 4923 started at Fri Jan 8 03:42:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3014: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4923 at Fri Jan 8 03:42:03 EST 2016 kill -USR1 4923 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4923 killed at Fri Jan 8 03:42:03 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:42:03 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:42:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:42:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3015: Waiting for Server - FAILED kill -0 4992 >/dev/null 2>/dev/null selfserv_9591 with PID 4992 found at Fri Jan 8 03:42:09 EST 2016 selfserv_9591 with PID 4992 started at Fri Jan 8 03:42:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3016: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4992 at Fri Jan 8 03:42:10 EST 2016 kill -USR1 4992 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4992 killed at Fri Jan 8 03:42:10 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:42:10 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:42:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:42:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3017: Waiting for Server - FAILED kill -0 5061 >/dev/null 2>/dev/null selfserv_9591 with PID 5061 found at Fri Jan 8 03:42:16 EST 2016 selfserv_9591 with PID 5061 started at Fri Jan 8 03:42:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3018: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5061 at Fri Jan 8 03:42:17 EST 2016 kill -USR1 5061 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5061 killed at Fri Jan 8 03:42:17 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:42:17 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:42:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:42:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3019: Waiting for Server - FAILED kill -0 5131 >/dev/null 2>/dev/null selfserv_9591 with PID 5131 found at Fri Jan 8 03:42:23 EST 2016 selfserv_9591 with PID 5131 started at Fri Jan 8 03:42:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3020: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5131 at Fri Jan 8 03:42:24 EST 2016 kill -USR1 5131 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5131 killed at Fri Jan 8 03:42:24 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:42:24 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:42:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:42:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3021: Waiting for Server - FAILED kill -0 5200 >/dev/null 2>/dev/null selfserv_9591 with PID 5200 found at Fri Jan 8 03:42:30 EST 2016 selfserv_9591 with PID 5200 started at Fri Jan 8 03:42:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3022: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5200 at Fri Jan 8 03:42:31 EST 2016 kill -USR1 5200 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5200 killed at Fri Jan 8 03:42:31 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:42:31 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:42:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:42:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3023: Waiting for Server - FAILED kill -0 5269 >/dev/null 2>/dev/null selfserv_9591 with PID 5269 found at Fri Jan 8 03:42:37 EST 2016 selfserv_9591 with PID 5269 started at Fri Jan 8 03:42:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3024: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5269 at Fri Jan 8 03:42:37 EST 2016 kill -USR1 5269 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5269 killed at Fri Jan 8 03:42:38 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:42:38 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:42:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:42:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3025: Waiting for Server - FAILED kill -0 5339 >/dev/null 2>/dev/null selfserv_9591 with PID 5339 found at Fri Jan 8 03:42:44 EST 2016 selfserv_9591 with PID 5339 started at Fri Jan 8 03:42:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3026: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5339 at Fri Jan 8 03:42:44 EST 2016 kill -USR1 5339 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5339 killed at Fri Jan 8 03:42:45 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:42:45 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:42:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:42:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3027: Waiting for Server - FAILED kill -0 5408 >/dev/null 2>/dev/null selfserv_9591 with PID 5408 found at Fri Jan 8 03:42:51 EST 2016 selfserv_9591 with PID 5408 started at Fri Jan 8 03:42:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3028: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5408 at Fri Jan 8 03:42:51 EST 2016 kill -USR1 5408 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5408 killed at Fri Jan 8 03:42:52 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:42:52 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:42:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:42:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3029: Waiting for Server - FAILED kill -0 5477 >/dev/null 2>/dev/null selfserv_9591 with PID 5477 found at Fri Jan 8 03:42:58 EST 2016 selfserv_9591 with PID 5477 started at Fri Jan 8 03:42:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3030: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5477 at Fri Jan 8 03:42:58 EST 2016 kill -USR1 5477 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5477 killed at Fri Jan 8 03:42:59 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:42:59 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:42:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:43:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3031: Waiting for Server - FAILED kill -0 5547 >/dev/null 2>/dev/null selfserv_9591 with PID 5547 found at Fri Jan 8 03:43:05 EST 2016 selfserv_9591 with PID 5547 started at Fri Jan 8 03:43:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3032: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5547 at Fri Jan 8 03:43:05 EST 2016 kill -USR1 5547 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5547 killed at Fri Jan 8 03:43:06 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:43:06 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:43:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:43:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3033: Waiting for Server - FAILED kill -0 5616 >/dev/null 2>/dev/null selfserv_9591 with PID 5616 found at Fri Jan 8 03:43:12 EST 2016 selfserv_9591 with PID 5616 started at Fri Jan 8 03:43:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3034: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5616 at Fri Jan 8 03:43:12 EST 2016 kill -USR1 5616 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5616 killed at Fri Jan 8 03:43:12 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:43:13 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:43:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:43:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3035: Waiting for Server - FAILED kill -0 5685 >/dev/null 2>/dev/null selfserv_9591 with PID 5685 found at Fri Jan 8 03:43:18 EST 2016 selfserv_9591 with PID 5685 started at Fri Jan 8 03:43:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3036: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5685 at Fri Jan 8 03:43:19 EST 2016 kill -USR1 5685 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5685 killed at Fri Jan 8 03:43:19 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:43:19 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:43:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:43:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3037: Waiting for Server - FAILED kill -0 5755 >/dev/null 2>/dev/null selfserv_9591 with PID 5755 found at Fri Jan 8 03:43:25 EST 2016 selfserv_9591 with PID 5755 started at Fri Jan 8 03:43:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3038: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5755 at Fri Jan 8 03:43:26 EST 2016 kill -USR1 5755 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5755 killed at Fri Jan 8 03:43:26 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:43:26 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:43:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:43:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3039: Waiting for Server - FAILED kill -0 5824 >/dev/null 2>/dev/null selfserv_9591 with PID 5824 found at Fri Jan 8 03:43:32 EST 2016 selfserv_9591 with PID 5824 started at Fri Jan 8 03:43:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3040: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5824 at Fri Jan 8 03:43:33 EST 2016 kill -USR1 5824 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5824 killed at Fri Jan 8 03:43:33 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:43:33 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:43:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:43:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3041: Waiting for Server - FAILED kill -0 5893 >/dev/null 2>/dev/null selfserv_9591 with PID 5893 found at Fri Jan 8 03:43:39 EST 2016 selfserv_9591 with PID 5893 started at Fri Jan 8 03:43:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3042: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5893 at Fri Jan 8 03:43:40 EST 2016 kill -USR1 5893 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5893 killed at Fri Jan 8 03:43:40 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:43:40 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:43:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:43:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3043: Waiting for Server - FAILED kill -0 5963 >/dev/null 2>/dev/null selfserv_9591 with PID 5963 found at Fri Jan 8 03:43:46 EST 2016 selfserv_9591 with PID 5963 started at Fri Jan 8 03:43:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3044: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5963 at Fri Jan 8 03:43:47 EST 2016 kill -USR1 5963 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5963 killed at Fri Jan 8 03:43:47 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:43:47 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:43:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:43:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3045: Waiting for Server - FAILED kill -0 6032 >/dev/null 2>/dev/null selfserv_9591 with PID 6032 found at Fri Jan 8 03:43:53 EST 2016 selfserv_9591 with PID 6032 started at Fri Jan 8 03:43:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3046: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6032 at Fri Jan 8 03:43:54 EST 2016 kill -USR1 6032 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6032 killed at Fri Jan 8 03:43:54 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:43:54 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:43:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:43:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3047: Waiting for Server - FAILED kill -0 6101 >/dev/null 2>/dev/null selfserv_9591 with PID 6101 found at Fri Jan 8 03:44:00 EST 2016 selfserv_9591 with PID 6101 started at Fri Jan 8 03:44:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3048: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6101 at Fri Jan 8 03:44:00 EST 2016 kill -USR1 6101 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6101 killed at Fri Jan 8 03:44:01 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:44:01 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:44:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:44:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3049: Waiting for Server - FAILED kill -0 6171 >/dev/null 2>/dev/null selfserv_9591 with PID 6171 found at Fri Jan 8 03:44:07 EST 2016 selfserv_9591 with PID 6171 started at Fri Jan 8 03:44:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3050: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6171 at Fri Jan 8 03:44:07 EST 2016 kill -USR1 6171 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6171 killed at Fri Jan 8 03:44:08 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:44:08 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:44:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:44:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3051: Waiting for Server - FAILED kill -0 6240 >/dev/null 2>/dev/null selfserv_9591 with PID 6240 found at Fri Jan 8 03:44:14 EST 2016 selfserv_9591 with PID 6240 started at Fri Jan 8 03:44:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3052: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6240 at Fri Jan 8 03:44:14 EST 2016 kill -USR1 6240 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6240 killed at Fri Jan 8 03:44:15 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:44:15 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:44:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:44:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3053: Waiting for Server - FAILED kill -0 6309 >/dev/null 2>/dev/null selfserv_9591 with PID 6309 found at Fri Jan 8 03:44:21 EST 2016 selfserv_9591 with PID 6309 started at Fri Jan 8 03:44:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3054: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6309 at Fri Jan 8 03:44:21 EST 2016 kill -USR1 6309 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6309 killed at Fri Jan 8 03:44:22 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:44:22 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:44:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:44:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3055: Waiting for Server - FAILED kill -0 6379 >/dev/null 2>/dev/null selfserv_9591 with PID 6379 found at Fri Jan 8 03:44:28 EST 2016 selfserv_9591 with PID 6379 started at Fri Jan 8 03:44:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3056: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6379 at Fri Jan 8 03:44:28 EST 2016 kill -USR1 6379 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6379 killed at Fri Jan 8 03:44:29 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:44:29 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:44:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:44:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3057: Waiting for Server - FAILED kill -0 6463 >/dev/null 2>/dev/null selfserv_9591 with PID 6463 found at Fri Jan 8 03:44:35 EST 2016 selfserv_9591 with PID 6463 started at Fri Jan 8 03:44:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3058: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6463 at Fri Jan 8 03:44:35 EST 2016 kill -USR1 6463 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6463 killed at Fri Jan 8 03:44:35 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:44:36 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:44:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:44:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3059: Waiting for Server - FAILED kill -0 6532 >/dev/null 2>/dev/null selfserv_9591 with PID 6532 found at Fri Jan 8 03:44:41 EST 2016 selfserv_9591 with PID 6532 started at Fri Jan 8 03:44:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3060: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6532 at Fri Jan 8 03:44:42 EST 2016 kill -USR1 6532 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6532 killed at Fri Jan 8 03:44:42 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:44:42 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:44:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:44:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3061: Waiting for Server - FAILED kill -0 6602 >/dev/null 2>/dev/null selfserv_9591 with PID 6602 found at Fri Jan 8 03:44:48 EST 2016 selfserv_9591 with PID 6602 started at Fri Jan 8 03:44:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3062: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6602 at Fri Jan 8 03:44:49 EST 2016 kill -USR1 6602 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6602 killed at Fri Jan 8 03:44:49 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:44:49 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:44:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:44:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3063: Waiting for Server - FAILED kill -0 6671 >/dev/null 2>/dev/null selfserv_9591 with PID 6671 found at Fri Jan 8 03:44:55 EST 2016 selfserv_9591 with PID 6671 started at Fri Jan 8 03:44:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3064: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6671 at Fri Jan 8 03:44:56 EST 2016 kill -USR1 6671 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6671 killed at Fri Jan 8 03:44:56 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:44:56 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:44:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:45:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3065: Waiting for Server - FAILED kill -0 6740 >/dev/null 2>/dev/null selfserv_9591 with PID 6740 found at Fri Jan 8 03:45:02 EST 2016 selfserv_9591 with PID 6740 started at Fri Jan 8 03:45:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3066: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6740 at Fri Jan 8 03:45:03 EST 2016 kill -USR1 6740 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6740 killed at Fri Jan 8 03:45:03 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:45:03 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:45:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:45:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3067: Waiting for Server - FAILED kill -0 6810 >/dev/null 2>/dev/null selfserv_9591 with PID 6810 found at Fri Jan 8 03:45:09 EST 2016 selfserv_9591 with PID 6810 started at Fri Jan 8 03:45:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3068: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6810 at Fri Jan 8 03:45:10 EST 2016 kill -USR1 6810 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6810 killed at Fri Jan 8 03:45:10 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:45:10 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:45:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:45:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3069: Waiting for Server - FAILED kill -0 6879 >/dev/null 2>/dev/null selfserv_9591 with PID 6879 found at Fri Jan 8 03:45:16 EST 2016 selfserv_9591 with PID 6879 started at Fri Jan 8 03:45:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3070: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6879 at Fri Jan 8 03:45:17 EST 2016 kill -USR1 6879 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6879 killed at Fri Jan 8 03:45:17 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:45:17 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:45:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:45:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3071: Waiting for Server - FAILED kill -0 6948 >/dev/null 2>/dev/null selfserv_9591 with PID 6948 found at Fri Jan 8 03:45:23 EST 2016 selfserv_9591 with PID 6948 started at Fri Jan 8 03:45:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3072: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6948 at Fri Jan 8 03:45:23 EST 2016 kill -USR1 6948 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6948 killed at Fri Jan 8 03:45:24 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:45:24 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:45:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:45:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3073: Waiting for Server - FAILED kill -0 7018 >/dev/null 2>/dev/null selfserv_9591 with PID 7018 found at Fri Jan 8 03:45:30 EST 2016 selfserv_9591 with PID 7018 started at Fri Jan 8 03:45:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3074: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7018 at Fri Jan 8 03:45:30 EST 2016 kill -USR1 7018 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7018 killed at Fri Jan 8 03:45:31 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:45:31 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:45:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:45:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3075: Waiting for Server - FAILED kill -0 7087 >/dev/null 2>/dev/null selfserv_9591 with PID 7087 found at Fri Jan 8 03:45:37 EST 2016 selfserv_9591 with PID 7087 started at Fri Jan 8 03:45:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3076: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7087 at Fri Jan 8 03:45:37 EST 2016 kill -USR1 7087 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7087 killed at Fri Jan 8 03:45:38 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:45:38 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:45:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:45:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3077: Waiting for Server - FAILED kill -0 7157 >/dev/null 2>/dev/null selfserv_9591 with PID 7157 found at Fri Jan 8 03:45:44 EST 2016 selfserv_9591 with PID 7157 started at Fri Jan 8 03:45:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3078: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 7157 at Fri Jan 8 03:45:44 EST 2016 kill -USR1 7157 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7157 killed at Fri Jan 8 03:45:45 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:45:45 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:45:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:45:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3079: Waiting for Server - FAILED kill -0 7227 >/dev/null 2>/dev/null selfserv_9591 with PID 7227 found at Fri Jan 8 03:45:51 EST 2016 selfserv_9591 with PID 7227 started at Fri Jan 8 03:45:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3080: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7227 at Fri Jan 8 03:45:51 EST 2016 kill -USR1 7227 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7227 killed at Fri Jan 8 03:45:52 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:45:52 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:45:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:45:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3081: Waiting for Server - FAILED kill -0 7296 >/dev/null 2>/dev/null selfserv_9591 with PID 7296 found at Fri Jan 8 03:45:58 EST 2016 selfserv_9591 with PID 7296 started at Fri Jan 8 03:45:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3082: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7296 at Fri Jan 8 03:45:58 EST 2016 kill -USR1 7296 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7296 killed at Fri Jan 8 03:45:58 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:45:59 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:45:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:46:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3083: Waiting for Server - FAILED kill -0 7365 >/dev/null 2>/dev/null selfserv_9591 with PID 7365 found at Fri Jan 8 03:46:04 EST 2016 selfserv_9591 with PID 7365 started at Fri Jan 8 03:46:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3084: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7365 at Fri Jan 8 03:46:05 EST 2016 kill -USR1 7365 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7365 killed at Fri Jan 8 03:46:05 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:46:05 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:46:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:46:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3085: Waiting for Server - FAILED kill -0 7435 >/dev/null 2>/dev/null selfserv_9591 with PID 7435 found at Fri Jan 8 03:46:11 EST 2016 selfserv_9591 with PID 7435 started at Fri Jan 8 03:46:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3086: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 7435 at Fri Jan 8 03:46:12 EST 2016 kill -USR1 7435 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7435 killed at Fri Jan 8 03:46:12 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:46:12 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:46:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:46:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3087: Waiting for Server - FAILED kill -0 7504 >/dev/null 2>/dev/null selfserv_9591 with PID 7504 found at Fri Jan 8 03:46:18 EST 2016 selfserv_9591 with PID 7504 started at Fri Jan 8 03:46:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3088: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7504 at Fri Jan 8 03:46:19 EST 2016 kill -USR1 7504 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7504 killed at Fri Jan 8 03:46:19 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:46:19 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:46:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:46:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3089: Waiting for Server - FAILED kill -0 7573 >/dev/null 2>/dev/null selfserv_9591 with PID 7573 found at Fri Jan 8 03:46:25 EST 2016 selfserv_9591 with PID 7573 started at Fri Jan 8 03:46:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3090: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7573 at Fri Jan 8 03:46:26 EST 2016 kill -USR1 7573 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7573 killed at Fri Jan 8 03:46:26 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:46:26 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:46:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:46:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3091: Waiting for Server - FAILED kill -0 7643 >/dev/null 2>/dev/null selfserv_9591 with PID 7643 found at Fri Jan 8 03:46:32 EST 2016 selfserv_9591 with PID 7643 started at Fri Jan 8 03:46:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3092: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7643 at Fri Jan 8 03:46:33 EST 2016 kill -USR1 7643 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7643 killed at Fri Jan 8 03:46:33 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:46:33 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:46:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:46:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3093: Waiting for Server - FAILED kill -0 7712 >/dev/null 2>/dev/null selfserv_9591 with PID 7712 found at Fri Jan 8 03:46:39 EST 2016 selfserv_9591 with PID 7712 started at Fri Jan 8 03:46:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3094: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 7712 at Fri Jan 8 03:46:40 EST 2016 kill -USR1 7712 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7712 killed at Fri Jan 8 03:46:40 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:46:40 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:46:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:46:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3095: Waiting for Server - FAILED kill -0 7781 >/dev/null 2>/dev/null selfserv_9591 with PID 7781 found at Fri Jan 8 03:46:46 EST 2016 selfserv_9591 with PID 7781 started at Fri Jan 8 03:46:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3096: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7781 at Fri Jan 8 03:46:46 EST 2016 kill -USR1 7781 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7781 killed at Fri Jan 8 03:46:47 EST 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client bypass - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server normal/client bypass - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 03:46:47 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:46:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:46:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3097: Waiting for Server - FAILED kill -0 7966 >/dev/null 2>/dev/null selfserv_9591 with PID 7966 found at Fri Jan 8 03:46:53 EST 2016 selfserv_9591 with PID 7966 started at Fri Jan 8 03:46:53 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 03:46:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:46:54 EST 2016 ssl.sh: #3098: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 7966 at Fri Jan 8 03:46:54 EST 2016 kill -USR1 7966 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7966 killed at Fri Jan 8 03:46:54 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 03:46:54 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:46:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:47:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3099: Waiting for Server - FAILED kill -0 8045 >/dev/null 2>/dev/null selfserv_9591 with PID 8045 found at Fri Jan 8 03:47:00 EST 2016 selfserv_9591 with PID 8045 started at Fri Jan 8 03:47:00 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 03:47:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:47:01 EST 2016 ssl.sh: #3100: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 8045 at Fri Jan 8 03:47:01 EST 2016 kill -USR1 8045 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8045 killed at Fri Jan 8 03:47:01 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9591 starting at Fri Jan 8 03:47:02 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:47:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:47:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3101: Waiting for Server - FAILED kill -0 8124 >/dev/null 2>/dev/null selfserv_9591 with PID 8124 found at Fri Jan 8 03:47:07 EST 2016 selfserv_9591 with PID 8124 started at Fri Jan 8 03:47:07 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:47:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:47:08 EST 2016 ssl.sh: #3102: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 8124 at Fri Jan 8 03:47:08 EST 2016 kill -USR1 8124 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8124 killed at Fri Jan 8 03:47:08 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9591 starting at Fri Jan 8 03:47:09 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:47:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:47:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3103: Waiting for Server - FAILED kill -0 8206 >/dev/null 2>/dev/null selfserv_9591 with PID 8206 found at Fri Jan 8 03:47:14 EST 2016 selfserv_9591 with PID 8206 started at Fri Jan 8 03:47:14 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:47:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:47:15 EST 2016 ssl.sh: #3104: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8206 at Fri Jan 8 03:47:15 EST 2016 kill -USR1 8206 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8206 killed at Fri Jan 8 03:47:15 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9591 starting at Fri Jan 8 03:47:16 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:47:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:47:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3105: Waiting for Server - FAILED kill -0 8285 >/dev/null 2>/dev/null selfserv_9591 with PID 8285 found at Fri Jan 8 03:47:21 EST 2016 selfserv_9591 with PID 8285 started at Fri Jan 8 03:47:22 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:47:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:47:22 EST 2016 ssl.sh: #3106: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 8285 at Fri Jan 8 03:47:22 EST 2016 kill -USR1 8285 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8285 killed at Fri Jan 8 03:47:23 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9591 starting at Fri Jan 8 03:47:23 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:47:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:47:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3107: Waiting for Server - FAILED kill -0 8364 >/dev/null 2>/dev/null selfserv_9591 with PID 8364 found at Fri Jan 8 03:47:29 EST 2016 selfserv_9591 with PID 8364 started at Fri Jan 8 03:47:29 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:47:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:47:29 EST 2016 ssl.sh: #3108: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8364 at Fri Jan 8 03:47:29 EST 2016 kill -USR1 8364 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8364 killed at Fri Jan 8 03:47:30 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9591 starting at Fri Jan 8 03:47:30 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:47:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:47:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3109: Waiting for Server - FAILED kill -0 8444 >/dev/null 2>/dev/null selfserv_9591 with PID 8444 found at Fri Jan 8 03:47:36 EST 2016 selfserv_9591 with PID 8444 started at Fri Jan 8 03:47:36 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:47:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:47:36 EST 2016 ssl.sh: #3110: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8444 at Fri Jan 8 03:47:36 EST 2016 kill -USR1 8444 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8444 killed at Fri Jan 8 03:47:37 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:47:37 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:47:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:47:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3111: Waiting for Server - FAILED kill -0 8552 >/dev/null 2>/dev/null selfserv_9591 with PID 8552 found at Fri Jan 8 03:47:43 EST 2016 selfserv_9591 with PID 8552 started at Fri Jan 8 03:47:43 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 03:47:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:47:43 EST 2016 ssl.sh: #3112: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8552 at Fri Jan 8 03:47:43 EST 2016 kill -USR1 8552 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8552 killed at Fri Jan 8 03:47:44 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:47:44 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:47:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:47:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3113: Waiting for Server - FAILED kill -0 8632 >/dev/null 2>/dev/null selfserv_9591 with PID 8632 found at Fri Jan 8 03:47:50 EST 2016 selfserv_9591 with PID 8632 started at Fri Jan 8 03:47:50 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 03:47:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:47:50 EST 2016 ssl.sh: #3114: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8632 at Fri Jan 8 03:47:50 EST 2016 kill -USR1 8632 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8632 killed at Fri Jan 8 03:47:51 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:47:51 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:47:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:47:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3115: Waiting for Server - FAILED kill -0 8711 >/dev/null 2>/dev/null selfserv_9591 with PID 8711 found at Fri Jan 8 03:47:57 EST 2016 selfserv_9591 with PID 8711 started at Fri Jan 8 03:47:57 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:47:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:47:57 EST 2016 ssl.sh: #3116: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8711 at Fri Jan 8 03:47:57 EST 2016 kill -USR1 8711 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8711 killed at Fri Jan 8 03:47:58 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:47:58 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:47:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:48:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3117: Waiting for Server - FAILED kill -0 8790 >/dev/null 2>/dev/null selfserv_9591 with PID 8790 found at Fri Jan 8 03:48:04 EST 2016 selfserv_9591 with PID 8790 started at Fri Jan 8 03:48:04 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:48:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:48:04 EST 2016 ssl.sh: #3118: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 8790 at Fri Jan 8 03:48:04 EST 2016 kill -USR1 8790 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8790 killed at Fri Jan 8 03:48:05 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 03:48:05 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:48:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:48:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3119: Waiting for Server - FAILED kill -0 8870 >/dev/null 2>/dev/null selfserv_9591 with PID 8870 found at Fri Jan 8 03:48:11 EST 2016 selfserv_9591 with PID 8870 started at Fri Jan 8 03:48:11 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:48:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:48:11 EST 2016 ssl.sh: #3120: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 8870 at Fri Jan 8 03:48:11 EST 2016 kill -USR1 8870 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8870 killed at Fri Jan 8 03:48:12 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:48:12 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:48:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:48:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3121: Waiting for Server - FAILED kill -0 8949 >/dev/null 2>/dev/null selfserv_9591 with PID 8949 found at Fri Jan 8 03:48:18 EST 2016 selfserv_9591 with PID 8949 started at Fri Jan 8 03:48:18 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 03:48:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:48:18 EST 2016 ssl.sh: #3122: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8949 at Fri Jan 8 03:48:18 EST 2016 kill -USR1 8949 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8949 killed at Fri Jan 8 03:48:19 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 03:48:19 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:48:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:48:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3123: Waiting for Server - FAILED kill -0 9028 >/dev/null 2>/dev/null selfserv_9591 with PID 9028 found at Fri Jan 8 03:48:25 EST 2016 selfserv_9591 with PID 9028 started at Fri Jan 8 03:48:25 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 03:48:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:48:25 EST 2016 ssl.sh: #3124: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9028 at Fri Jan 8 03:48:25 EST 2016 kill -USR1 9028 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9028 killed at Fri Jan 8 03:48:26 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:48:26 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:48:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:48:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3125: Waiting for Server - FAILED kill -0 9137 >/dev/null 2>/dev/null selfserv_9591 with PID 9137 found at Fri Jan 8 03:48:32 EST 2016 selfserv_9591 with PID 9137 started at Fri Jan 8 03:48:32 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:48:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:48:33 EST 2016 ssl.sh: #3126: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9137 at Fri Jan 8 03:48:33 EST 2016 kill -USR1 9137 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9137 killed at Fri Jan 8 03:48:33 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:48:33 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:48:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:48:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3127: Waiting for Server - FAILED kill -0 9216 >/dev/null 2>/dev/null selfserv_9591 with PID 9216 found at Fri Jan 8 03:48:39 EST 2016 selfserv_9591 with PID 9216 started at Fri Jan 8 03:48:39 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:48:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:48:40 EST 2016 ssl.sh: #3128: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9216 at Fri Jan 8 03:48:40 EST 2016 kill -USR1 9216 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9216 killed at Fri Jan 8 03:48:40 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:48:40 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:48:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:48:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3129: Waiting for Server - FAILED kill -0 9295 >/dev/null 2>/dev/null selfserv_9591 with PID 9295 found at Fri Jan 8 03:48:46 EST 2016 selfserv_9591 with PID 9295 started at Fri Jan 8 03:48:46 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:48:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:48:47 EST 2016 ssl.sh: #3130: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9295 at Fri Jan 8 03:48:47 EST 2016 kill -USR1 9295 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9295 killed at Fri Jan 8 03:48:47 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:48:47 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:48:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:48:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3131: Waiting for Server - FAILED kill -0 9375 >/dev/null 2>/dev/null selfserv_9591 with PID 9375 found at Fri Jan 8 03:48:53 EST 2016 selfserv_9591 with PID 9375 started at Fri Jan 8 03:48:53 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:48:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:48:54 EST 2016 ssl.sh: #3132: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9375 at Fri Jan 8 03:48:54 EST 2016 kill -USR1 9375 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9375 killed at Fri Jan 8 03:48:54 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:48:54 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:48:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:49:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3133: Waiting for Server - FAILED kill -0 9454 >/dev/null 2>/dev/null selfserv_9591 with PID 9454 found at Fri Jan 8 03:49:00 EST 2016 selfserv_9591 with PID 9454 started at Fri Jan 8 03:49:00 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:49:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:49:01 EST 2016 ssl.sh: #3134: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9454 at Fri Jan 8 03:49:01 EST 2016 kill -USR1 9454 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9454 killed at Fri Jan 8 03:49:01 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9591 starting at Fri Jan 8 03:49:01 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:49:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:49:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3135: Waiting for Server - FAILED kill -0 9533 >/dev/null 2>/dev/null selfserv_9591 with PID 9533 found at Fri Jan 8 03:49:07 EST 2016 selfserv_9591 with PID 9533 started at Fri Jan 8 03:49:07 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 03:49:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:49:08 EST 2016 ssl.sh: #3136: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 9533 at Fri Jan 8 03:49:08 EST 2016 kill -USR1 9533 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9533 killed at Fri Jan 8 03:49:08 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9591 starting at Fri Jan 8 03:49:08 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:49:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:49:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3137: Waiting for Server - FAILED kill -0 9613 >/dev/null 2>/dev/null selfserv_9591 with PID 9613 found at Fri Jan 8 03:49:14 EST 2016 selfserv_9591 with PID 9613 started at Fri Jan 8 03:49:14 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 03:49:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:49:15 EST 2016 ssl.sh: #3138: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 9613 at Fri Jan 8 03:49:15 EST 2016 kill -USR1 9613 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9613 killed at Fri Jan 8 03:49:15 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9591 starting at Fri Jan 8 03:49:15 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:49:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:49:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3139: Waiting for Server - FAILED kill -0 9692 >/dev/null 2>/dev/null selfserv_9591 with PID 9692 found at Fri Jan 8 03:49:21 EST 2016 selfserv_9591 with PID 9692 started at Fri Jan 8 03:49:21 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 03:49:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:49:22 EST 2016 ssl.sh: #3140: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 9692 at Fri Jan 8 03:49:22 EST 2016 kill -USR1 9692 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9692 killed at Fri Jan 8 03:49:22 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 03:49:22 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:49:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:49:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3141: Waiting for Server - FAILED kill -0 9771 >/dev/null 2>/dev/null selfserv_9591 with PID 9771 found at Fri Jan 8 03:49:28 EST 2016 selfserv_9591 with PID 9771 started at Fri Jan 8 03:49:28 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:49:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:49:29 EST 2016 ssl.sh: #3142: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9771 at Fri Jan 8 03:49:29 EST 2016 kill -USR1 9771 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9771 killed at Fri Jan 8 03:49:29 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 03:49:29 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:49:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:49:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3143: Waiting for Server - FAILED kill -0 9851 >/dev/null 2>/dev/null selfserv_9591 with PID 9851 found at Fri Jan 8 03:49:35 EST 2016 selfserv_9591 with PID 9851 started at Fri Jan 8 03:49:35 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:49:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:49:36 EST 2016 ssl.sh: #3144: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9851 at Fri Jan 8 03:49:36 EST 2016 kill -USR1 9851 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9851 killed at Fri Jan 8 03:49:36 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:49:36 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:49:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:49:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3145: Waiting for Server - FAILED kill -0 9951 >/dev/null 2>/dev/null selfserv_9591 with PID 9951 found at Fri Jan 8 03:49:42 EST 2016 selfserv_9591 with PID 9951 started at Fri Jan 8 03:49:42 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:49:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:49:43 EST 2016 ssl.sh: #3146: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9951 at Fri Jan 8 03:49:43 EST 2016 kill -USR1 9951 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9951 killed at Fri Jan 8 03:49:43 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:49:44 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:49:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:49:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3147: Waiting for Server - FAILED kill -0 10030 >/dev/null 2>/dev/null selfserv_9591 with PID 10030 found at Fri Jan 8 03:49:49 EST 2016 selfserv_9591 with PID 10030 started at Fri Jan 8 03:49:49 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:49:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:49:50 EST 2016 ssl.sh: #3148: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 10030 at Fri Jan 8 03:49:50 EST 2016 kill -USR1 10030 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10030 killed at Fri Jan 8 03:49:50 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:49:51 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:49:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:49:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3149: Waiting for Server - FAILED kill -0 10110 >/dev/null 2>/dev/null selfserv_9591 with PID 10110 found at Fri Jan 8 03:49:56 EST 2016 selfserv_9591 with PID 10110 started at Fri Jan 8 03:49:56 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:49:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:49:57 EST 2016 ssl.sh: #3150: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 10110 at Fri Jan 8 03:49:57 EST 2016 kill -USR1 10110 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10110 killed at Fri Jan 8 03:49:57 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:49:58 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:49:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:50:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3151: Waiting for Server - FAILED kill -0 10189 >/dev/null 2>/dev/null selfserv_9591 with PID 10189 found at Fri Jan 8 03:50:03 EST 2016 selfserv_9591 with PID 10189 started at Fri Jan 8 03:50:04 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 03:50:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:50:04 EST 2016 ssl.sh: #3152: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 10189 at Fri Jan 8 03:50:04 EST 2016 kill -USR1 10189 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10189 killed at Fri Jan 8 03:50:04 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9591 starting at Fri Jan 8 03:50:05 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:50:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:50:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3153: Waiting for Server - FAILED kill -0 10268 >/dev/null 2>/dev/null selfserv_9591 with PID 10268 found at Fri Jan 8 03:50:11 EST 2016 selfserv_9591 with PID 10268 started at Fri Jan 8 03:50:11 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 03:50:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:50:11 EST 2016 ssl.sh: #3154: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 10268 at Fri Jan 8 03:50:11 EST 2016 kill -USR1 10268 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10268 killed at Fri Jan 8 03:50:12 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:50:12 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:50:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:50:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3155: Waiting for Server - FAILED kill -0 10348 >/dev/null 2>/dev/null selfserv_9591 with PID 10348 found at Fri Jan 8 03:50:18 EST 2016 selfserv_9591 with PID 10348 started at Fri Jan 8 03:50:18 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 03:50:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:50:18 EST 2016 ssl.sh: #3156: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 10348 at Fri Jan 8 03:50:18 EST 2016 kill -USR1 10348 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10348 killed at Fri Jan 8 03:50:19 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:50:19 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:50:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:50:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3157: Waiting for Server - FAILED kill -0 10448 >/dev/null 2>/dev/null selfserv_9591 with PID 10448 found at Fri Jan 8 03:50:25 EST 2016 selfserv_9591 with PID 10448 started at Fri Jan 8 03:50:25 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:50:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:50:25 EST 2016 ssl.sh: #3158: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 10448 at Fri Jan 8 03:50:25 EST 2016 kill -USR1 10448 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10448 killed at Fri Jan 8 03:50:26 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9591 starting at Fri Jan 8 03:50:26 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:50:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:50:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3159: Waiting for Server - FAILED kill -0 10527 >/dev/null 2>/dev/null selfserv_9591 with PID 10527 found at Fri Jan 8 03:50:32 EST 2016 selfserv_9591 with PID 10527 started at Fri Jan 8 03:50:32 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 03:50:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:50:32 EST 2016 ssl.sh: #3160: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 10527 at Fri Jan 8 03:50:32 EST 2016 kill -USR1 10527 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10527 killed at Fri Jan 8 03:50:33 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:50:33 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:50:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:50:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3161: Waiting for Server - FAILED kill -0 10607 >/dev/null 2>/dev/null selfserv_9591 with PID 10607 found at Fri Jan 8 03:50:39 EST 2016 selfserv_9591 with PID 10607 started at Fri Jan 8 03:50:39 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:50:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:50:39 EST 2016 ssl.sh: #3162: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 10607 at Fri Jan 8 03:50:39 EST 2016 kill -USR1 10607 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10607 killed at Fri Jan 8 03:50:40 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:50:40 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:50:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:50:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3163: Waiting for Server - FAILED kill -0 10686 >/dev/null 2>/dev/null selfserv_9591 with PID 10686 found at Fri Jan 8 03:50:46 EST 2016 selfserv_9591 with PID 10686 started at Fri Jan 8 03:50:46 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:50:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:50:46 EST 2016 ssl.sh: #3164: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 10686 at Fri Jan 8 03:50:46 EST 2016 kill -USR1 10686 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10686 killed at Fri Jan 8 03:50:47 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:50:47 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:50:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:50:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3165: Waiting for Server - FAILED kill -0 10780 >/dev/null 2>/dev/null selfserv_9591 with PID 10780 found at Fri Jan 8 03:50:53 EST 2016 selfserv_9591 with PID 10780 started at Fri Jan 8 03:50:53 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:50:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:50:53 EST 2016 ssl.sh: #3166: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 10780 at Fri Jan 8 03:50:53 EST 2016 kill -USR1 10780 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10780 killed at Fri Jan 8 03:50:54 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9591 starting at Fri Jan 8 03:50:54 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:50:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:50:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3167: Waiting for Server - FAILED kill -0 10874 >/dev/null 2>/dev/null selfserv_9591 with PID 10874 found at Fri Jan 8 03:51:00 EST 2016 selfserv_9591 with PID 10874 started at Fri Jan 8 03:51:00 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:51:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:51:00 EST 2016 ssl.sh: #3168: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 10874 at Fri Jan 8 03:51:01 EST 2016 kill -USR1 10874 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10874 killed at Fri Jan 8 03:51:01 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:51:01 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:51:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:51:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3169: Waiting for Server - FAILED kill -0 10954 >/dev/null 2>/dev/null selfserv_9591 with PID 10954 found at Fri Jan 8 03:51:07 EST 2016 selfserv_9591 with PID 10954 started at Fri Jan 8 03:51:07 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:51:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:51:07 EST 2016 ssl.sh: #3170: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 10954 at Fri Jan 8 03:51:08 EST 2016 kill -USR1 10954 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10954 killed at Fri Jan 8 03:51:08 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 03:51:08 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:51:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:51:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3171: Waiting for Server - FAILED kill -0 11033 >/dev/null 2>/dev/null selfserv_9591 with PID 11033 found at Fri Jan 8 03:51:14 EST 2016 selfserv_9591 with PID 11033 started at Fri Jan 8 03:51:14 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 03:51:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:51:14 EST 2016 ssl.sh: #3172: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 11033 at Fri Jan 8 03:51:15 EST 2016 kill -USR1 11033 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11033 killed at Fri Jan 8 03:51:15 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:51:15 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:51:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:51:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3173: Waiting for Server - FAILED kill -0 11136 >/dev/null 2>/dev/null selfserv_9591 with PID 11136 found at Fri Jan 8 03:51:21 EST 2016 selfserv_9591 with PID 11136 started at Fri Jan 8 03:51:21 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 03:51:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:51:22 EST 2016 ssl.sh: #3174: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 11136 at Fri Jan 8 03:51:22 EST 2016 kill -USR1 11136 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11136 killed at Fri Jan 8 03:51:22 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:51:22 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:51:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:51:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3175: Waiting for Server - FAILED kill -0 11215 >/dev/null 2>/dev/null selfserv_9591 with PID 11215 found at Fri Jan 8 03:51:28 EST 2016 selfserv_9591 with PID 11215 started at Fri Jan 8 03:51:28 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 03:51:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:51:29 EST 2016 ssl.sh: #3176: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 11215 at Fri Jan 8 03:51:29 EST 2016 kill -USR1 11215 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11215 killed at Fri Jan 8 03:51:29 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 03:51:29 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:51:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:51:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3177: Waiting for Server - FAILED kill -0 11308 >/dev/null 2>/dev/null selfserv_9591 with PID 11308 found at Fri Jan 8 03:51:35 EST 2016 selfserv_9591 with PID 11308 started at Fri Jan 8 03:51:35 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 03:51:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 03:51:36 EST 2016 ssl.sh: #3178: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 11308 at Fri Jan 8 03:51:36 EST 2016 kill -USR1 11308 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11308 killed at Fri Jan 8 03:51:36 EST 2016 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -fips true -force FIPS mode enabled. ssl.sh: #3179: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -list ssl.sh: #3180: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #3181: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -fips true -force FIPS mode enabled. ssl.sh: #3182: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -list ssl.sh: #3183: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #3184: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal - with ECC =============================== selfserv_9591 starting at Fri Jan 8 03:51:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:51:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:51:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3185: Waiting for Server - FAILED kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:44 EST 2016 selfserv_9591 with PID 11443 started at Fri Jan 8 03:51:44 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping A SSL2_RC4_128_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping F SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3186: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3187: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3188: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3189: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3190: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3191: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3192: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3193: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3194: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3195: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3196: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3197: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3198: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3199: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3200: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3201: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3202: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3203: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3204: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3205: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3206: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3207: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3208: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3209: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3210: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3211: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:51:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3212: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3213: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3214: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3215: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3216: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3217: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3218: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3219: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3220: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3221: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3222: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3223: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3224: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS12_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS12_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3225: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3226: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3227: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3228: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3229: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3230: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3231: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3232: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3233: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3234: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3235: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3236: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3237: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3238: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3239: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3240: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3241: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3242: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3243: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3244: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3245: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3246: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3247: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3248: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3249: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3250: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3251: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3252: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11443 >/dev/null 2>/dev/null selfserv_9591 with PID 11443 found at Fri Jan 8 03:52:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3253: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 11443 at Fri Jan 8 03:52:21 EST 2016 kill -USR1 11443 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11443 killed at Fri Jan 8 03:52:22 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:52:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:52:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:52:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3254: Waiting for Server - FAILED kill -0 13474 >/dev/null 2>/dev/null selfserv_9591 with PID 13474 found at Fri Jan 8 03:52:28 EST 2016 selfserv_9591 with PID 13474 started at Fri Jan 8 03:52:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3255: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13474 >/dev/null 2>/dev/null selfserv_9591 with PID 13474 found at Fri Jan 8 03:52:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3256: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13474 >/dev/null 2>/dev/null selfserv_9591 with PID 13474 found at Fri Jan 8 03:52:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3257: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13474 >/dev/null 2>/dev/null selfserv_9591 with PID 13474 found at Fri Jan 8 03:52:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3258: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13474 >/dev/null 2>/dev/null selfserv_9591 with PID 13474 found at Fri Jan 8 03:52:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3259: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 13474 at Fri Jan 8 03:52:30 EST 2016 kill -USR1 13474 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13474 killed at Fri Jan 8 03:52:31 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:52:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:52:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:52:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3260: Waiting for Server - FAILED kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:37 EST 2016 selfserv_9591 with PID 13639 started at Fri Jan 8 03:52:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3261: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3262: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3263: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3264: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3265: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3266: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3267: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3268: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3269: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3270: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3271: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3272: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3273: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3274: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13639 >/dev/null 2>/dev/null selfserv_9591 with PID 13639 found at Fri Jan 8 03:52:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3275: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 13639 at Fri Jan 8 03:52:44 EST 2016 kill -USR1 13639 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13639 killed at Fri Jan 8 03:52:45 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:52:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:52:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:52:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3276: Waiting for Server - FAILED kill -0 14053 >/dev/null 2>/dev/null selfserv_9591 with PID 14053 found at Fri Jan 8 03:52:51 EST 2016 selfserv_9591 with PID 14053 started at Fri Jan 8 03:52:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3277: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 14053 >/dev/null 2>/dev/null selfserv_9591 with PID 14053 found at Fri Jan 8 03:52:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3278: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14053 >/dev/null 2>/dev/null selfserv_9591 with PID 14053 found at Fri Jan 8 03:52:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3279: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 14053 >/dev/null 2>/dev/null selfserv_9591 with PID 14053 found at Fri Jan 8 03:52:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3280: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 14053 >/dev/null 2>/dev/null selfserv_9591 with PID 14053 found at Fri Jan 8 03:52:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3281: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 14053 at Fri Jan 8 03:52:53 EST 2016 kill -USR1 14053 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14053 killed at Fri Jan 8 03:52:54 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:52:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:52:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:52:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3282: Waiting for Server - FAILED kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:00 EST 2016 selfserv_9591 with PID 14219 started at Fri Jan 8 03:53:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3283: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3284: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3285: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3286: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3287: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3288: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3289: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3290: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3291: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3292: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3293: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3294: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3295: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3296: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 14219 >/dev/null 2>/dev/null selfserv_9591 with PID 14219 found at Fri Jan 8 03:53:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3297: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 14219 at Fri Jan 8 03:53:08 EST 2016 kill -USR1 14219 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14219 killed at Fri Jan 8 03:53:08 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:53:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:53:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:53:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3298: Waiting for Server - FAILED kill -0 14633 >/dev/null 2>/dev/null selfserv_9591 with PID 14633 found at Fri Jan 8 03:53:14 EST 2016 selfserv_9591 with PID 14633 started at Fri Jan 8 03:53:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3299: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 14633 >/dev/null 2>/dev/null selfserv_9591 with PID 14633 found at Fri Jan 8 03:53:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3300: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14633 >/dev/null 2>/dev/null selfserv_9591 with PID 14633 found at Fri Jan 8 03:53:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3301: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 14633 >/dev/null 2>/dev/null selfserv_9591 with PID 14633 found at Fri Jan 8 03:53:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3302: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 14633 >/dev/null 2>/dev/null selfserv_9591 with PID 14633 found at Fri Jan 8 03:53:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3303: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 14633 at Fri Jan 8 03:53:17 EST 2016 kill -USR1 14633 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14633 killed at Fri Jan 8 03:53:17 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 03:53:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:53:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:53:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3304: Waiting for Server - FAILED kill -0 14799 >/dev/null 2>/dev/null selfserv_9591 with PID 14799 found at Fri Jan 8 03:53:23 EST 2016 selfserv_9591 with PID 14799 started at Fri Jan 8 03:53:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3305: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 14799 >/dev/null 2>/dev/null selfserv_9591 with PID 14799 found at Fri Jan 8 03:53:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3306: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14799 >/dev/null 2>/dev/null selfserv_9591 with PID 14799 found at Fri Jan 8 03:53:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3307: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 14799 >/dev/null 2>/dev/null selfserv_9591 with PID 14799 found at Fri Jan 8 03:53:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3308: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 14799 >/dev/null 2>/dev/null selfserv_9591 with PID 14799 found at Fri Jan 8 03:53:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3309: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 14799 >/dev/null 2>/dev/null selfserv_9591 with PID 14799 found at Fri Jan 8 03:53:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3310: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 14799 >/dev/null 2>/dev/null selfserv_9591 with PID 14799 found at Fri Jan 8 03:53:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3311: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 14799 >/dev/null 2>/dev/null selfserv_9591 with PID 14799 found at Fri Jan 8 03:53:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3312: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 14799 >/dev/null 2>/dev/null selfserv_9591 with PID 14799 found at Fri Jan 8 03:53:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3313: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 14799 >/dev/null 2>/dev/null selfserv_9591 with PID 14799 found at Fri Jan 8 03:53:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3314: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 14799 >/dev/null 2>/dev/null selfserv_9591 with PID 14799 found at Fri Jan 8 03:53:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3315: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 14799 >/dev/null 2>/dev/null selfserv_9591 with PID 14799 found at Fri Jan 8 03:53:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3316: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 14799 >/dev/null 2>/dev/null selfserv_9591 with PID 14799 found at Fri Jan 8 03:53:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3317: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14799 at Fri Jan 8 03:53:30 EST 2016 kill -USR1 14799 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14799 killed at Fri Jan 8 03:53:30 EST 2016 ssl.sh: SSL Client Authentication - server fips/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:53:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:53:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:53:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3318: Waiting for Server - FAILED kill -0 15206 >/dev/null 2>/dev/null selfserv_9591 with PID 15206 found at Fri Jan 8 03:53:36 EST 2016 selfserv_9591 with PID 15206 started at Fri Jan 8 03:53:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3319: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15206 at Fri Jan 8 03:53:37 EST 2016 kill -USR1 15206 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15206 killed at Fri Jan 8 03:53:37 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:53:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:53:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:53:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3320: Waiting for Server - FAILED kill -0 15276 >/dev/null 2>/dev/null selfserv_9591 with PID 15276 found at Fri Jan 8 03:53:43 EST 2016 selfserv_9591 with PID 15276 started at Fri Jan 8 03:53:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3321: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15276 at Fri Jan 8 03:53:44 EST 2016 kill -USR1 15276 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15276 killed at Fri Jan 8 03:53:44 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:53:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:53:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:53:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3322: Waiting for Server - FAILED kill -0 15345 >/dev/null 2>/dev/null selfserv_9591 with PID 15345 found at Fri Jan 8 03:53:50 EST 2016 selfserv_9591 with PID 15345 started at Fri Jan 8 03:53:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3323: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15345 at Fri Jan 8 03:53:51 EST 2016 kill -USR1 15345 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15345 killed at Fri Jan 8 03:53:51 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:53:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:53:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:53:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3324: Waiting for Server - FAILED kill -0 15414 >/dev/null 2>/dev/null selfserv_9591 with PID 15414 found at Fri Jan 8 03:53:57 EST 2016 selfserv_9591 with PID 15414 started at Fri Jan 8 03:53:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3325: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 15414 at Fri Jan 8 03:53:58 EST 2016 kill -USR1 15414 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15414 killed at Fri Jan 8 03:53:58 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:53:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:53:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:54:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3326: Waiting for Server - FAILED kill -0 15484 >/dev/null 2>/dev/null selfserv_9591 with PID 15484 found at Fri Jan 8 03:54:04 EST 2016 selfserv_9591 with PID 15484 started at Fri Jan 8 03:54:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3327: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 15484 at Fri Jan 8 03:54:05 EST 2016 kill -USR1 15484 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15484 killed at Fri Jan 8 03:54:05 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:54:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:54:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:54:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3328: Waiting for Server - FAILED kill -0 15553 >/dev/null 2>/dev/null selfserv_9591 with PID 15553 found at Fri Jan 8 03:54:11 EST 2016 selfserv_9591 with PID 15553 started at Fri Jan 8 03:54:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3329: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15553 at Fri Jan 8 03:54:12 EST 2016 kill -USR1 15553 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15553 killed at Fri Jan 8 03:54:12 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:54:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:54:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:54:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3330: Waiting for Server - FAILED kill -0 15622 >/dev/null 2>/dev/null selfserv_9591 with PID 15622 found at Fri Jan 8 03:54:18 EST 2016 selfserv_9591 with PID 15622 started at Fri Jan 8 03:54:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3331: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15622 at Fri Jan 8 03:54:18 EST 2016 kill -USR1 15622 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15622 killed at Fri Jan 8 03:54:19 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:54:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:54:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:54:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3332: Waiting for Server - FAILED kill -0 15692 >/dev/null 2>/dev/null selfserv_9591 with PID 15692 found at Fri Jan 8 03:54:25 EST 2016 selfserv_9591 with PID 15692 started at Fri Jan 8 03:54:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3333: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15692 at Fri Jan 8 03:54:25 EST 2016 kill -USR1 15692 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15692 killed at Fri Jan 8 03:54:26 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:54:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:54:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:54:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3334: Waiting for Server - FAILED kill -0 15761 >/dev/null 2>/dev/null selfserv_9591 with PID 15761 found at Fri Jan 8 03:54:32 EST 2016 selfserv_9591 with PID 15761 started at Fri Jan 8 03:54:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3335: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15761 at Fri Jan 8 03:54:32 EST 2016 kill -USR1 15761 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15761 killed at Fri Jan 8 03:54:33 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:54:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:54:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:54:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3336: Waiting for Server - FAILED kill -0 15830 >/dev/null 2>/dev/null selfserv_9591 with PID 15830 found at Fri Jan 8 03:54:39 EST 2016 selfserv_9591 with PID 15830 started at Fri Jan 8 03:54:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3337: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 15830 at Fri Jan 8 03:54:39 EST 2016 kill -USR1 15830 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15830 killed at Fri Jan 8 03:54:40 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:54:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:54:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:54:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3338: Waiting for Server - FAILED kill -0 15901 >/dev/null 2>/dev/null selfserv_9591 with PID 15901 found at Fri Jan 8 03:54:46 EST 2016 selfserv_9591 with PID 15901 started at Fri Jan 8 03:54:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3339: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 15901 at Fri Jan 8 03:54:46 EST 2016 kill -USR1 15901 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15901 killed at Fri Jan 8 03:54:47 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:54:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:54:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:54:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3340: Waiting for Server - FAILED kill -0 15970 >/dev/null 2>/dev/null selfserv_9591 with PID 15970 found at Fri Jan 8 03:54:53 EST 2016 selfserv_9591 with PID 15970 started at Fri Jan 8 03:54:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3341: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15970 at Fri Jan 8 03:54:53 EST 2016 kill -USR1 15970 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15970 killed at Fri Jan 8 03:54:53 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:54:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:54:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:54:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3342: Waiting for Server - FAILED kill -0 16039 >/dev/null 2>/dev/null selfserv_9591 with PID 16039 found at Fri Jan 8 03:54:59 EST 2016 selfserv_9591 with PID 16039 started at Fri Jan 8 03:54:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3343: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16039 at Fri Jan 8 03:55:00 EST 2016 kill -USR1 16039 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16039 killed at Fri Jan 8 03:55:00 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:55:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:55:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:55:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3344: Waiting for Server - FAILED kill -0 16109 >/dev/null 2>/dev/null selfserv_9591 with PID 16109 found at Fri Jan 8 03:55:06 EST 2016 selfserv_9591 with PID 16109 started at Fri Jan 8 03:55:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3345: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16109 at Fri Jan 8 03:55:07 EST 2016 kill -USR1 16109 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16109 killed at Fri Jan 8 03:55:07 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:55:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:55:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:55:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3346: Waiting for Server - FAILED kill -0 16178 >/dev/null 2>/dev/null selfserv_9591 with PID 16178 found at Fri Jan 8 03:55:13 EST 2016 selfserv_9591 with PID 16178 started at Fri Jan 8 03:55:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3347: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16178 at Fri Jan 8 03:55:14 EST 2016 kill -USR1 16178 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16178 killed at Fri Jan 8 03:55:14 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:55:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:55:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:55:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3348: Waiting for Server - FAILED kill -0 16247 >/dev/null 2>/dev/null selfserv_9591 with PID 16247 found at Fri Jan 8 03:55:20 EST 2016 selfserv_9591 with PID 16247 started at Fri Jan 8 03:55:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3349: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 16247 at Fri Jan 8 03:55:21 EST 2016 kill -USR1 16247 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16247 killed at Fri Jan 8 03:55:21 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:55:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:55:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:55:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3350: Waiting for Server - FAILED kill -0 16317 >/dev/null 2>/dev/null selfserv_9591 with PID 16317 found at Fri Jan 8 03:55:27 EST 2016 selfserv_9591 with PID 16317 started at Fri Jan 8 03:55:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3351: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 16317 at Fri Jan 8 03:55:28 EST 2016 kill -USR1 16317 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16317 killed at Fri Jan 8 03:55:28 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:55:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:55:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:55:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3352: Waiting for Server - FAILED kill -0 16386 >/dev/null 2>/dev/null selfserv_9591 with PID 16386 found at Fri Jan 8 03:55:34 EST 2016 selfserv_9591 with PID 16386 started at Fri Jan 8 03:55:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3353: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16386 at Fri Jan 8 03:55:35 EST 2016 kill -USR1 16386 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16386 killed at Fri Jan 8 03:55:35 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:55:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:55:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:55:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3354: Waiting for Server - FAILED kill -0 16455 >/dev/null 2>/dev/null selfserv_9591 with PID 16455 found at Fri Jan 8 03:55:41 EST 2016 selfserv_9591 with PID 16455 started at Fri Jan 8 03:55:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3355: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16455 at Fri Jan 8 03:55:41 EST 2016 kill -USR1 16455 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16455 killed at Fri Jan 8 03:55:42 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:55:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:55:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:55:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3356: Waiting for Server - FAILED kill -0 16525 >/dev/null 2>/dev/null selfserv_9591 with PID 16525 found at Fri Jan 8 03:55:48 EST 2016 selfserv_9591 with PID 16525 started at Fri Jan 8 03:55:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3357: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16525 at Fri Jan 8 03:55:48 EST 2016 kill -USR1 16525 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16525 killed at Fri Jan 8 03:55:49 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:55:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:55:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:55:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3358: Waiting for Server - FAILED kill -0 16594 >/dev/null 2>/dev/null selfserv_9591 with PID 16594 found at Fri Jan 8 03:55:55 EST 2016 selfserv_9591 with PID 16594 started at Fri Jan 8 03:55:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3359: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16594 at Fri Jan 8 03:55:55 EST 2016 kill -USR1 16594 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16594 killed at Fri Jan 8 03:55:56 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:55:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:55:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:56:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3360: Waiting for Server - FAILED kill -0 16663 >/dev/null 2>/dev/null selfserv_9591 with PID 16663 found at Fri Jan 8 03:56:02 EST 2016 selfserv_9591 with PID 16663 started at Fri Jan 8 03:56:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3361: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 16663 at Fri Jan 8 03:56:02 EST 2016 kill -USR1 16663 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16663 killed at Fri Jan 8 03:56:03 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:56:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:56:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:56:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3362: Waiting for Server - FAILED kill -0 16733 >/dev/null 2>/dev/null selfserv_9591 with PID 16733 found at Fri Jan 8 03:56:09 EST 2016 selfserv_9591 with PID 16733 started at Fri Jan 8 03:56:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3363: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 16733 at Fri Jan 8 03:56:09 EST 2016 kill -USR1 16733 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16733 killed at Fri Jan 8 03:56:10 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:56:10 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:56:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:56:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3364: Waiting for Server - FAILED kill -0 16802 >/dev/null 2>/dev/null selfserv_9591 with PID 16802 found at Fri Jan 8 03:56:16 EST 2016 selfserv_9591 with PID 16802 started at Fri Jan 8 03:56:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3365: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16802 at Fri Jan 8 03:56:16 EST 2016 kill -USR1 16802 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16802 killed at Fri Jan 8 03:56:16 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:56:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:56:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:56:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3366: Waiting for Server - FAILED kill -0 16871 >/dev/null 2>/dev/null selfserv_9591 with PID 16871 found at Fri Jan 8 03:56:22 EST 2016 selfserv_9591 with PID 16871 started at Fri Jan 8 03:56:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3367: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16871 at Fri Jan 8 03:56:23 EST 2016 kill -USR1 16871 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16871 killed at Fri Jan 8 03:56:23 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:56:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:56:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:56:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3368: Waiting for Server - FAILED kill -0 16941 >/dev/null 2>/dev/null selfserv_9591 with PID 16941 found at Fri Jan 8 03:56:29 EST 2016 selfserv_9591 with PID 16941 started at Fri Jan 8 03:56:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3369: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16941 at Fri Jan 8 03:56:30 EST 2016 kill -USR1 16941 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16941 killed at Fri Jan 8 03:56:30 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:56:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:56:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:56:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3370: Waiting for Server - FAILED kill -0 17010 >/dev/null 2>/dev/null selfserv_9591 with PID 17010 found at Fri Jan 8 03:56:36 EST 2016 selfserv_9591 with PID 17010 started at Fri Jan 8 03:56:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3371: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17010 at Fri Jan 8 03:56:37 EST 2016 kill -USR1 17010 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17010 killed at Fri Jan 8 03:56:37 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 03:56:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:56:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:56:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3372: Waiting for Server - FAILED kill -0 17079 >/dev/null 2>/dev/null selfserv_9591 with PID 17079 found at Fri Jan 8 03:56:43 EST 2016 selfserv_9591 with PID 17079 started at Fri Jan 8 03:56:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3373: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17079 at Fri Jan 8 03:56:44 EST 2016 kill -USR1 17079 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17079 killed at Fri Jan 8 03:56:44 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:56:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:56:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:56:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3374: Waiting for Server - FAILED kill -0 17149 >/dev/null 2>/dev/null selfserv_9591 with PID 17149 found at Fri Jan 8 03:56:50 EST 2016 selfserv_9591 with PID 17149 started at Fri Jan 8 03:56:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3375: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17149 at Fri Jan 8 03:56:51 EST 2016 kill -USR1 17149 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17149 killed at Fri Jan 8 03:56:51 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:56:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:56:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:56:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3376: Waiting for Server - FAILED kill -0 17218 >/dev/null 2>/dev/null selfserv_9591 with PID 17218 found at Fri Jan 8 03:56:57 EST 2016 selfserv_9591 with PID 17218 started at Fri Jan 8 03:56:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3377: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17218 at Fri Jan 8 03:56:58 EST 2016 kill -USR1 17218 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17218 killed at Fri Jan 8 03:56:58 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:56:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:56:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:57:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3378: Waiting for Server - FAILED kill -0 17302 >/dev/null 2>/dev/null selfserv_9591 with PID 17302 found at Fri Jan 8 03:57:04 EST 2016 selfserv_9591 with PID 17302 started at Fri Jan 8 03:57:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3379: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17302 at Fri Jan 8 03:57:04 EST 2016 kill -USR1 17302 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17302 killed at Fri Jan 8 03:57:05 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:57:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:57:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:57:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3380: Waiting for Server - FAILED kill -0 17372 >/dev/null 2>/dev/null selfserv_9591 with PID 17372 found at Fri Jan 8 03:57:11 EST 2016 selfserv_9591 with PID 17372 started at Fri Jan 8 03:57:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3381: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17372 at Fri Jan 8 03:57:11 EST 2016 kill -USR1 17372 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17372 killed at Fri Jan 8 03:57:12 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:57:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:57:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:57:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3382: Waiting for Server - FAILED kill -0 17441 >/dev/null 2>/dev/null selfserv_9591 with PID 17441 found at Fri Jan 8 03:57:18 EST 2016 selfserv_9591 with PID 17441 started at Fri Jan 8 03:57:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3383: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17441 at Fri Jan 8 03:57:18 EST 2016 kill -USR1 17441 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17441 killed at Fri Jan 8 03:57:19 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:57:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:57:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:57:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3384: Waiting for Server - FAILED kill -0 17511 >/dev/null 2>/dev/null selfserv_9591 with PID 17511 found at Fri Jan 8 03:57:25 EST 2016 selfserv_9591 with PID 17511 started at Fri Jan 8 03:57:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3385: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17511 at Fri Jan 8 03:57:25 EST 2016 kill -USR1 17511 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17511 killed at Fri Jan 8 03:57:26 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:57:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:57:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:57:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3386: Waiting for Server - FAILED kill -0 17580 >/dev/null 2>/dev/null selfserv_9591 with PID 17580 found at Fri Jan 8 03:57:32 EST 2016 selfserv_9591 with PID 17580 started at Fri Jan 8 03:57:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3387: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17580 at Fri Jan 8 03:57:32 EST 2016 kill -USR1 17580 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17580 killed at Fri Jan 8 03:57:33 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:57:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:57:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:57:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3388: Waiting for Server - FAILED kill -0 17649 >/dev/null 2>/dev/null selfserv_9591 with PID 17649 found at Fri Jan 8 03:57:39 EST 2016 selfserv_9591 with PID 17649 started at Fri Jan 8 03:57:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3389: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17649 at Fri Jan 8 03:57:39 EST 2016 kill -USR1 17649 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17649 killed at Fri Jan 8 03:57:39 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:57:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:57:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:57:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3390: Waiting for Server - FAILED kill -0 17719 >/dev/null 2>/dev/null selfserv_9591 with PID 17719 found at Fri Jan 8 03:57:45 EST 2016 selfserv_9591 with PID 17719 started at Fri Jan 8 03:57:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3391: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17719 at Fri Jan 8 03:57:46 EST 2016 kill -USR1 17719 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17719 killed at Fri Jan 8 03:57:46 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:57:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:57:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:57:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3392: Waiting for Server - FAILED kill -0 17788 >/dev/null 2>/dev/null selfserv_9591 with PID 17788 found at Fri Jan 8 03:57:52 EST 2016 selfserv_9591 with PID 17788 started at Fri Jan 8 03:57:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3393: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17788 at Fri Jan 8 03:57:53 EST 2016 kill -USR1 17788 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17788 killed at Fri Jan 8 03:57:53 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:57:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:57:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:57:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3394: Waiting for Server - FAILED kill -0 17857 >/dev/null 2>/dev/null selfserv_9591 with PID 17857 found at Fri Jan 8 03:57:59 EST 2016 selfserv_9591 with PID 17857 started at Fri Jan 8 03:57:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3395: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17857 at Fri Jan 8 03:58:00 EST 2016 kill -USR1 17857 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17857 killed at Fri Jan 8 03:58:00 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:58:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:58:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:58:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3396: Waiting for Server - FAILED kill -0 17927 >/dev/null 2>/dev/null selfserv_9591 with PID 17927 found at Fri Jan 8 03:58:06 EST 2016 selfserv_9591 with PID 17927 started at Fri Jan 8 03:58:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3397: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17927 at Fri Jan 8 03:58:07 EST 2016 kill -USR1 17927 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17927 killed at Fri Jan 8 03:58:07 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:58:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:58:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:58:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3398: Waiting for Server - FAILED kill -0 17996 >/dev/null 2>/dev/null selfserv_9591 with PID 17996 found at Fri Jan 8 03:58:13 EST 2016 selfserv_9591 with PID 17996 started at Fri Jan 8 03:58:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3399: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17996 at Fri Jan 8 03:58:14 EST 2016 kill -USR1 17996 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17996 killed at Fri Jan 8 03:58:14 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:58:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:58:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:58:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3400: Waiting for Server - FAILED kill -0 18067 >/dev/null 2>/dev/null selfserv_9591 with PID 18067 found at Fri Jan 8 03:58:20 EST 2016 selfserv_9591 with PID 18067 started at Fri Jan 8 03:58:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3401: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18067 at Fri Jan 8 03:58:21 EST 2016 kill -USR1 18067 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18067 killed at Fri Jan 8 03:58:21 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:58:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:58:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:58:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3402: Waiting for Server - FAILED kill -0 18137 >/dev/null 2>/dev/null selfserv_9591 with PID 18137 found at Fri Jan 8 03:58:27 EST 2016 selfserv_9591 with PID 18137 started at Fri Jan 8 03:58:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3403: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18137 at Fri Jan 8 03:58:27 EST 2016 kill -USR1 18137 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18137 killed at Fri Jan 8 03:58:28 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:58:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:58:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:58:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3404: Waiting for Server - FAILED kill -0 18206 >/dev/null 2>/dev/null selfserv_9591 with PID 18206 found at Fri Jan 8 03:58:34 EST 2016 selfserv_9591 with PID 18206 started at Fri Jan 8 03:58:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3405: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18206 at Fri Jan 8 03:58:34 EST 2016 kill -USR1 18206 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18206 killed at Fri Jan 8 03:58:35 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:58:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:58:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:58:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3406: Waiting for Server - FAILED kill -0 18275 >/dev/null 2>/dev/null selfserv_9591 with PID 18275 found at Fri Jan 8 03:58:41 EST 2016 selfserv_9591 with PID 18275 started at Fri Jan 8 03:58:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3407: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 18275 at Fri Jan 8 03:58:41 EST 2016 kill -USR1 18275 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18275 killed at Fri Jan 8 03:58:42 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:58:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:58:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:58:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3408: Waiting for Server - FAILED kill -0 18345 >/dev/null 2>/dev/null selfserv_9591 with PID 18345 found at Fri Jan 8 03:58:48 EST 2016 selfserv_9591 with PID 18345 started at Fri Jan 8 03:58:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3409: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18345 at Fri Jan 8 03:58:48 EST 2016 kill -USR1 18345 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18345 killed at Fri Jan 8 03:58:49 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:58:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:58:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:58:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3410: Waiting for Server - FAILED kill -0 18414 >/dev/null 2>/dev/null selfserv_9591 with PID 18414 found at Fri Jan 8 03:58:55 EST 2016 selfserv_9591 with PID 18414 started at Fri Jan 8 03:58:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3411: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18414 at Fri Jan 8 03:58:55 EST 2016 kill -USR1 18414 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18414 killed at Fri Jan 8 03:58:56 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:58:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:58:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:59:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3412: Waiting for Server - FAILED kill -0 18483 >/dev/null 2>/dev/null selfserv_9591 with PID 18483 found at Fri Jan 8 03:59:02 EST 2016 selfserv_9591 with PID 18483 started at Fri Jan 8 03:59:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3413: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18483 at Fri Jan 8 03:59:02 EST 2016 kill -USR1 18483 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18483 killed at Fri Jan 8 03:59:02 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 03:59:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:59:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:59:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3414: Waiting for Server - FAILED kill -0 18554 >/dev/null 2>/dev/null selfserv_9591 with PID 18554 found at Fri Jan 8 03:59:08 EST 2016 selfserv_9591 with PID 18554 started at Fri Jan 8 03:59:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3415: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 18554 at Fri Jan 8 03:59:09 EST 2016 kill -USR1 18554 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18554 killed at Fri Jan 8 03:59:09 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 03:59:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:59:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:59:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3416: Waiting for Server - FAILED kill -0 18624 >/dev/null 2>/dev/null selfserv_9591 with PID 18624 found at Fri Jan 8 03:59:15 EST 2016 selfserv_9591 with PID 18624 started at Fri Jan 8 03:59:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3417: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18624 at Fri Jan 8 03:59:16 EST 2016 kill -USR1 18624 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18624 killed at Fri Jan 8 03:59:16 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 03:59:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:59:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:59:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3418: Waiting for Server - FAILED kill -0 18716 >/dev/null 2>/dev/null selfserv_9591 with PID 18716 found at Fri Jan 8 03:59:22 EST 2016 selfserv_9591 with PID 18716 started at Fri Jan 8 03:59:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3419: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18716 at Fri Jan 8 03:59:23 EST 2016 kill -USR1 18716 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18716 killed at Fri Jan 8 03:59:23 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9591 starting at Fri Jan 8 03:59:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:59:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:59:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3420: Waiting for Server - FAILED kill -0 18792 >/dev/null 2>/dev/null selfserv_9591 with PID 18792 found at Fri Jan 8 03:59:29 EST 2016 selfserv_9591 with PID 18792 started at Fri Jan 8 03:59:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3421: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18792 at Fri Jan 8 03:59:30 EST 2016 kill -USR1 18792 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18792 killed at Fri Jan 8 03:59:30 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9591 starting at Fri Jan 8 03:59:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:59:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:59:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3422: Waiting for Server - FAILED kill -0 18867 >/dev/null 2>/dev/null selfserv_9591 with PID 18867 found at Fri Jan 8 03:59:36 EST 2016 selfserv_9591 with PID 18867 started at Fri Jan 8 03:59:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3423: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 18867 at Fri Jan 8 03:59:37 EST 2016 kill -USR1 18867 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18867 killed at Fri Jan 8 03:59:37 EST 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 03:59:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:59:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:59:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3424: Waiting for Server - FAILED kill -0 18942 >/dev/null 2>/dev/null selfserv_9591 with PID 18942 found at Fri Jan 8 03:59:43 EST 2016 selfserv_9591 with PID 18942 started at Fri Jan 8 03:59:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3425: SSL3 Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18942 at Fri Jan 8 03:59:44 EST 2016 kill -USR1 18942 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18942 killed at Fri Jan 8 03:59:44 EST 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9591 starting at Fri Jan 8 03:59:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:59:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:59:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3426: Waiting for Server - FAILED kill -0 19018 >/dev/null 2>/dev/null selfserv_9591 with PID 19018 found at Fri Jan 8 03:59:50 EST 2016 selfserv_9591 with PID 19018 started at Fri Jan 8 03:59:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c vssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3427: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 19018 at Fri Jan 8 03:59:51 EST 2016 kill -USR1 19018 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19018 killed at Fri Jan 8 03:59:51 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 03:59:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:59:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 03:59:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3428: Waiting for Server - FAILED kill -0 19093 >/dev/null 2>/dev/null selfserv_9591 with PID 19093 found at Fri Jan 8 03:59:57 EST 2016 selfserv_9591 with PID 19093 started at Fri Jan 8 03:59:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3429: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 19093 at Fri Jan 8 03:59:58 EST 2016 kill -USR1 19093 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19093 killed at Fri Jan 8 03:59:58 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9591 starting at Fri Jan 8 03:59:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 03:59:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:00:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3430: Waiting for Server - FAILED kill -0 19168 >/dev/null 2>/dev/null selfserv_9591 with PID 19168 found at Fri Jan 8 04:00:04 EST 2016 selfserv_9591 with PID 19168 started at Fri Jan 8 04:00:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3431: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 19168 at Fri Jan 8 04:00:05 EST 2016 kill -USR1 19168 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19168 killed at Fri Jan 8 04:00:05 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9591 starting at Fri Jan 8 04:00:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:00:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:00:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3432: Waiting for Server - FAILED kill -0 19244 >/dev/null 2>/dev/null selfserv_9591 with PID 19244 found at Fri Jan 8 04:00:11 EST 2016 selfserv_9591 with PID 19244 started at Fri Jan 8 04:00:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3433: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 19244 at Fri Jan 8 04:00:11 EST 2016 kill -USR1 19244 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19244 killed at Fri Jan 8 04:00:12 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9591 starting at Fri Jan 8 04:00:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:00:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:00:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3434: Waiting for Server - FAILED kill -0 19319 >/dev/null 2>/dev/null selfserv_9591 with PID 19319 found at Fri Jan 8 04:00:18 EST 2016 selfserv_9591 with PID 19319 started at Fri Jan 8 04:00:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3435: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 19319 at Fri Jan 8 04:00:18 EST 2016 kill -USR1 19319 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19319 killed at Fri Jan 8 04:00:19 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9591 starting at Fri Jan 8 04:00:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:00:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:00:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3436: Waiting for Server - FAILED kill -0 19394 >/dev/null 2>/dev/null selfserv_9591 with PID 19394 found at Fri Jan 8 04:00:25 EST 2016 selfserv_9591 with PID 19394 started at Fri Jan 8 04:00:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3437: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 19394 at Fri Jan 8 04:00:25 EST 2016 kill -USR1 19394 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19394 killed at Fri Jan 8 04:00:26 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, revoked status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, unknown status (non-FIPS only) ssl.sh: skipping OCSP stapling, unsigned failure response (non-FIPS only) ssl.sh: skipping OCSP stapling, good status, bad signature (non-FIPS only) ssl.sh: skipping OCSP stapling, invalid cert status data (non-FIPS only) ssl.sh: skipping Valid cert, Server doesn't staple (non-FIPS only) ssl.sh: skipping Stress OCSP stapling, server uses random status (non-FIPS only) ssl.sh: SSL Stress Test - server fips/client normal - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 04:00:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:00:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:00:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3438: Waiting for Server - FAILED kill -0 19543 >/dev/null 2>/dev/null selfserv_9591 with PID 19543 found at Fri Jan 8 04:00:32 EST 2016 selfserv_9591 with PID 19543 started at Fri Jan 8 04:00:32 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 04:00:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:00:33 EST 2016 ssl.sh: #3439: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 19543 at Fri Jan 8 04:00:33 EST 2016 kill -USR1 19543 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19543 killed at Fri Jan 8 04:00:33 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 04:00:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:00:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:00:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3440: Waiting for Server - FAILED kill -0 19622 >/dev/null 2>/dev/null selfserv_9591 with PID 19622 found at Fri Jan 8 04:00:39 EST 2016 selfserv_9591 with PID 19622 started at Fri Jan 8 04:00:39 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 04:00:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:00:40 EST 2016 ssl.sh: #3441: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 19622 at Fri Jan 8 04:00:40 EST 2016 kill -USR1 19622 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19622 killed at Fri Jan 8 04:00:40 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9591 starting at Fri Jan 8 04:00:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:00:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:00:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3442: Waiting for Server - FAILED kill -0 19701 >/dev/null 2>/dev/null selfserv_9591 with PID 19701 found at Fri Jan 8 04:00:46 EST 2016 selfserv_9591 with PID 19701 started at Fri Jan 8 04:00:46 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 04:00:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:00:47 EST 2016 ssl.sh: #3443: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 19701 at Fri Jan 8 04:00:47 EST 2016 kill -USR1 19701 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19701 killed at Fri Jan 8 04:00:47 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9591 starting at Fri Jan 8 04:00:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:00:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:00:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3444: Waiting for Server - FAILED kill -0 19781 >/dev/null 2>/dev/null selfserv_9591 with PID 19781 found at Fri Jan 8 04:00:53 EST 2016 selfserv_9591 with PID 19781 started at Fri Jan 8 04:00:53 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:00:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:00:54 EST 2016 ssl.sh: #3445: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 19781 at Fri Jan 8 04:00:54 EST 2016 kill -USR1 19781 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19781 killed at Fri Jan 8 04:00:54 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9591 starting at Fri Jan 8 04:00:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:00:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:01:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3446: Waiting for Server - FAILED kill -0 19861 >/dev/null 2>/dev/null selfserv_9591 with PID 19861 found at Fri Jan 8 04:01:00 EST 2016 selfserv_9591 with PID 19861 started at Fri Jan 8 04:01:00 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 04:01:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:01:01 EST 2016 ssl.sh: #3447: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 19861 at Fri Jan 8 04:01:01 EST 2016 kill -USR1 19861 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19861 killed at Fri Jan 8 04:01:01 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9591 starting at Fri Jan 8 04:01:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:01:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:01:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3448: Waiting for Server - FAILED kill -0 19943 >/dev/null 2>/dev/null selfserv_9591 with PID 19943 found at Fri Jan 8 04:01:07 EST 2016 selfserv_9591 with PID 19943 started at Fri Jan 8 04:01:07 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 04:01:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:01:08 EST 2016 ssl.sh: #3449: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 19943 at Fri Jan 8 04:01:08 EST 2016 kill -USR1 19943 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19943 killed at Fri Jan 8 04:01:08 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9591 starting at Fri Jan 8 04:01:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:01:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:01:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3450: Waiting for Server - FAILED kill -0 20045 >/dev/null 2>/dev/null selfserv_9591 with PID 20045 found at Fri Jan 8 04:01:14 EST 2016 selfserv_9591 with PID 20045 started at Fri Jan 8 04:01:14 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 04:01:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:01:15 EST 2016 ssl.sh: #3451: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20045 at Fri Jan 8 04:01:15 EST 2016 kill -USR1 20045 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20045 killed at Fri Jan 8 04:01:15 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9591 starting at Fri Jan 8 04:01:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:01:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:01:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3452: Waiting for Server - FAILED kill -0 20130 >/dev/null 2>/dev/null selfserv_9591 with PID 20130 found at Fri Jan 8 04:01:21 EST 2016 selfserv_9591 with PID 20130 started at Fri Jan 8 04:01:21 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:01:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:01:22 EST 2016 ssl.sh: #3453: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20130 at Fri Jan 8 04:01:22 EST 2016 kill -USR1 20130 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20130 killed at Fri Jan 8 04:01:22 EST 2016 ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:01:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:01:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:01:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3454: Waiting for Server - FAILED kill -0 20234 >/dev/null 2>/dev/null selfserv_9591 with PID 20234 found at Fri Jan 8 04:01:28 EST 2016 selfserv_9591 with PID 20234 started at Fri Jan 8 04:01:28 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 04:01:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:01:29 EST 2016 ssl.sh: #3455: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20234 at Fri Jan 8 04:01:29 EST 2016 kill -USR1 20234 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20234 killed at Fri Jan 8 04:01:29 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:01:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:01:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:01:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3456: Waiting for Server - FAILED kill -0 20314 >/dev/null 2>/dev/null selfserv_9591 with PID 20314 found at Fri Jan 8 04:01:35 EST 2016 selfserv_9591 with PID 20314 started at Fri Jan 8 04:01:35 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 04:01:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:01:36 EST 2016 ssl.sh: #3457: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20314 at Fri Jan 8 04:01:36 EST 2016 kill -USR1 20314 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20314 killed at Fri Jan 8 04:01:36 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:01:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:01:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:01:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3458: Waiting for Server - FAILED kill -0 20393 >/dev/null 2>/dev/null selfserv_9591 with PID 20393 found at Fri Jan 8 04:01:43 EST 2016 selfserv_9591 with PID 20393 started at Fri Jan 8 04:01:43 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:01:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:01:43 EST 2016 ssl.sh: #3459: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20393 at Fri Jan 8 04:01:43 EST 2016 kill -USR1 20393 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20393 killed at Fri Jan 8 04:01:44 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:01:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:01:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:01:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3460: Waiting for Server - FAILED kill -0 20472 >/dev/null 2>/dev/null selfserv_9591 with PID 20472 found at Fri Jan 8 04:01:50 EST 2016 selfserv_9591 with PID 20472 started at Fri Jan 8 04:01:50 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 04:01:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:01:50 EST 2016 ssl.sh: #3461: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 20472 at Fri Jan 8 04:01:50 EST 2016 kill -USR1 20472 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20472 killed at Fri Jan 8 04:01:51 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 04:01:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:01:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:01:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3462: Waiting for Server - FAILED kill -0 20552 >/dev/null 2>/dev/null selfserv_9591 with PID 20552 found at Fri Jan 8 04:01:57 EST 2016 selfserv_9591 with PID 20552 started at Fri Jan 8 04:01:57 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 04:01:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:01:57 EST 2016 ssl.sh: #3463: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 20552 at Fri Jan 8 04:01:57 EST 2016 kill -USR1 20552 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20552 killed at Fri Jan 8 04:01:58 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:01:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:01:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:02:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3464: Waiting for Server - FAILED kill -0 20631 >/dev/null 2>/dev/null selfserv_9591 with PID 20631 found at Fri Jan 8 04:02:04 EST 2016 selfserv_9591 with PID 20631 started at Fri Jan 8 04:02:04 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 04:02:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:02:04 EST 2016 ssl.sh: #3465: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20631 at Fri Jan 8 04:02:04 EST 2016 kill -USR1 20631 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20631 killed at Fri Jan 8 04:02:05 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 04:02:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:02:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:02:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3466: Waiting for Server - FAILED kill -0 20710 >/dev/null 2>/dev/null selfserv_9591 with PID 20710 found at Fri Jan 8 04:02:11 EST 2016 selfserv_9591 with PID 20710 started at Fri Jan 8 04:02:11 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 04:02:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:02:11 EST 2016 ssl.sh: #3467: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20710 at Fri Jan 8 04:02:11 EST 2016 kill -USR1 20710 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20710 killed at Fri Jan 8 04:02:12 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9591 starting at Fri Jan 8 04:02:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:02:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:02:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3468: Waiting for Server - FAILED kill -0 20796 >/dev/null 2>/dev/null selfserv_9591 with PID 20796 found at Fri Jan 8 04:02:18 EST 2016 selfserv_9591 with PID 20796 started at Fri Jan 8 04:02:18 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:02:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:02:18 EST 2016 ssl.sh: #3469: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20796 at Fri Jan 8 04:02:18 EST 2016 kill -USR1 20796 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20796 killed at Fri Jan 8 04:02:19 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9591 starting at Fri Jan 8 04:02:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:02:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:02:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3470: Waiting for Server - FAILED kill -0 20882 >/dev/null 2>/dev/null selfserv_9591 with PID 20882 found at Fri Jan 8 04:02:25 EST 2016 selfserv_9591 with PID 20882 started at Fri Jan 8 04:02:25 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Fri Jan 8 04:02:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:02:25 EST 2016 ssl.sh: #3471: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20882 at Fri Jan 8 04:02:25 EST 2016 kill -USR1 20882 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20882 killed at Fri Jan 8 04:02:26 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:02:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:02:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:02:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3472: Waiting for Server - FAILED kill -0 20982 >/dev/null 2>/dev/null selfserv_9591 with PID 20982 found at Fri Jan 8 04:02:32 EST 2016 selfserv_9591 with PID 20982 started at Fri Jan 8 04:02:32 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:02:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:02:32 EST 2016 ssl.sh: #3473: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 20982 at Fri Jan 8 04:02:32 EST 2016 kill -USR1 20982 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20982 killed at Fri Jan 8 04:02:33 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:02:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:02:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:02:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3474: Waiting for Server - FAILED kill -0 21062 >/dev/null 2>/dev/null selfserv_9591 with PID 21062 found at Fri Jan 8 04:02:39 EST 2016 selfserv_9591 with PID 21062 started at Fri Jan 8 04:02:39 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:02:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:02:39 EST 2016 ssl.sh: #3475: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 21062 at Fri Jan 8 04:02:39 EST 2016 kill -USR1 21062 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21062 killed at Fri Jan 8 04:02:40 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:02:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:02:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:02:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3476: Waiting for Server - FAILED kill -0 21141 >/dev/null 2>/dev/null selfserv_9591 with PID 21141 found at Fri Jan 8 04:02:46 EST 2016 selfserv_9591 with PID 21141 started at Fri Jan 8 04:02:46 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:02:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:02:46 EST 2016 ssl.sh: #3477: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 21141 at Fri Jan 8 04:02:46 EST 2016 kill -USR1 21141 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21141 killed at Fri Jan 8 04:02:47 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:02:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:02:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:02:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3478: Waiting for Server - FAILED kill -0 21220 >/dev/null 2>/dev/null selfserv_9591 with PID 21220 found at Fri Jan 8 04:02:53 EST 2016 selfserv_9591 with PID 21220 started at Fri Jan 8 04:02:53 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:02:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:02:53 EST 2016 ssl.sh: #3479: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 21220 at Fri Jan 8 04:02:54 EST 2016 kill -USR1 21220 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21220 killed at Fri Jan 8 04:02:54 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:02:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:02:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:02:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3480: Waiting for Server - FAILED kill -0 21300 >/dev/null 2>/dev/null selfserv_9591 with PID 21300 found at Fri Jan 8 04:03:00 EST 2016 selfserv_9591 with PID 21300 started at Fri Jan 8 04:03:00 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:03:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:03:00 EST 2016 ssl.sh: #3481: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 21300 at Fri Jan 8 04:03:01 EST 2016 kill -USR1 21300 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21300 killed at Fri Jan 8 04:03:01 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9591 starting at Fri Jan 8 04:03:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:03:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:03:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3482: Waiting for Server - FAILED kill -0 21379 >/dev/null 2>/dev/null selfserv_9591 with PID 21379 found at Fri Jan 8 04:03:07 EST 2016 selfserv_9591 with PID 21379 started at Fri Jan 8 04:03:07 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 04:03:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:03:08 EST 2016 ssl.sh: #3483: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 21379 at Fri Jan 8 04:03:08 EST 2016 kill -USR1 21379 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21379 killed at Fri Jan 8 04:03:08 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9591 starting at Fri Jan 8 04:03:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:03:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:03:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3484: Waiting for Server - FAILED kill -0 21458 >/dev/null 2>/dev/null selfserv_9591 with PID 21458 found at Fri Jan 8 04:03:14 EST 2016 selfserv_9591 with PID 21458 started at Fri Jan 8 04:03:14 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 04:03:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:03:15 EST 2016 ssl.sh: #3485: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 21458 at Fri Jan 8 04:03:15 EST 2016 kill -USR1 21458 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21458 killed at Fri Jan 8 04:03:15 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9591 starting at Fri Jan 8 04:03:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:03:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:03:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3486: Waiting for Server - FAILED kill -0 21538 >/dev/null 2>/dev/null selfserv_9591 with PID 21538 found at Fri Jan 8 04:03:21 EST 2016 selfserv_9591 with PID 21538 started at Fri Jan 8 04:03:21 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 04:03:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:03:22 EST 2016 ssl.sh: #3487: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 21538 at Fri Jan 8 04:03:22 EST 2016 kill -USR1 21538 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21538 killed at Fri Jan 8 04:03:22 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 04:03:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:03:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:03:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3488: Waiting for Server - FAILED kill -0 21617 >/dev/null 2>/dev/null selfserv_9591 with PID 21617 found at Fri Jan 8 04:03:28 EST 2016 selfserv_9591 with PID 21617 started at Fri Jan 8 04:03:28 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:03:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:03:29 EST 2016 ssl.sh: #3489: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 21617 at Fri Jan 8 04:03:29 EST 2016 kill -USR1 21617 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21617 killed at Fri Jan 8 04:03:29 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 04:03:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:03:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:03:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3490: Waiting for Server - FAILED kill -0 21697 >/dev/null 2>/dev/null selfserv_9591 with PID 21697 found at Fri Jan 8 04:03:35 EST 2016 selfserv_9591 with PID 21697 started at Fri Jan 8 04:03:35 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:03:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:03:36 EST 2016 ssl.sh: #3491: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 21697 at Fri Jan 8 04:03:36 EST 2016 kill -USR1 21697 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21697 killed at Fri Jan 8 04:03:36 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:03:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:03:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:03:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3492: Waiting for Server - FAILED kill -0 21797 >/dev/null 2>/dev/null selfserv_9591 with PID 21797 found at Fri Jan 8 04:03:42 EST 2016 selfserv_9591 with PID 21797 started at Fri Jan 8 04:03:42 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:03:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:03:43 EST 2016 ssl.sh: #3493: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 21797 at Fri Jan 8 04:03:43 EST 2016 kill -USR1 21797 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21797 killed at Fri Jan 8 04:03:43 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:03:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:03:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:03:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3494: Waiting for Server - FAILED kill -0 21876 >/dev/null 2>/dev/null selfserv_9591 with PID 21876 found at Fri Jan 8 04:03:49 EST 2016 selfserv_9591 with PID 21876 started at Fri Jan 8 04:03:49 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:03:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:03:50 EST 2016 ssl.sh: #3495: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 21876 at Fri Jan 8 04:03:50 EST 2016 kill -USR1 21876 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21876 killed at Fri Jan 8 04:03:50 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:03:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:03:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:03:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3496: Waiting for Server - FAILED kill -0 21956 >/dev/null 2>/dev/null selfserv_9591 with PID 21956 found at Fri Jan 8 04:03:56 EST 2016 selfserv_9591 with PID 21956 started at Fri Jan 8 04:03:56 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:03:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:03:57 EST 2016 ssl.sh: #3497: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 21956 at Fri Jan 8 04:03:57 EST 2016 kill -USR1 21956 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21956 killed at Fri Jan 8 04:03:57 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:03:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:03:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:04:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3498: Waiting for Server - FAILED kill -0 22035 >/dev/null 2>/dev/null selfserv_9591 with PID 22035 found at Fri Jan 8 04:04:03 EST 2016 selfserv_9591 with PID 22035 started at Fri Jan 8 04:04:03 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 04:04:03 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:04:04 EST 2016 ssl.sh: #3499: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 22035 at Fri Jan 8 04:04:04 EST 2016 kill -USR1 22035 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22035 killed at Fri Jan 8 04:04:04 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9591 starting at Fri Jan 8 04:04:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:04:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:04:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3500: Waiting for Server - FAILED kill -0 22114 >/dev/null 2>/dev/null selfserv_9591 with PID 22114 found at Fri Jan 8 04:04:10 EST 2016 selfserv_9591 with PID 22114 started at Fri Jan 8 04:04:10 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:04:10 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:04:11 EST 2016 ssl.sh: #3501: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 22114 at Fri Jan 8 04:04:11 EST 2016 kill -USR1 22114 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22114 killed at Fri Jan 8 04:04:11 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:04:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:04:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:04:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3502: Waiting for Server - FAILED kill -0 22194 >/dev/null 2>/dev/null selfserv_9591 with PID 22194 found at Fri Jan 8 04:04:17 EST 2016 selfserv_9591 with PID 22194 started at Fri Jan 8 04:04:17 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:04:17 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:04:18 EST 2016 ssl.sh: #3503: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 22194 at Fri Jan 8 04:04:18 EST 2016 kill -USR1 22194 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22194 killed at Fri Jan 8 04:04:18 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:04:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:04:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:04:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3504: Waiting for Server - FAILED kill -0 22294 >/dev/null 2>/dev/null selfserv_9591 with PID 22294 found at Fri Jan 8 04:04:25 EST 2016 selfserv_9591 with PID 22294 started at Fri Jan 8 04:04:25 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:04:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:04:25 EST 2016 ssl.sh: #3505: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 22294 at Fri Jan 8 04:04:25 EST 2016 kill -USR1 22294 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22294 killed at Fri Jan 8 04:04:26 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9591 starting at Fri Jan 8 04:04:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:04:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:04:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3506: Waiting for Server - FAILED kill -0 22373 >/dev/null 2>/dev/null selfserv_9591 with PID 22373 found at Fri Jan 8 04:04:32 EST 2016 selfserv_9591 with PID 22373 started at Fri Jan 8 04:04:32 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 04:04:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:04:32 EST 2016 ssl.sh: #3507: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 22373 at Fri Jan 8 04:04:32 EST 2016 kill -USR1 22373 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22373 killed at Fri Jan 8 04:04:33 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:04:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:04:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:04:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3508: Waiting for Server - FAILED kill -0 22453 >/dev/null 2>/dev/null selfserv_9591 with PID 22453 found at Fri Jan 8 04:04:39 EST 2016 selfserv_9591 with PID 22453 started at Fri Jan 8 04:04:39 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:04:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:04:39 EST 2016 ssl.sh: #3509: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 22453 at Fri Jan 8 04:04:39 EST 2016 kill -USR1 22453 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22453 killed at Fri Jan 8 04:04:40 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:04:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:04:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:04:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3510: Waiting for Server - FAILED kill -0 22532 >/dev/null 2>/dev/null selfserv_9591 with PID 22532 found at Fri Jan 8 04:04:46 EST 2016 selfserv_9591 with PID 22532 started at Fri Jan 8 04:04:46 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:04:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:04:46 EST 2016 ssl.sh: #3511: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 22532 at Fri Jan 8 04:04:46 EST 2016 kill -USR1 22532 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22532 killed at Fri Jan 8 04:04:47 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:04:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:04:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:04:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3512: Waiting for Server - FAILED kill -0 22625 >/dev/null 2>/dev/null selfserv_9591 with PID 22625 found at Fri Jan 8 04:04:53 EST 2016 selfserv_9591 with PID 22625 started at Fri Jan 8 04:04:53 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:04:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:04:53 EST 2016 ssl.sh: #3513: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 22625 at Fri Jan 8 04:04:53 EST 2016 kill -USR1 22625 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22625 killed at Fri Jan 8 04:04:54 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9591 starting at Fri Jan 8 04:04:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:04:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:04:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3514: Waiting for Server - FAILED kill -0 22719 >/dev/null 2>/dev/null selfserv_9591 with PID 22719 found at Fri Jan 8 04:05:00 EST 2016 selfserv_9591 with PID 22719 started at Fri Jan 8 04:05:00 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:05:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:05:00 EST 2016 ssl.sh: #3515: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 22719 at Fri Jan 8 04:05:00 EST 2016 kill -USR1 22719 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22719 killed at Fri Jan 8 04:05:01 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:05:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:05:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:05:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3516: Waiting for Server - FAILED kill -0 22798 >/dev/null 2>/dev/null selfserv_9591 with PID 22798 found at Fri Jan 8 04:05:07 EST 2016 selfserv_9591 with PID 22798 started at Fri Jan 8 04:05:07 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:05:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:05:07 EST 2016 ssl.sh: #3517: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 22798 at Fri Jan 8 04:05:07 EST 2016 kill -USR1 22798 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22798 killed at Fri Jan 8 04:05:08 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:05:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:05:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:05:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3518: Waiting for Server - FAILED kill -0 22877 >/dev/null 2>/dev/null selfserv_9591 with PID 22877 found at Fri Jan 8 04:05:14 EST 2016 selfserv_9591 with PID 22877 started at Fri Jan 8 04:05:14 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:05:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:05:14 EST 2016 ssl.sh: #3519: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 22877 at Fri Jan 8 04:05:14 EST 2016 kill -USR1 22877 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22877 killed at Fri Jan 8 04:05:15 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:05:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:05:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:05:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3520: Waiting for Server - FAILED kill -0 22978 >/dev/null 2>/dev/null selfserv_9591 with PID 22978 found at Fri Jan 8 04:05:21 EST 2016 selfserv_9591 with PID 22978 started at Fri Jan 8 04:05:21 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 04:05:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:05:21 EST 2016 ssl.sh: #3521: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 22978 at Fri Jan 8 04:05:22 EST 2016 kill -USR1 22978 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22978 killed at Fri Jan 8 04:05:22 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:05:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:05:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:05:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3522: Waiting for Server - FAILED kill -0 23057 >/dev/null 2>/dev/null selfserv_9591 with PID 23057 found at Fri Jan 8 04:05:28 EST 2016 selfserv_9591 with PID 23057 started at Fri Jan 8 04:05:28 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 04:05:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:05:29 EST 2016 ssl.sh: #3523: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 23057 at Fri Jan 8 04:05:29 EST 2016 kill -USR1 23057 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23057 killed at Fri Jan 8 04:05:29 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:05:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:05:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:05:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3524: Waiting for Server - FAILED kill -0 23150 >/dev/null 2>/dev/null selfserv_9591 with PID 23150 found at Fri Jan 8 04:05:35 EST 2016 selfserv_9591 with PID 23150 started at Fri Jan 8 04:05:35 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 04:05:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:05:36 EST 2016 ssl.sh: #3525: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 23150 at Fri Jan 8 04:05:36 EST 2016 kill -USR1 23150 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23150 killed at Fri Jan 8 04:05:36 EST 2016 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal - with ECC =============================== selfserv_9591 starting at Fri Jan 8 04:05:36 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:05:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:05:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3526: Waiting for Server - FAILED kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:42 EST 2016 selfserv_9591 with PID 23217 started at Fri Jan 8 04:05:42 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping A SSL2_RC4_128_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping F SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3527: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3528: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3529: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3530: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3531: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3532: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3533: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3534: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3535: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3536: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3537: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3538: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3539: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3540: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3541: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3542: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3543: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3544: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3545: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3546: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3547: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3548: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3549: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3550: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3551: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3552: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3553: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3554: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3555: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3556: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3557: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:05:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3558: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3559: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3560: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3561: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3562: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3563: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3564: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3565: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS12_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS12_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3566: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3567: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3568: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3569: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3570: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3571: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3572: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3573: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3574: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3575: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3576: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3577: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3578: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3579: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3580: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3581: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3582: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3583: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3584: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3585: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3586: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3587: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3588: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3589: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3590: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3591: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3592: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3593: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23217 >/dev/null 2>/dev/null selfserv_9591 with PID 23217 found at Fri Jan 8 04:06:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3594: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 23217 at Fri Jan 8 04:06:19 EST 2016 kill -USR1 23217 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23217 killed at Fri Jan 8 04:06:19 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:06:19 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:06:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:06:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3595: Waiting for Server - FAILED kill -0 25254 >/dev/null 2>/dev/null selfserv_9591 with PID 25254 found at Fri Jan 8 04:06:25 EST 2016 selfserv_9591 with PID 25254 started at Fri Jan 8 04:06:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3596: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 25254 >/dev/null 2>/dev/null selfserv_9591 with PID 25254 found at Fri Jan 8 04:06:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3597: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 25254 >/dev/null 2>/dev/null selfserv_9591 with PID 25254 found at Fri Jan 8 04:06:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3598: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 25254 >/dev/null 2>/dev/null selfserv_9591 with PID 25254 found at Fri Jan 8 04:06:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3599: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 25254 >/dev/null 2>/dev/null selfserv_9591 with PID 25254 found at Fri Jan 8 04:06:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3600: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 25254 at Fri Jan 8 04:06:28 EST 2016 kill -USR1 25254 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25254 killed at Fri Jan 8 04:06:28 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:06:28 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:06:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:06:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3601: Waiting for Server - FAILED kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:34 EST 2016 selfserv_9591 with PID 25419 started at Fri Jan 8 04:06:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3602: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3603: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3604: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3605: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3606: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3607: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3608: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3609: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3610: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3611: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3612: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3613: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3614: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3615: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 25419 >/dev/null 2>/dev/null selfserv_9591 with PID 25419 found at Fri Jan 8 04:06:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3616: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 25419 at Fri Jan 8 04:06:42 EST 2016 kill -USR1 25419 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25419 killed at Fri Jan 8 04:06:43 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:06:43 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:06:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:06:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3617: Waiting for Server - FAILED kill -0 25833 >/dev/null 2>/dev/null selfserv_9591 with PID 25833 found at Fri Jan 8 04:06:49 EST 2016 selfserv_9591 with PID 25833 started at Fri Jan 8 04:06:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3618: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 25833 >/dev/null 2>/dev/null selfserv_9591 with PID 25833 found at Fri Jan 8 04:06:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3619: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 25833 >/dev/null 2>/dev/null selfserv_9591 with PID 25833 found at Fri Jan 8 04:06:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3620: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 25833 >/dev/null 2>/dev/null selfserv_9591 with PID 25833 found at Fri Jan 8 04:06:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3621: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 25833 >/dev/null 2>/dev/null selfserv_9591 with PID 25833 found at Fri Jan 8 04:06:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3622: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 25833 at Fri Jan 8 04:06:51 EST 2016 kill -USR1 25833 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25833 killed at Fri Jan 8 04:06:52 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:06:52 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:06:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:06:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3623: Waiting for Server - FAILED kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:06:58 EST 2016 selfserv_9591 with PID 25998 started at Fri Jan 8 04:06:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3624: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:06:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3625: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:06:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3626: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:06:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3627: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:07:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3628: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:07:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3629: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:07:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3630: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:07:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3631: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:07:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3632: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:07:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3633: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:07:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3634: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:07:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3635: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:07:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3636: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:07:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3637: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 25998 >/dev/null 2>/dev/null selfserv_9591 with PID 25998 found at Fri Jan 8 04:07:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3638: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 25998 at Fri Jan 8 04:07:05 EST 2016 kill -USR1 25998 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25998 killed at Fri Jan 8 04:07:06 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:07:06 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:07:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:07:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3639: Waiting for Server - FAILED kill -0 26412 >/dev/null 2>/dev/null selfserv_9591 with PID 26412 found at Fri Jan 8 04:07:12 EST 2016 selfserv_9591 with PID 26412 started at Fri Jan 8 04:07:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3640: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 26412 >/dev/null 2>/dev/null selfserv_9591 with PID 26412 found at Fri Jan 8 04:07:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3641: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26412 >/dev/null 2>/dev/null selfserv_9591 with PID 26412 found at Fri Jan 8 04:07:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3642: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26412 >/dev/null 2>/dev/null selfserv_9591 with PID 26412 found at Fri Jan 8 04:07:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3643: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26412 >/dev/null 2>/dev/null selfserv_9591 with PID 26412 found at Fri Jan 8 04:07:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3644: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 26412 at Fri Jan 8 04:07:14 EST 2016 kill -USR1 26412 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26412 killed at Fri Jan 8 04:07:15 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:07:15 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:07:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:07:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3645: Waiting for Server - FAILED kill -0 26578 >/dev/null 2>/dev/null selfserv_9591 with PID 26578 found at Fri Jan 8 04:07:21 EST 2016 selfserv_9591 with PID 26578 started at Fri Jan 8 04:07:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3646: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 26578 >/dev/null 2>/dev/null selfserv_9591 with PID 26578 found at Fri Jan 8 04:07:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3647: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26578 >/dev/null 2>/dev/null selfserv_9591 with PID 26578 found at Fri Jan 8 04:07:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3648: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26578 >/dev/null 2>/dev/null selfserv_9591 with PID 26578 found at Fri Jan 8 04:07:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3649: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26578 >/dev/null 2>/dev/null selfserv_9591 with PID 26578 found at Fri Jan 8 04:07:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3650: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 26578 >/dev/null 2>/dev/null selfserv_9591 with PID 26578 found at Fri Jan 8 04:07:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3651: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 26578 >/dev/null 2>/dev/null selfserv_9591 with PID 26578 found at Fri Jan 8 04:07:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3652: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 26578 >/dev/null 2>/dev/null selfserv_9591 with PID 26578 found at Fri Jan 8 04:07:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3653: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 26578 >/dev/null 2>/dev/null selfserv_9591 with PID 26578 found at Fri Jan 8 04:07:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3654: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 26578 >/dev/null 2>/dev/null selfserv_9591 with PID 26578 found at Fri Jan 8 04:07:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3655: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 26578 >/dev/null 2>/dev/null selfserv_9591 with PID 26578 found at Fri Jan 8 04:07:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3656: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 26578 >/dev/null 2>/dev/null selfserv_9591 with PID 26578 found at Fri Jan 8 04:07:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3657: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 26578 >/dev/null 2>/dev/null selfserv_9591 with PID 26578 found at Fri Jan 8 04:07:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3658: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26578 at Fri Jan 8 04:07:28 EST 2016 kill -USR1 26578 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26578 killed at Fri Jan 8 04:07:28 EST 2016 ssl.sh: SSL Client Authentication Extended Test - server fips/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:07:28 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:07:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:07:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3659: Waiting for Server - FAILED kill -0 26985 >/dev/null 2>/dev/null selfserv_9591 with PID 26985 found at Fri Jan 8 04:07:34 EST 2016 selfserv_9591 with PID 26985 started at Fri Jan 8 04:07:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3660: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26985 at Fri Jan 8 04:07:35 EST 2016 kill -USR1 26985 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26985 killed at Fri Jan 8 04:07:35 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:07:35 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:07:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:07:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3661: Waiting for Server - FAILED kill -0 27054 >/dev/null 2>/dev/null selfserv_9591 with PID 27054 found at Fri Jan 8 04:07:41 EST 2016 selfserv_9591 with PID 27054 started at Fri Jan 8 04:07:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3662: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27054 at Fri Jan 8 04:07:42 EST 2016 kill -USR1 27054 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27054 killed at Fri Jan 8 04:07:42 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:07:42 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:07:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:07:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3663: Waiting for Server - FAILED kill -0 27125 >/dev/null 2>/dev/null selfserv_9591 with PID 27125 found at Fri Jan 8 04:07:48 EST 2016 selfserv_9591 with PID 27125 started at Fri Jan 8 04:07:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3664: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27125 at Fri Jan 8 04:07:49 EST 2016 kill -USR1 27125 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27125 killed at Fri Jan 8 04:07:49 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:07:49 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:07:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:07:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3665: Waiting for Server - FAILED kill -0 27194 >/dev/null 2>/dev/null selfserv_9591 with PID 27194 found at Fri Jan 8 04:07:55 EST 2016 selfserv_9591 with PID 27194 started at Fri Jan 8 04:07:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3666: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27194 at Fri Jan 8 04:07:56 EST 2016 kill -USR1 27194 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27194 killed at Fri Jan 8 04:07:56 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:07:56 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:07:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:08:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3667: Waiting for Server - FAILED kill -0 27264 >/dev/null 2>/dev/null selfserv_9591 with PID 27264 found at Fri Jan 8 04:08:02 EST 2016 selfserv_9591 with PID 27264 started at Fri Jan 8 04:08:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3668: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27264 at Fri Jan 8 04:08:02 EST 2016 kill -USR1 27264 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27264 killed at Fri Jan 8 04:08:03 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:08:03 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:08:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:08:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3669: Waiting for Server - FAILED kill -0 27333 >/dev/null 2>/dev/null selfserv_9591 with PID 27333 found at Fri Jan 8 04:08:09 EST 2016 selfserv_9591 with PID 27333 started at Fri Jan 8 04:08:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3670: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27333 at Fri Jan 8 04:08:09 EST 2016 kill -USR1 27333 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27333 killed at Fri Jan 8 04:08:10 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:08:10 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:08:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:08:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3671: Waiting for Server - FAILED kill -0 27402 >/dev/null 2>/dev/null selfserv_9591 with PID 27402 found at Fri Jan 8 04:08:16 EST 2016 selfserv_9591 with PID 27402 started at Fri Jan 8 04:08:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3672: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27402 at Fri Jan 8 04:08:16 EST 2016 kill -USR1 27402 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27402 killed at Fri Jan 8 04:08:17 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:08:17 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:08:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:08:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3673: Waiting for Server - FAILED kill -0 27472 >/dev/null 2>/dev/null selfserv_9591 with PID 27472 found at Fri Jan 8 04:08:23 EST 2016 selfserv_9591 with PID 27472 started at Fri Jan 8 04:08:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3674: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27472 at Fri Jan 8 04:08:23 EST 2016 kill -USR1 27472 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27472 killed at Fri Jan 8 04:08:24 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:08:24 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:08:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:08:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3675: Waiting for Server - FAILED kill -0 27545 >/dev/null 2>/dev/null selfserv_9591 with PID 27545 found at Fri Jan 8 04:08:30 EST 2016 selfserv_9591 with PID 27545 started at Fri Jan 8 04:08:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3676: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27545 at Fri Jan 8 04:08:30 EST 2016 kill -USR1 27545 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27545 killed at Fri Jan 8 04:08:31 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:08:31 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:08:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:08:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3677: Waiting for Server - FAILED kill -0 27614 >/dev/null 2>/dev/null selfserv_9591 with PID 27614 found at Fri Jan 8 04:08:37 EST 2016 selfserv_9591 with PID 27614 started at Fri Jan 8 04:08:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3678: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27614 at Fri Jan 8 04:08:37 EST 2016 kill -USR1 27614 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27614 killed at Fri Jan 8 04:08:37 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:08:38 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:08:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:08:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3679: Waiting for Server - FAILED kill -0 27684 >/dev/null 2>/dev/null selfserv_9591 with PID 27684 found at Fri Jan 8 04:08:43 EST 2016 selfserv_9591 with PID 27684 started at Fri Jan 8 04:08:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3680: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27684 at Fri Jan 8 04:08:44 EST 2016 kill -USR1 27684 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27684 killed at Fri Jan 8 04:08:44 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:08:44 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:08:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:08:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3681: Waiting for Server - FAILED kill -0 27753 >/dev/null 2>/dev/null selfserv_9591 with PID 27753 found at Fri Jan 8 04:08:50 EST 2016 selfserv_9591 with PID 27753 started at Fri Jan 8 04:08:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3682: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27753 at Fri Jan 8 04:08:51 EST 2016 kill -USR1 27753 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27753 killed at Fri Jan 8 04:08:51 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:08:51 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:08:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:08:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3683: Waiting for Server - FAILED kill -0 27822 >/dev/null 2>/dev/null selfserv_9591 with PID 27822 found at Fri Jan 8 04:08:57 EST 2016 selfserv_9591 with PID 27822 started at Fri Jan 8 04:08:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3684: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27822 at Fri Jan 8 04:08:58 EST 2016 kill -USR1 27822 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27822 killed at Fri Jan 8 04:08:58 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:08:58 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:08:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:09:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3685: Waiting for Server - FAILED kill -0 27892 >/dev/null 2>/dev/null selfserv_9591 with PID 27892 found at Fri Jan 8 04:09:04 EST 2016 selfserv_9591 with PID 27892 started at Fri Jan 8 04:09:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3686: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27892 at Fri Jan 8 04:09:05 EST 2016 kill -USR1 27892 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27892 killed at Fri Jan 8 04:09:05 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:09:05 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:09:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:09:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3687: Waiting for Server - FAILED kill -0 27961 >/dev/null 2>/dev/null selfserv_9591 with PID 27961 found at Fri Jan 8 04:09:11 EST 2016 selfserv_9591 with PID 27961 started at Fri Jan 8 04:09:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3688: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27961 at Fri Jan 8 04:09:12 EST 2016 kill -USR1 27961 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27961 killed at Fri Jan 8 04:09:12 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:09:12 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:09:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:09:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3689: Waiting for Server - FAILED kill -0 28030 >/dev/null 2>/dev/null selfserv_9591 with PID 28030 found at Fri Jan 8 04:09:18 EST 2016 selfserv_9591 with PID 28030 started at Fri Jan 8 04:09:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3690: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 28030 at Fri Jan 8 04:09:19 EST 2016 kill -USR1 28030 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28030 killed at Fri Jan 8 04:09:19 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:09:19 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:09:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:09:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3691: Waiting for Server - FAILED kill -0 28100 >/dev/null 2>/dev/null selfserv_9591 with PID 28100 found at Fri Jan 8 04:09:25 EST 2016 selfserv_9591 with PID 28100 started at Fri Jan 8 04:09:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3692: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 28100 at Fri Jan 8 04:09:25 EST 2016 kill -USR1 28100 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28100 killed at Fri Jan 8 04:09:26 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:09:26 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:09:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:09:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3693: Waiting for Server - FAILED kill -0 28169 >/dev/null 2>/dev/null selfserv_9591 with PID 28169 found at Fri Jan 8 04:09:32 EST 2016 selfserv_9591 with PID 28169 started at Fri Jan 8 04:09:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3694: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28169 at Fri Jan 8 04:09:32 EST 2016 kill -USR1 28169 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28169 killed at Fri Jan 8 04:09:33 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:09:33 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:09:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:09:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3695: Waiting for Server - FAILED kill -0 28238 >/dev/null 2>/dev/null selfserv_9591 with PID 28238 found at Fri Jan 8 04:09:39 EST 2016 selfserv_9591 with PID 28238 started at Fri Jan 8 04:09:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3696: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28238 at Fri Jan 8 04:09:39 EST 2016 kill -USR1 28238 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28238 killed at Fri Jan 8 04:09:40 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:09:40 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:09:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:09:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3697: Waiting for Server - FAILED kill -0 28309 >/dev/null 2>/dev/null selfserv_9591 with PID 28309 found at Fri Jan 8 04:09:46 EST 2016 selfserv_9591 with PID 28309 started at Fri Jan 8 04:09:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3698: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28309 at Fri Jan 8 04:09:46 EST 2016 kill -USR1 28309 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28309 killed at Fri Jan 8 04:09:47 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:09:47 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:09:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:09:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3699: Waiting for Server - FAILED kill -0 28378 >/dev/null 2>/dev/null selfserv_9591 with PID 28378 found at Fri Jan 8 04:09:53 EST 2016 selfserv_9591 with PID 28378 started at Fri Jan 8 04:09:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3700: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28378 at Fri Jan 8 04:09:53 EST 2016 kill -USR1 28378 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28378 killed at Fri Jan 8 04:09:54 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:09:54 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:09:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:09:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3701: Waiting for Server - FAILED kill -0 28447 >/dev/null 2>/dev/null selfserv_9591 with PID 28447 found at Fri Jan 8 04:10:00 EST 2016 selfserv_9591 with PID 28447 started at Fri Jan 8 04:10:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3702: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 28447 at Fri Jan 8 04:10:00 EST 2016 kill -USR1 28447 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28447 killed at Fri Jan 8 04:10:00 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:10:01 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:10:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:10:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3703: Waiting for Server - FAILED kill -0 28517 >/dev/null 2>/dev/null selfserv_9591 with PID 28517 found at Fri Jan 8 04:10:06 EST 2016 selfserv_9591 with PID 28517 started at Fri Jan 8 04:10:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3704: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 28517 at Fri Jan 8 04:10:07 EST 2016 kill -USR1 28517 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28517 killed at Fri Jan 8 04:10:07 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:10:07 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:10:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:10:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3705: Waiting for Server - FAILED kill -0 28586 >/dev/null 2>/dev/null selfserv_9591 with PID 28586 found at Fri Jan 8 04:10:13 EST 2016 selfserv_9591 with PID 28586 started at Fri Jan 8 04:10:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3706: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28586 at Fri Jan 8 04:10:14 EST 2016 kill -USR1 28586 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28586 killed at Fri Jan 8 04:10:14 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:10:14 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:10:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:10:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3707: Waiting for Server - FAILED kill -0 28655 >/dev/null 2>/dev/null selfserv_9591 with PID 28655 found at Fri Jan 8 04:10:20 EST 2016 selfserv_9591 with PID 28655 started at Fri Jan 8 04:10:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3708: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28655 at Fri Jan 8 04:10:21 EST 2016 kill -USR1 28655 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28655 killed at Fri Jan 8 04:10:21 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:10:21 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:10:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:10:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3709: Waiting for Server - FAILED kill -0 28725 >/dev/null 2>/dev/null selfserv_9591 with PID 28725 found at Fri Jan 8 04:10:27 EST 2016 selfserv_9591 with PID 28725 started at Fri Jan 8 04:10:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3710: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28725 at Fri Jan 8 04:10:28 EST 2016 kill -USR1 28725 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28725 killed at Fri Jan 8 04:10:28 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:10:28 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:10:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:10:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3711: Waiting for Server - FAILED kill -0 28794 >/dev/null 2>/dev/null selfserv_9591 with PID 28794 found at Fri Jan 8 04:10:34 EST 2016 selfserv_9591 with PID 28794 started at Fri Jan 8 04:10:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3712: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28794 at Fri Jan 8 04:10:35 EST 2016 kill -USR1 28794 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28794 killed at Fri Jan 8 04:10:35 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:10:35 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:10:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:10:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3713: Waiting for Server - FAILED kill -0 28864 >/dev/null 2>/dev/null selfserv_9591 with PID 28864 found at Fri Jan 8 04:10:41 EST 2016 selfserv_9591 with PID 28864 started at Fri Jan 8 04:10:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3714: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 28864 at Fri Jan 8 04:10:42 EST 2016 kill -USR1 28864 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28864 killed at Fri Jan 8 04:10:42 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:10:42 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:10:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:10:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3715: Waiting for Server - FAILED kill -0 28934 >/dev/null 2>/dev/null selfserv_9591 with PID 28934 found at Fri Jan 8 04:10:48 EST 2016 selfserv_9591 with PID 28934 started at Fri Jan 8 04:10:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3716: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 28934 at Fri Jan 8 04:10:48 EST 2016 kill -USR1 28934 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28934 killed at Fri Jan 8 04:10:49 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:10:49 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:10:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:10:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3717: Waiting for Server - FAILED kill -0 29003 >/dev/null 2>/dev/null selfserv_9591 with PID 29003 found at Fri Jan 8 04:10:55 EST 2016 selfserv_9591 with PID 29003 started at Fri Jan 8 04:10:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3718: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29003 at Fri Jan 8 04:10:55 EST 2016 kill -USR1 29003 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29003 killed at Fri Jan 8 04:10:56 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:10:56 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:10:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:11:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3719: Waiting for Server - FAILED kill -0 29087 >/dev/null 2>/dev/null selfserv_9591 with PID 29087 found at Fri Jan 8 04:11:02 EST 2016 selfserv_9591 with PID 29087 started at Fri Jan 8 04:11:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3720: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29087 at Fri Jan 8 04:11:02 EST 2016 kill -USR1 29087 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29087 killed at Fri Jan 8 04:11:03 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:11:03 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:11:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:11:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3721: Waiting for Server - FAILED kill -0 29157 >/dev/null 2>/dev/null selfserv_9591 with PID 29157 found at Fri Jan 8 04:11:09 EST 2016 selfserv_9591 with PID 29157 started at Fri Jan 8 04:11:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3722: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29157 at Fri Jan 8 04:11:09 EST 2016 kill -USR1 29157 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29157 killed at Fri Jan 8 04:11:10 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:11:10 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:11:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:11:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3723: Waiting for Server - FAILED kill -0 29226 >/dev/null 2>/dev/null selfserv_9591 with PID 29226 found at Fri Jan 8 04:11:16 EST 2016 selfserv_9591 with PID 29226 started at Fri Jan 8 04:11:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3724: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 29226 at Fri Jan 8 04:11:16 EST 2016 kill -USR1 29226 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29226 killed at Fri Jan 8 04:11:17 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:11:17 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:11:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:11:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3725: Waiting for Server - FAILED kill -0 29295 >/dev/null 2>/dev/null selfserv_9591 with PID 29295 found at Fri Jan 8 04:11:23 EST 2016 selfserv_9591 with PID 29295 started at Fri Jan 8 04:11:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3726: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29295 at Fri Jan 8 04:11:23 EST 2016 kill -USR1 29295 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29295 killed at Fri Jan 8 04:11:24 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:11:24 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:11:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:11:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3727: Waiting for Server - FAILED kill -0 29365 >/dev/null 2>/dev/null selfserv_9591 with PID 29365 found at Fri Jan 8 04:11:30 EST 2016 selfserv_9591 with PID 29365 started at Fri Jan 8 04:11:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3728: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29365 at Fri Jan 8 04:11:30 EST 2016 kill -USR1 29365 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29365 killed at Fri Jan 8 04:11:30 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:11:31 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:11:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:11:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3729: Waiting for Server - FAILED kill -0 29434 >/dev/null 2>/dev/null selfserv_9591 with PID 29434 found at Fri Jan 8 04:11:36 EST 2016 selfserv_9591 with PID 29434 started at Fri Jan 8 04:11:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3730: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29434 at Fri Jan 8 04:11:37 EST 2016 kill -USR1 29434 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29434 killed at Fri Jan 8 04:11:37 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:11:37 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:11:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:11:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3731: Waiting for Server - FAILED kill -0 29503 >/dev/null 2>/dev/null selfserv_9591 with PID 29503 found at Fri Jan 8 04:11:43 EST 2016 selfserv_9591 with PID 29503 started at Fri Jan 8 04:11:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3732: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 29503 at Fri Jan 8 04:11:44 EST 2016 kill -USR1 29503 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29503 killed at Fri Jan 8 04:11:44 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:11:44 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:11:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:11:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3733: Waiting for Server - FAILED kill -0 29573 >/dev/null 2>/dev/null selfserv_9591 with PID 29573 found at Fri Jan 8 04:11:50 EST 2016 selfserv_9591 with PID 29573 started at Fri Jan 8 04:11:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3734: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29573 at Fri Jan 8 04:11:51 EST 2016 kill -USR1 29573 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29573 killed at Fri Jan 8 04:11:51 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:11:51 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:11:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:11:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3735: Waiting for Server - FAILED kill -0 29642 >/dev/null 2>/dev/null selfserv_9591 with PID 29642 found at Fri Jan 8 04:11:57 EST 2016 selfserv_9591 with PID 29642 started at Fri Jan 8 04:11:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3736: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29642 at Fri Jan 8 04:11:58 EST 2016 kill -USR1 29642 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29642 killed at Fri Jan 8 04:11:58 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:11:58 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:11:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:12:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3737: Waiting for Server - FAILED kill -0 29711 >/dev/null 2>/dev/null selfserv_9591 with PID 29711 found at Fri Jan 8 04:12:04 EST 2016 selfserv_9591 with PID 29711 started at Fri Jan 8 04:12:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3738: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29711 at Fri Jan 8 04:12:05 EST 2016 kill -USR1 29711 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29711 killed at Fri Jan 8 04:12:05 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:12:05 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:12:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:12:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3739: Waiting for Server - FAILED kill -0 29781 >/dev/null 2>/dev/null selfserv_9591 with PID 29781 found at Fri Jan 8 04:12:11 EST 2016 selfserv_9591 with PID 29781 started at Fri Jan 8 04:12:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3740: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 29781 at Fri Jan 8 04:12:12 EST 2016 kill -USR1 29781 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29781 killed at Fri Jan 8 04:12:12 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:12:12 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:12:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:12:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3741: Waiting for Server - FAILED kill -0 29850 >/dev/null 2>/dev/null selfserv_9591 with PID 29850 found at Fri Jan 8 04:12:18 EST 2016 selfserv_9591 with PID 29850 started at Fri Jan 8 04:12:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3742: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29850 at Fri Jan 8 04:12:18 EST 2016 kill -USR1 29850 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29850 killed at Fri Jan 8 04:12:19 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:12:19 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:12:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:12:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3743: Waiting for Server - FAILED kill -0 29919 >/dev/null 2>/dev/null selfserv_9591 with PID 29919 found at Fri Jan 8 04:12:25 EST 2016 selfserv_9591 with PID 29919 started at Fri Jan 8 04:12:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3744: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29919 at Fri Jan 8 04:12:25 EST 2016 kill -USR1 29919 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29919 killed at Fri Jan 8 04:12:26 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:12:26 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:12:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:12:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3745: Waiting for Server - FAILED kill -0 29989 >/dev/null 2>/dev/null selfserv_9591 with PID 29989 found at Fri Jan 8 04:12:32 EST 2016 selfserv_9591 with PID 29989 started at Fri Jan 8 04:12:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3746: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29989 at Fri Jan 8 04:12:32 EST 2016 kill -USR1 29989 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29989 killed at Fri Jan 8 04:12:33 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:12:33 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:12:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:12:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3747: Waiting for Server - FAILED kill -0 30058 >/dev/null 2>/dev/null selfserv_9591 with PID 30058 found at Fri Jan 8 04:12:39 EST 2016 selfserv_9591 with PID 30058 started at Fri Jan 8 04:12:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3748: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30058 at Fri Jan 8 04:12:39 EST 2016 kill -USR1 30058 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30058 killed at Fri Jan 8 04:12:40 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:12:40 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:12:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:12:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3749: Waiting for Server - FAILED kill -0 30127 >/dev/null 2>/dev/null selfserv_9591 with PID 30127 found at Fri Jan 8 04:12:46 EST 2016 selfserv_9591 with PID 30127 started at Fri Jan 8 04:12:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3750: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30127 at Fri Jan 8 04:12:46 EST 2016 kill -USR1 30127 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30127 killed at Fri Jan 8 04:12:47 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:12:47 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:12:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:12:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3751: Waiting for Server - FAILED kill -0 30197 >/dev/null 2>/dev/null selfserv_9591 with PID 30197 found at Fri Jan 8 04:12:53 EST 2016 selfserv_9591 with PID 30197 started at Fri Jan 8 04:12:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3752: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30197 at Fri Jan 8 04:12:53 EST 2016 kill -USR1 30197 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30197 killed at Fri Jan 8 04:12:53 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:12:54 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:12:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:12:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3753: Waiting for Server - FAILED kill -0 30266 >/dev/null 2>/dev/null selfserv_9591 with PID 30266 found at Fri Jan 8 04:12:59 EST 2016 selfserv_9591 with PID 30266 started at Fri Jan 8 04:12:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3754: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30266 at Fri Jan 8 04:13:00 EST 2016 kill -USR1 30266 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30266 killed at Fri Jan 8 04:13:00 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:13:00 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:13:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:13:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3755: Waiting for Server - FAILED kill -0 30335 >/dev/null 2>/dev/null selfserv_9591 with PID 30335 found at Fri Jan 8 04:13:06 EST 2016 selfserv_9591 with PID 30335 started at Fri Jan 8 04:13:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3756: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30335 at Fri Jan 8 04:13:07 EST 2016 kill -USR1 30335 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30335 killed at Fri Jan 8 04:13:07 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:13:07 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:13:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:13:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3757: Waiting for Server - FAILED kill -0 30405 >/dev/null 2>/dev/null selfserv_9591 with PID 30405 found at Fri Jan 8 04:13:13 EST 2016 selfserv_9591 with PID 30405 started at Fri Jan 8 04:13:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3758: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30405 at Fri Jan 8 04:13:14 EST 2016 kill -USR1 30405 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30405 killed at Fri Jan 8 04:13:14 EST 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server fips/client normal - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 04:13:15 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:13:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:13:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3759: Waiting for Server - FAILED kill -0 30588 >/dev/null 2>/dev/null selfserv_9591 with PID 30588 found at Fri Jan 8 04:13:21 EST 2016 selfserv_9591 with PID 30588 started at Fri Jan 8 04:13:21 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 04:13:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:13:21 EST 2016 ssl.sh: #3760: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 30588 at Fri Jan 8 04:13:21 EST 2016 kill -USR1 30588 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30588 killed at Fri Jan 8 04:13:22 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 04:13:22 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:13:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:13:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3761: Waiting for Server - FAILED kill -0 30667 >/dev/null 2>/dev/null selfserv_9591 with PID 30667 found at Fri Jan 8 04:13:28 EST 2016 selfserv_9591 with PID 30667 started at Fri Jan 8 04:13:28 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 04:13:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:13:28 EST 2016 ssl.sh: #3762: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 30667 at Fri Jan 8 04:13:28 EST 2016 kill -USR1 30667 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30667 killed at Fri Jan 8 04:13:29 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9591 starting at Fri Jan 8 04:13:29 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:13:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:13:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3763: Waiting for Server - FAILED kill -0 30747 >/dev/null 2>/dev/null selfserv_9591 with PID 30747 found at Fri Jan 8 04:13:35 EST 2016 selfserv_9591 with PID 30747 started at Fri Jan 8 04:13:35 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 04:13:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:13:35 EST 2016 ssl.sh: #3764: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 30747 at Fri Jan 8 04:13:35 EST 2016 kill -USR1 30747 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30747 killed at Fri Jan 8 04:13:36 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9591 starting at Fri Jan 8 04:13:36 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:13:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:13:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3765: Waiting for Server - FAILED kill -0 30826 >/dev/null 2>/dev/null selfserv_9591 with PID 30826 found at Fri Jan 8 04:13:42 EST 2016 selfserv_9591 with PID 30826 started at Fri Jan 8 04:13:42 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:13:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:13:42 EST 2016 ssl.sh: #3766: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30826 at Fri Jan 8 04:13:42 EST 2016 kill -USR1 30826 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30826 killed at Fri Jan 8 04:13:43 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9591 starting at Fri Jan 8 04:13:43 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:13:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:13:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3767: Waiting for Server - FAILED kill -0 30905 >/dev/null 2>/dev/null selfserv_9591 with PID 30905 found at Fri Jan 8 04:13:49 EST 2016 selfserv_9591 with PID 30905 started at Fri Jan 8 04:13:49 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 04:13:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:13:49 EST 2016 ssl.sh: #3768: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 30905 at Fri Jan 8 04:13:49 EST 2016 kill -USR1 30905 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30905 killed at Fri Jan 8 04:13:50 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9591 starting at Fri Jan 8 04:13:50 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:13:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:13:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3769: Waiting for Server - FAILED kill -0 30985 >/dev/null 2>/dev/null selfserv_9591 with PID 30985 found at Fri Jan 8 04:13:56 EST 2016 selfserv_9591 with PID 30985 started at Fri Jan 8 04:13:56 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 04:13:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:13:56 EST 2016 ssl.sh: #3770: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30985 at Fri Jan 8 04:13:56 EST 2016 kill -USR1 30985 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30985 killed at Fri Jan 8 04:13:57 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9591 starting at Fri Jan 8 04:13:57 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:13:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:14:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3771: Waiting for Server - FAILED kill -0 31064 >/dev/null 2>/dev/null selfserv_9591 with PID 31064 found at Fri Jan 8 04:14:03 EST 2016 selfserv_9591 with PID 31064 started at Fri Jan 8 04:14:03 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 04:14:03 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:14:03 EST 2016 ssl.sh: #3772: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31064 at Fri Jan 8 04:14:04 EST 2016 kill -USR1 31064 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31064 killed at Fri Jan 8 04:14:04 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:14:04 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:14:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:14:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3773: Waiting for Server - FAILED kill -0 31172 >/dev/null 2>/dev/null selfserv_9591 with PID 31172 found at Fri Jan 8 04:14:10 EST 2016 selfserv_9591 with PID 31172 started at Fri Jan 8 04:14:10 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 04:14:10 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:14:11 EST 2016 ssl.sh: #3774: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31172 at Fri Jan 8 04:14:11 EST 2016 kill -USR1 31172 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31172 killed at Fri Jan 8 04:14:11 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:14:11 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:14:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:14:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3775: Waiting for Server - FAILED kill -0 31252 >/dev/null 2>/dev/null selfserv_9591 with PID 31252 found at Fri Jan 8 04:14:17 EST 2016 selfserv_9591 with PID 31252 started at Fri Jan 8 04:14:17 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 04:14:17 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:14:18 EST 2016 ssl.sh: #3776: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31252 at Fri Jan 8 04:14:18 EST 2016 kill -USR1 31252 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31252 killed at Fri Jan 8 04:14:18 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:14:18 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:14:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:14:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3777: Waiting for Server - FAILED kill -0 31331 >/dev/null 2>/dev/null selfserv_9591 with PID 31331 found at Fri Jan 8 04:14:24 EST 2016 selfserv_9591 with PID 31331 started at Fri Jan 8 04:14:24 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:14:24 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:14:25 EST 2016 ssl.sh: #3778: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31331 at Fri Jan 8 04:14:25 EST 2016 kill -USR1 31331 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31331 killed at Fri Jan 8 04:14:25 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:14:25 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:14:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:14:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3779: Waiting for Server - FAILED kill -0 31410 >/dev/null 2>/dev/null selfserv_9591 with PID 31410 found at Fri Jan 8 04:14:31 EST 2016 selfserv_9591 with PID 31410 started at Fri Jan 8 04:14:31 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 04:14:31 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:14:32 EST 2016 ssl.sh: #3780: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 31410 at Fri Jan 8 04:14:32 EST 2016 kill -USR1 31410 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31410 killed at Fri Jan 8 04:14:32 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 04:14:32 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:14:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:14:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3781: Waiting for Server - FAILED kill -0 31490 >/dev/null 2>/dev/null selfserv_9591 with PID 31490 found at Fri Jan 8 04:14:38 EST 2016 selfserv_9591 with PID 31490 started at Fri Jan 8 04:14:38 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 04:14:38 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:14:39 EST 2016 ssl.sh: #3782: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 31490 at Fri Jan 8 04:14:39 EST 2016 kill -USR1 31490 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31490 killed at Fri Jan 8 04:14:39 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:14:39 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:14:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:14:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3783: Waiting for Server - FAILED kill -0 31569 >/dev/null 2>/dev/null selfserv_9591 with PID 31569 found at Fri Jan 8 04:14:45 EST 2016 selfserv_9591 with PID 31569 started at Fri Jan 8 04:14:45 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 04:14:45 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:14:46 EST 2016 ssl.sh: #3784: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31569 at Fri Jan 8 04:14:46 EST 2016 kill -USR1 31569 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31569 killed at Fri Jan 8 04:14:46 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 04:14:46 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:14:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:14:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3785: Waiting for Server - FAILED kill -0 31648 >/dev/null 2>/dev/null selfserv_9591 with PID 31648 found at Fri Jan 8 04:14:52 EST 2016 selfserv_9591 with PID 31648 started at Fri Jan 8 04:14:52 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 04:14:52 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:14:53 EST 2016 ssl.sh: #3786: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31648 at Fri Jan 8 04:14:53 EST 2016 kill -USR1 31648 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31648 killed at Fri Jan 8 04:14:53 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:14:54 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:14:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:14:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3787: Waiting for Server - FAILED kill -0 31760 >/dev/null 2>/dev/null selfserv_9591 with PID 31760 found at Fri Jan 8 04:14:59 EST 2016 selfserv_9591 with PID 31760 started at Fri Jan 8 04:14:59 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:14:59 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:15:00 EST 2016 ssl.sh: #3788: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31760 at Fri Jan 8 04:15:00 EST 2016 kill -USR1 31760 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31760 killed at Fri Jan 8 04:15:00 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:15:01 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:15:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:15:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3789: Waiting for Server - FAILED kill -0 31839 >/dev/null 2>/dev/null selfserv_9591 with PID 31839 found at Fri Jan 8 04:15:06 EST 2016 selfserv_9591 with PID 31839 started at Fri Jan 8 04:15:06 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:15:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:15:07 EST 2016 ssl.sh: #3790: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31839 at Fri Jan 8 04:15:07 EST 2016 kill -USR1 31839 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31839 killed at Fri Jan 8 04:15:07 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:15:08 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:15:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:15:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3791: Waiting for Server - FAILED kill -0 31919 >/dev/null 2>/dev/null selfserv_9591 with PID 31919 found at Fri Jan 8 04:15:14 EST 2016 selfserv_9591 with PID 31919 started at Fri Jan 8 04:15:14 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:15:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:15:14 EST 2016 ssl.sh: #3792: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31919 at Fri Jan 8 04:15:14 EST 2016 kill -USR1 31919 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31919 killed at Fri Jan 8 04:15:15 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:15:15 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:15:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:15:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3793: Waiting for Server - FAILED kill -0 31999 >/dev/null 2>/dev/null selfserv_9591 with PID 31999 found at Fri Jan 8 04:15:21 EST 2016 selfserv_9591 with PID 31999 started at Fri Jan 8 04:15:21 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:15:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:15:21 EST 2016 ssl.sh: #3794: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 31999 at Fri Jan 8 04:15:21 EST 2016 kill -USR1 31999 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31999 killed at Fri Jan 8 04:15:22 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:15:22 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:15:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:15:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3795: Waiting for Server - FAILED kill -0 32087 >/dev/null 2>/dev/null selfserv_9591 with PID 32087 found at Fri Jan 8 04:15:28 EST 2016 selfserv_9591 with PID 32087 started at Fri Jan 8 04:15:28 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:15:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:15:28 EST 2016 ssl.sh: #3796: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 32087 at Fri Jan 8 04:15:28 EST 2016 kill -USR1 32087 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32087 killed at Fri Jan 8 04:15:29 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9591 starting at Fri Jan 8 04:15:29 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:15:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:15:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3797: Waiting for Server - FAILED kill -0 32168 >/dev/null 2>/dev/null selfserv_9591 with PID 32168 found at Fri Jan 8 04:15:35 EST 2016 selfserv_9591 with PID 32168 started at Fri Jan 8 04:15:35 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 04:15:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:15:35 EST 2016 ssl.sh: #3798: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 32168 at Fri Jan 8 04:15:35 EST 2016 kill -USR1 32168 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32168 killed at Fri Jan 8 04:15:36 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9591 starting at Fri Jan 8 04:15:36 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:15:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:15:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3799: Waiting for Server - FAILED kill -0 32247 >/dev/null 2>/dev/null selfserv_9591 with PID 32247 found at Fri Jan 8 04:15:42 EST 2016 selfserv_9591 with PID 32247 started at Fri Jan 8 04:15:42 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 04:15:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:15:42 EST 2016 ssl.sh: #3800: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 32247 at Fri Jan 8 04:15:42 EST 2016 kill -USR1 32247 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32247 killed at Fri Jan 8 04:15:43 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9591 starting at Fri Jan 8 04:15:43 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:15:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:15:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3801: Waiting for Server - FAILED kill -0 32326 >/dev/null 2>/dev/null selfserv_9591 with PID 32326 found at Fri Jan 8 04:15:49 EST 2016 selfserv_9591 with PID 32326 started at Fri Jan 8 04:15:49 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 04:15:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:15:49 EST 2016 ssl.sh: #3802: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 32326 at Fri Jan 8 04:15:49 EST 2016 kill -USR1 32326 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32326 killed at Fri Jan 8 04:15:50 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 04:15:50 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:15:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:15:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3803: Waiting for Server - FAILED kill -0 32406 >/dev/null 2>/dev/null selfserv_9591 with PID 32406 found at Fri Jan 8 04:15:56 EST 2016 selfserv_9591 with PID 32406 started at Fri Jan 8 04:15:56 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:15:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:15:56 EST 2016 ssl.sh: #3804: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 32406 at Fri Jan 8 04:15:56 EST 2016 kill -USR1 32406 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32406 killed at Fri Jan 8 04:15:57 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 04:15:57 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:15:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:16:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3805: Waiting for Server - FAILED kill -0 32485 >/dev/null 2>/dev/null selfserv_9591 with PID 32485 found at Fri Jan 8 04:16:03 EST 2016 selfserv_9591 with PID 32485 started at Fri Jan 8 04:16:03 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:16:03 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:16:03 EST 2016 ssl.sh: #3806: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 32485 at Fri Jan 8 04:16:03 EST 2016 kill -USR1 32485 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32485 killed at Fri Jan 8 04:16:04 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:16:04 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:16:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:16:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3807: Waiting for Server - FAILED kill -0 32585 >/dev/null 2>/dev/null selfserv_9591 with PID 32585 found at Fri Jan 8 04:16:10 EST 2016 selfserv_9591 with PID 32585 started at Fri Jan 8 04:16:10 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:16:10 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:16:10 EST 2016 ssl.sh: #3808: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 32585 at Fri Jan 8 04:16:10 EST 2016 kill -USR1 32585 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32585 killed at Fri Jan 8 04:16:11 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:16:11 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:16:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:16:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3809: Waiting for Server - FAILED kill -0 32665 >/dev/null 2>/dev/null selfserv_9591 with PID 32665 found at Fri Jan 8 04:16:17 EST 2016 selfserv_9591 with PID 32665 started at Fri Jan 8 04:16:17 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:16:17 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:16:17 EST 2016 ssl.sh: #3810: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 32665 at Fri Jan 8 04:16:18 EST 2016 kill -USR1 32665 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32665 killed at Fri Jan 8 04:16:18 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:16:18 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:16:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:16:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3811: Waiting for Server - FAILED kill -0 32744 >/dev/null 2>/dev/null selfserv_9591 with PID 32744 found at Fri Jan 8 04:16:24 EST 2016 selfserv_9591 with PID 32744 started at Fri Jan 8 04:16:24 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:16:24 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:16:24 EST 2016 ssl.sh: #3812: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 32744 at Fri Jan 8 04:16:25 EST 2016 kill -USR1 32744 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32744 killed at Fri Jan 8 04:16:25 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:16:25 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:16:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:16:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3813: Waiting for Server - FAILED kill -0 355 >/dev/null 2>/dev/null selfserv_9591 with PID 355 found at Fri Jan 8 04:16:31 EST 2016 selfserv_9591 with PID 355 started at Fri Jan 8 04:16:31 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 04:16:31 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:16:32 EST 2016 ssl.sh: #3814: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 355 at Fri Jan 8 04:16:32 EST 2016 kill -USR1 355 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 355 killed at Fri Jan 8 04:16:32 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9591 starting at Fri Jan 8 04:16:32 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:16:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:16:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3815: Waiting for Server - FAILED kill -0 439 >/dev/null 2>/dev/null selfserv_9591 with PID 439 found at Fri Jan 8 04:16:38 EST 2016 selfserv_9591 with PID 439 started at Fri Jan 8 04:16:38 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:16:38 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:16:39 EST 2016 ssl.sh: #3816: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 439 at Fri Jan 8 04:16:39 EST 2016 kill -USR1 439 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 439 killed at Fri Jan 8 04:16:39 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:16:39 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:16:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:16:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3817: Waiting for Server - FAILED kill -0 538 >/dev/null 2>/dev/null selfserv_9591 with PID 538 found at Fri Jan 8 04:16:45 EST 2016 selfserv_9591 with PID 538 started at Fri Jan 8 04:16:45 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:16:45 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:16:46 EST 2016 ssl.sh: #3818: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 538 at Fri Jan 8 04:16:46 EST 2016 kill -USR1 538 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 538 killed at Fri Jan 8 04:16:46 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:16:46 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:16:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:16:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3819: Waiting for Server - FAILED kill -0 643 >/dev/null 2>/dev/null selfserv_9591 with PID 643 found at Fri Jan 8 04:16:52 EST 2016 selfserv_9591 with PID 643 started at Fri Jan 8 04:16:52 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:16:52 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:16:53 EST 2016 ssl.sh: #3820: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 643 at Fri Jan 8 04:16:53 EST 2016 kill -USR1 643 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 643 killed at Fri Jan 8 04:16:53 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9591 starting at Fri Jan 8 04:16:53 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:16:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:16:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3821: Waiting for Server - FAILED kill -0 723 >/dev/null 2>/dev/null selfserv_9591 with PID 723 found at Fri Jan 8 04:16:59 EST 2016 selfserv_9591 with PID 723 started at Fri Jan 8 04:16:59 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 04:16:59 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:17:00 EST 2016 ssl.sh: #3822: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 723 at Fri Jan 8 04:17:00 EST 2016 kill -USR1 723 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 723 killed at Fri Jan 8 04:17:00 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:17:00 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:17:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:17:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3823: Waiting for Server - FAILED kill -0 802 >/dev/null 2>/dev/null selfserv_9591 with PID 802 found at Fri Jan 8 04:17:06 EST 2016 selfserv_9591 with PID 802 started at Fri Jan 8 04:17:06 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:17:06 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:17:07 EST 2016 ssl.sh: #3824: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 802 at Fri Jan 8 04:17:07 EST 2016 kill -USR1 802 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 802 killed at Fri Jan 8 04:17:07 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:17:07 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:17:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:17:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3825: Waiting for Server - FAILED kill -0 881 >/dev/null 2>/dev/null selfserv_9591 with PID 881 found at Fri Jan 8 04:17:13 EST 2016 selfserv_9591 with PID 881 started at Fri Jan 8 04:17:13 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:17:13 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:17:14 EST 2016 ssl.sh: #3826: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 881 at Fri Jan 8 04:17:14 EST 2016 kill -USR1 881 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 881 killed at Fri Jan 8 04:17:14 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:17:15 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:17:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:17:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3827: Waiting for Server - FAILED kill -0 975 >/dev/null 2>/dev/null selfserv_9591 with PID 975 found at Fri Jan 8 04:17:20 EST 2016 selfserv_9591 with PID 975 started at Fri Jan 8 04:17:20 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:17:20 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:17:21 EST 2016 ssl.sh: #3828: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 975 at Fri Jan 8 04:17:21 EST 2016 kill -USR1 975 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 975 killed at Fri Jan 8 04:17:21 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9591 starting at Fri Jan 8 04:17:22 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:17:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:17:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3829: Waiting for Server - FAILED kill -0 1068 >/dev/null 2>/dev/null selfserv_9591 with PID 1068 found at Fri Jan 8 04:17:28 EST 2016 selfserv_9591 with PID 1068 started at Fri Jan 8 04:17:28 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:17:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:17:28 EST 2016 ssl.sh: #3830: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 1068 at Fri Jan 8 04:17:28 EST 2016 kill -USR1 1068 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1068 killed at Fri Jan 8 04:17:29 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:17:29 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:17:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:17:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3831: Waiting for Server - FAILED kill -0 1150 >/dev/null 2>/dev/null selfserv_9591 with PID 1150 found at Fri Jan 8 04:17:35 EST 2016 selfserv_9591 with PID 1150 started at Fri Jan 8 04:17:35 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:17:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:17:35 EST 2016 ssl.sh: #3832: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 1150 at Fri Jan 8 04:17:35 EST 2016 kill -USR1 1150 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1150 killed at Fri Jan 8 04:17:36 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 04:17:36 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:17:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:17:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3833: Waiting for Server - FAILED kill -0 1230 >/dev/null 2>/dev/null selfserv_9591 with PID 1230 found at Fri Jan 8 04:17:42 EST 2016 selfserv_9591 with PID 1230 started at Fri Jan 8 04:17:42 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 04:17:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:17:42 EST 2016 ssl.sh: #3834: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 1230 at Fri Jan 8 04:17:42 EST 2016 kill -USR1 1230 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1230 killed at Fri Jan 8 04:17:43 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:17:43 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:17:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:17:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3835: Waiting for Server - FAILED kill -0 1330 >/dev/null 2>/dev/null selfserv_9591 with PID 1330 found at Fri Jan 8 04:17:49 EST 2016 selfserv_9591 with PID 1330 started at Fri Jan 8 04:17:49 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 04:17:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:17:49 EST 2016 ssl.sh: #3836: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 1330 at Fri Jan 8 04:17:49 EST 2016 kill -USR1 1330 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1330 killed at Fri Jan 8 04:17:50 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:17:50 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:17:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:17:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3837: Waiting for Server - FAILED kill -0 1409 >/dev/null 2>/dev/null selfserv_9591 with PID 1409 found at Fri Jan 8 04:17:56 EST 2016 selfserv_9591 with PID 1409 started at Fri Jan 8 04:17:56 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 04:17:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:17:56 EST 2016 ssl.sh: #3838: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 1409 at Fri Jan 8 04:17:56 EST 2016 kill -USR1 1409 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1409 killed at Fri Jan 8 04:17:57 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:17:57 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:17:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:18:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3839: Waiting for Server - FAILED kill -0 1503 >/dev/null 2>/dev/null selfserv_9591 with PID 1503 found at Fri Jan 8 04:18:03 EST 2016 selfserv_9591 with PID 1503 started at Fri Jan 8 04:18:03 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 04:18:03 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:18:03 EST 2016 ssl.sh: #3840: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 1503 at Fri Jan 8 04:18:03 EST 2016 kill -USR1 1503 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1503 killed at Fri Jan 8 04:18:04 EST 2016 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -fips false -force FIPS mode disabled. ssl.sh: #3841: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -list ssl.sh: #3842: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #3843: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -fips false -force FIPS mode disabled. ssl.sh: #3844: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -list ssl.sh: #3845: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #3846: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -fips true -force FIPS mode enabled. ssl.sh: #3847: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -list ssl.sh: #3848: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #3849: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -fips true -force FIPS mode enabled. ssl.sh: #3850: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -list ssl.sh: #3851: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #3852: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips - with ECC =============================== selfserv_9591 starting at Fri Jan 8 04:18:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:18:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:18:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3853: Waiting for Server - FAILED kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:14 EST 2016 selfserv_9591 with PID 1699 started at Fri Jan 8 04:18:14 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping A SSL2_RC4_128_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping F SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3854: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3855: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3856: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3857: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3858: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3859: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3860: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3861: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3862: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3863: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3864: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3865: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3866: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3867: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3868: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3869: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3870: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3871: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3872: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3873: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3874: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3875: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3876: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3877: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3878: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3879: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3880: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3881: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3882: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3883: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3884: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3885: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3886: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3887: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3888: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3889: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3890: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3891: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3892: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS12_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS12_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3893: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3894: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3895: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3896: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3897: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3898: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3899: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3900: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3901: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3902: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3903: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3904: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3905: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3906: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3907: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3908: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3909: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3910: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3911: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3912: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3913: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3914: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3915: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3916: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3917: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3918: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3919: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3920: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 1699 >/dev/null 2>/dev/null selfserv_9591 with PID 1699 found at Fri Jan 8 04:18:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3921: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 1699 at Fri Jan 8 04:18:51 EST 2016 kill -USR1 1699 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1699 killed at Fri Jan 8 04:18:52 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:18:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:18:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:18:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3922: Waiting for Server - FAILED kill -0 3735 >/dev/null 2>/dev/null selfserv_9591 with PID 3735 found at Fri Jan 8 04:18:58 EST 2016 selfserv_9591 with PID 3735 started at Fri Jan 8 04:18:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3923: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 3735 >/dev/null 2>/dev/null selfserv_9591 with PID 3735 found at Fri Jan 8 04:18:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3924: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 3735 >/dev/null 2>/dev/null selfserv_9591 with PID 3735 found at Fri Jan 8 04:18:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3925: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 3735 >/dev/null 2>/dev/null selfserv_9591 with PID 3735 found at Fri Jan 8 04:18:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3926: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 3735 >/dev/null 2>/dev/null selfserv_9591 with PID 3735 found at Fri Jan 8 04:19:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3927: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 3735 at Fri Jan 8 04:19:00 EST 2016 kill -USR1 3735 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3735 killed at Fri Jan 8 04:19:01 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:19:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:19:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:19:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3928: Waiting for Server - FAILED kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:07 EST 2016 selfserv_9591 with PID 3901 started at Fri Jan 8 04:19:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3929: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3930: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3931: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3932: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3933: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3934: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3935: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3936: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3937: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3938: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3939: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3940: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3941: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3942: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 3901 >/dev/null 2>/dev/null selfserv_9591 with PID 3901 found at Fri Jan 8 04:19:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3943: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 3901 at Fri Jan 8 04:19:15 EST 2016 kill -USR1 3901 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3901 killed at Fri Jan 8 04:19:15 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:19:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:19:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:19:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3944: Waiting for Server - FAILED kill -0 4315 >/dev/null 2>/dev/null selfserv_9591 with PID 4315 found at Fri Jan 8 04:19:21 EST 2016 selfserv_9591 with PID 4315 started at Fri Jan 8 04:19:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3945: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 4315 >/dev/null 2>/dev/null selfserv_9591 with PID 4315 found at Fri Jan 8 04:19:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3946: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4315 >/dev/null 2>/dev/null selfserv_9591 with PID 4315 found at Fri Jan 8 04:19:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3947: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4315 >/dev/null 2>/dev/null selfserv_9591 with PID 4315 found at Fri Jan 8 04:19:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3948: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4315 >/dev/null 2>/dev/null selfserv_9591 with PID 4315 found at Fri Jan 8 04:19:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3949: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 4315 at Fri Jan 8 04:19:24 EST 2016 kill -USR1 4315 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4315 killed at Fri Jan 8 04:19:24 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:19:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:19:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:19:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3950: Waiting for Server - FAILED kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:30 EST 2016 selfserv_9591 with PID 4480 started at Fri Jan 8 04:19:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3951: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3952: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3953: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3954: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3955: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3956: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3957: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3958: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3959: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3960: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3961: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3962: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3963: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3964: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4480 >/dev/null 2>/dev/null selfserv_9591 with PID 4480 found at Fri Jan 8 04:19:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3965: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 4480 at Fri Jan 8 04:19:39 EST 2016 kill -USR1 4480 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4480 killed at Fri Jan 8 04:19:39 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:19:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:19:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:19:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3966: Waiting for Server - FAILED kill -0 4896 >/dev/null 2>/dev/null selfserv_9591 with PID 4896 found at Fri Jan 8 04:19:45 EST 2016 selfserv_9591 with PID 4896 started at Fri Jan 8 04:19:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3967: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 4896 >/dev/null 2>/dev/null selfserv_9591 with PID 4896 found at Fri Jan 8 04:19:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3968: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4896 >/dev/null 2>/dev/null selfserv_9591 with PID 4896 found at Fri Jan 8 04:19:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3969: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4896 >/dev/null 2>/dev/null selfserv_9591 with PID 4896 found at Fri Jan 8 04:19:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3970: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4896 >/dev/null 2>/dev/null selfserv_9591 with PID 4896 found at Fri Jan 8 04:19:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3971: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 4896 at Fri Jan 8 04:19:48 EST 2016 kill -USR1 4896 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4896 killed at Fri Jan 8 04:19:48 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:19:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:19:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:19:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3972: Waiting for Server - FAILED kill -0 5061 >/dev/null 2>/dev/null selfserv_9591 with PID 5061 found at Fri Jan 8 04:19:54 EST 2016 selfserv_9591 with PID 5061 started at Fri Jan 8 04:19:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3973: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 5061 >/dev/null 2>/dev/null selfserv_9591 with PID 5061 found at Fri Jan 8 04:19:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3974: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5061 >/dev/null 2>/dev/null selfserv_9591 with PID 5061 found at Fri Jan 8 04:19:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3975: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5061 >/dev/null 2>/dev/null selfserv_9591 with PID 5061 found at Fri Jan 8 04:19:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3976: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5061 >/dev/null 2>/dev/null selfserv_9591 with PID 5061 found at Fri Jan 8 04:19:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3977: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 5061 >/dev/null 2>/dev/null selfserv_9591 with PID 5061 found at Fri Jan 8 04:19:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3978: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 5061 >/dev/null 2>/dev/null selfserv_9591 with PID 5061 found at Fri Jan 8 04:19:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3979: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 5061 >/dev/null 2>/dev/null selfserv_9591 with PID 5061 found at Fri Jan 8 04:19:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3980: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 5061 >/dev/null 2>/dev/null selfserv_9591 with PID 5061 found at Fri Jan 8 04:19:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3981: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 5061 >/dev/null 2>/dev/null selfserv_9591 with PID 5061 found at Fri Jan 8 04:19:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3982: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 5061 >/dev/null 2>/dev/null selfserv_9591 with PID 5061 found at Fri Jan 8 04:19:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3983: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 5061 >/dev/null 2>/dev/null selfserv_9591 with PID 5061 found at Fri Jan 8 04:20:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3984: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 5061 >/dev/null 2>/dev/null selfserv_9591 with PID 5061 found at Fri Jan 8 04:20:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3985: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5061 at Fri Jan 8 04:20:01 EST 2016 kill -USR1 5061 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5061 killed at Fri Jan 8 04:20:01 EST 2016 ssl.sh: SSL Client Authentication - server normal/client fips - with ECC =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:20:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:20:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:20:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3986: Waiting for Server - FAILED kill -0 5475 >/dev/null 2>/dev/null selfserv_9591 with PID 5475 found at Fri Jan 8 04:20:07 EST 2016 selfserv_9591 with PID 5475 started at Fri Jan 8 04:20:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3987: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5475 at Fri Jan 8 04:20:08 EST 2016 kill -USR1 5475 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5475 killed at Fri Jan 8 04:20:08 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:20:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:20:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:20:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3988: Waiting for Server - FAILED kill -0 5544 >/dev/null 2>/dev/null selfserv_9591 with PID 5544 found at Fri Jan 8 04:20:14 EST 2016 selfserv_9591 with PID 5544 started at Fri Jan 8 04:20:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3989: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5544 at Fri Jan 8 04:20:15 EST 2016 kill -USR1 5544 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5544 killed at Fri Jan 8 04:20:15 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:20:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:20:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:20:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3990: Waiting for Server - FAILED kill -0 5614 >/dev/null 2>/dev/null selfserv_9591 with PID 5614 found at Fri Jan 8 04:20:21 EST 2016 selfserv_9591 with PID 5614 started at Fri Jan 8 04:20:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3991: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5614 at Fri Jan 8 04:20:22 EST 2016 kill -USR1 5614 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5614 killed at Fri Jan 8 04:20:22 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:20:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:20:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:20:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3992: Waiting for Server - FAILED kill -0 5689 >/dev/null 2>/dev/null selfserv_9591 with PID 5689 found at Fri Jan 8 04:20:28 EST 2016 selfserv_9591 with PID 5689 started at Fri Jan 8 04:20:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3993: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5689 at Fri Jan 8 04:20:29 EST 2016 kill -USR1 5689 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5689 killed at Fri Jan 8 04:20:29 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:20:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:20:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:20:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3994: Waiting for Server - FAILED kill -0 5758 >/dev/null 2>/dev/null selfserv_9591 with PID 5758 found at Fri Jan 8 04:20:35 EST 2016 selfserv_9591 with PID 5758 started at Fri Jan 8 04:20:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3995: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5758 at Fri Jan 8 04:20:36 EST 2016 kill -USR1 5758 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5758 killed at Fri Jan 8 04:20:36 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:20:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:20:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:20:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3996: Waiting for Server - FAILED kill -0 5828 >/dev/null 2>/dev/null selfserv_9591 with PID 5828 found at Fri Jan 8 04:20:42 EST 2016 selfserv_9591 with PID 5828 started at Fri Jan 8 04:20:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3997: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 5828 at Fri Jan 8 04:20:43 EST 2016 kill -USR1 5828 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5828 killed at Fri Jan 8 04:20:43 EST 2016 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:20:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:20:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:20:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3998: Waiting for Server - FAILED kill -0 5903 >/dev/null 2>/dev/null selfserv_9591 with PID 5903 found at Fri Jan 8 04:20:49 EST 2016 selfserv_9591 with PID 5903 started at Fri Jan 8 04:20:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3999: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5903 at Fri Jan 8 04:20:49 EST 2016 kill -USR1 5903 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5903 killed at Fri Jan 8 04:20:50 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:20:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:20:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:20:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4000: Waiting for Server - FAILED kill -0 5972 >/dev/null 2>/dev/null selfserv_9591 with PID 5972 found at Fri Jan 8 04:20:56 EST 2016 selfserv_9591 with PID 5972 started at Fri Jan 8 04:20:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4001: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5972 at Fri Jan 8 04:20:56 EST 2016 kill -USR1 5972 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5972 killed at Fri Jan 8 04:20:57 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:20:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:20:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:21:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4002: Waiting for Server - FAILED kill -0 6042 >/dev/null 2>/dev/null selfserv_9591 with PID 6042 found at Fri Jan 8 04:21:03 EST 2016 selfserv_9591 with PID 6042 started at Fri Jan 8 04:21:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4003: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6042 at Fri Jan 8 04:21:03 EST 2016 kill -USR1 6042 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6042 killed at Fri Jan 8 04:21:04 EST 2016 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:21:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:21:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:21:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4004: Waiting for Server - FAILED kill -0 6117 >/dev/null 2>/dev/null selfserv_9591 with PID 6117 found at Fri Jan 8 04:21:10 EST 2016 selfserv_9591 with PID 6117 started at Fri Jan 8 04:21:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4005: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6117 at Fri Jan 8 04:21:10 EST 2016 kill -USR1 6117 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6117 killed at Fri Jan 8 04:21:11 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:21:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:21:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:21:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4006: Waiting for Server - FAILED kill -0 6186 >/dev/null 2>/dev/null selfserv_9591 with PID 6186 found at Fri Jan 8 04:21:17 EST 2016 selfserv_9591 with PID 6186 started at Fri Jan 8 04:21:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4007: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6186 at Fri Jan 8 04:21:17 EST 2016 kill -USR1 6186 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6186 killed at Fri Jan 8 04:21:18 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:21:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:21:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:21:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4008: Waiting for Server - FAILED kill -0 6256 >/dev/null 2>/dev/null selfserv_9591 with PID 6256 found at Fri Jan 8 04:21:24 EST 2016 selfserv_9591 with PID 6256 started at Fri Jan 8 04:21:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4009: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6256 at Fri Jan 8 04:21:24 EST 2016 kill -USR1 6256 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6256 killed at Fri Jan 8 04:21:25 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:21:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:21:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:21:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4010: Waiting for Server - FAILED kill -0 6331 >/dev/null 2>/dev/null selfserv_9591 with PID 6331 found at Fri Jan 8 04:21:31 EST 2016 selfserv_9591 with PID 6331 started at Fri Jan 8 04:21:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4011: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6331 at Fri Jan 8 04:21:31 EST 2016 kill -USR1 6331 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6331 killed at Fri Jan 8 04:21:32 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:21:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:21:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:21:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4012: Waiting for Server - FAILED kill -0 6400 >/dev/null 2>/dev/null selfserv_9591 with PID 6400 found at Fri Jan 8 04:21:38 EST 2016 selfserv_9591 with PID 6400 started at Fri Jan 8 04:21:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4013: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6400 at Fri Jan 8 04:21:38 EST 2016 kill -USR1 6400 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6400 killed at Fri Jan 8 04:21:38 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:21:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:21:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:21:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4014: Waiting for Server - FAILED kill -0 6470 >/dev/null 2>/dev/null selfserv_9591 with PID 6470 found at Fri Jan 8 04:21:44 EST 2016 selfserv_9591 with PID 6470 started at Fri Jan 8 04:21:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4015: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6470 at Fri Jan 8 04:21:45 EST 2016 kill -USR1 6470 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6470 killed at Fri Jan 8 04:21:45 EST 2016 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:21:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:21:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:21:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4016: Waiting for Server - FAILED kill -0 6558 >/dev/null 2>/dev/null selfserv_9591 with PID 6558 found at Fri Jan 8 04:21:51 EST 2016 selfserv_9591 with PID 6558 started at Fri Jan 8 04:21:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4017: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6558 at Fri Jan 8 04:21:52 EST 2016 kill -USR1 6558 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6558 killed at Fri Jan 8 04:21:52 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:21:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:21:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:21:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4018: Waiting for Server - FAILED kill -0 6627 >/dev/null 2>/dev/null selfserv_9591 with PID 6627 found at Fri Jan 8 04:21:58 EST 2016 selfserv_9591 with PID 6627 started at Fri Jan 8 04:21:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4019: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6627 at Fri Jan 8 04:21:59 EST 2016 kill -USR1 6627 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6627 killed at Fri Jan 8 04:21:59 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:21:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:21:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:22:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4020: Waiting for Server - FAILED kill -0 6701 >/dev/null 2>/dev/null selfserv_9591 with PID 6701 found at Fri Jan 8 04:22:05 EST 2016 selfserv_9591 with PID 6701 started at Fri Jan 8 04:22:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4021: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6701 at Fri Jan 8 04:22:06 EST 2016 kill -USR1 6701 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6701 killed at Fri Jan 8 04:22:06 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:22:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:22:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:22:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4022: Waiting for Server - FAILED kill -0 6770 >/dev/null 2>/dev/null selfserv_9591 with PID 6770 found at Fri Jan 8 04:22:12 EST 2016 selfserv_9591 with PID 6770 started at Fri Jan 8 04:22:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4023: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6770 at Fri Jan 8 04:22:13 EST 2016 kill -USR1 6770 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6770 killed at Fri Jan 8 04:22:13 EST 2016 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:22:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:22:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:22:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4024: Waiting for Server - FAILED kill -0 6843 >/dev/null 2>/dev/null selfserv_9591 with PID 6843 found at Fri Jan 8 04:22:19 EST 2016 selfserv_9591 with PID 6843 started at Fri Jan 8 04:22:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4025: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6843 at Fri Jan 8 04:22:20 EST 2016 kill -USR1 6843 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6843 killed at Fri Jan 8 04:22:20 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:22:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:22:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:22:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4026: Waiting for Server - FAILED kill -0 6913 >/dev/null 2>/dev/null selfserv_9591 with PID 6913 found at Fri Jan 8 04:22:26 EST 2016 selfserv_9591 with PID 6913 started at Fri Jan 8 04:22:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4027: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 6913 at Fri Jan 8 04:22:27 EST 2016 kill -USR1 6913 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6913 killed at Fri Jan 8 04:22:27 EST 2016 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:22:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:22:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:22:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4028: Waiting for Server - FAILED kill -0 6986 >/dev/null 2>/dev/null selfserv_9591 with PID 6986 found at Fri Jan 8 04:22:33 EST 2016 selfserv_9591 with PID 6986 started at Fri Jan 8 04:22:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4029: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 6986 at Fri Jan 8 04:22:34 EST 2016 kill -USR1 6986 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6986 killed at Fri Jan 8 04:22:34 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:22:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:22:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:22:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4030: Waiting for Server - FAILED kill -0 7055 >/dev/null 2>/dev/null selfserv_9591 with PID 7055 found at Fri Jan 8 04:22:40 EST 2016 selfserv_9591 with PID 7055 started at Fri Jan 8 04:22:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4031: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7055 at Fri Jan 8 04:22:41 EST 2016 kill -USR1 7055 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7055 killed at Fri Jan 8 04:22:41 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:22:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:22:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:22:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4032: Waiting for Server - FAILED kill -0 7130 >/dev/null 2>/dev/null selfserv_9591 with PID 7130 found at Fri Jan 8 04:22:47 EST 2016 selfserv_9591 with PID 7130 started at Fri Jan 8 04:22:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4033: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 7130 at Fri Jan 8 04:22:47 EST 2016 kill -USR1 7130 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7130 killed at Fri Jan 8 04:22:48 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:22:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:22:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:22:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4034: Waiting for Server - FAILED kill -0 7199 >/dev/null 2>/dev/null selfserv_9591 with PID 7199 found at Fri Jan 8 04:22:54 EST 2016 selfserv_9591 with PID 7199 started at Fri Jan 8 04:22:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4035: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7199 at Fri Jan 8 04:22:54 EST 2016 kill -USR1 7199 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7199 killed at Fri Jan 8 04:22:55 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 04:22:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:22:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:23:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4036: Waiting for Server - FAILED kill -0 7289 >/dev/null 2>/dev/null selfserv_9591 with PID 7289 found at Fri Jan 8 04:23:01 EST 2016 selfserv_9591 with PID 7289 started at Fri Jan 8 04:23:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4037: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7289 at Fri Jan 8 04:23:01 EST 2016 kill -USR1 7289 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7289 killed at Fri Jan 8 04:23:02 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9591 starting at Fri Jan 8 04:23:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:23:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:23:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4038: Waiting for Server - FAILED kill -0 7365 >/dev/null 2>/dev/null selfserv_9591 with PID 7365 found at Fri Jan 8 04:23:08 EST 2016 selfserv_9591 with PID 7365 started at Fri Jan 8 04:23:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4039: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7365 at Fri Jan 8 04:23:08 EST 2016 kill -USR1 7365 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7365 killed at Fri Jan 8 04:23:09 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9591 starting at Fri Jan 8 04:23:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:23:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:23:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4040: Waiting for Server - FAILED kill -0 7440 >/dev/null 2>/dev/null selfserv_9591 with PID 7440 found at Fri Jan 8 04:23:15 EST 2016 selfserv_9591 with PID 7440 started at Fri Jan 8 04:23:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4041: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 7440 at Fri Jan 8 04:23:15 EST 2016 kill -USR1 7440 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7440 killed at Fri Jan 8 04:23:16 EST 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 04:23:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:23:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:23:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4042: Waiting for Server - FAILED kill -0 7515 >/dev/null 2>/dev/null selfserv_9591 with PID 7515 found at Fri Jan 8 04:23:22 EST 2016 selfserv_9591 with PID 7515 started at Fri Jan 8 04:23:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4043: SSL3 Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7515 at Fri Jan 8 04:23:22 EST 2016 kill -USR1 7515 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7515 killed at Fri Jan 8 04:23:23 EST 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9591 starting at Fri Jan 8 04:23:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:23:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:23:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4044: Waiting for Server - FAILED kill -0 7591 >/dev/null 2>/dev/null selfserv_9591 with PID 7591 found at Fri Jan 8 04:23:29 EST 2016 selfserv_9591 with PID 7591 started at Fri Jan 8 04:23:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c vssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4045: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 7591 at Fri Jan 8 04:23:29 EST 2016 kill -USR1 7591 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7591 killed at Fri Jan 8 04:23:30 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 04:23:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:23:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:23:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4046: Waiting for Server - FAILED kill -0 7666 >/dev/null 2>/dev/null selfserv_9591 with PID 7666 found at Fri Jan 8 04:23:36 EST 2016 selfserv_9591 with PID 7666 started at Fri Jan 8 04:23:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4047: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7666 at Fri Jan 8 04:23:36 EST 2016 kill -USR1 7666 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7666 killed at Fri Jan 8 04:23:37 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9591 starting at Fri Jan 8 04:23:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:23:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:23:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4048: Waiting for Server - FAILED kill -0 7741 >/dev/null 2>/dev/null selfserv_9591 with PID 7741 found at Fri Jan 8 04:23:43 EST 2016 selfserv_9591 with PID 7741 started at Fri Jan 8 04:23:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4049: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 7741 at Fri Jan 8 04:23:43 EST 2016 kill -USR1 7741 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7741 killed at Fri Jan 8 04:23:44 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9591 starting at Fri Jan 8 04:23:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:23:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:23:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4050: Waiting for Server - FAILED kill -0 7817 >/dev/null 2>/dev/null selfserv_9591 with PID 7817 found at Fri Jan 8 04:23:50 EST 2016 selfserv_9591 with PID 7817 started at Fri Jan 8 04:23:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4051: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 7817 at Fri Jan 8 04:23:50 EST 2016 kill -USR1 7817 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7817 killed at Fri Jan 8 04:23:51 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9591 starting at Fri Jan 8 04:23:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:23:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:23:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4052: Waiting for Server - FAILED kill -0 7893 >/dev/null 2>/dev/null selfserv_9591 with PID 7893 found at Fri Jan 8 04:23:57 EST 2016 selfserv_9591 with PID 7893 started at Fri Jan 8 04:23:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4053: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 7893 at Fri Jan 8 04:23:57 EST 2016 kill -USR1 7893 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7893 killed at Fri Jan 8 04:23:58 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9591 starting at Fri Jan 8 04:23:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:23:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:24:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4054: Waiting for Server - FAILED kill -0 7968 >/dev/null 2>/dev/null selfserv_9591 with PID 7968 found at Fri Jan 8 04:24:04 EST 2016 selfserv_9591 with PID 7968 started at Fri Jan 8 04:24:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4055: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 7968 at Fri Jan 8 04:24:04 EST 2016 kill -USR1 7968 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7968 killed at Fri Jan 8 04:24:04 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, revoked status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, unknown status (non-FIPS only) ssl.sh: skipping OCSP stapling, unsigned failure response (non-FIPS only) ssl.sh: skipping OCSP stapling, good status, bad signature (non-FIPS only) ssl.sh: skipping OCSP stapling, invalid cert status data (non-FIPS only) ssl.sh: skipping Valid cert, Server doesn't staple (non-FIPS only) ssl.sh: skipping Stress OCSP stapling, server uses random status (non-FIPS only) ssl.sh: SSL Stress Test - server normal/client fips - with ECC =============================== ssl.sh: skipping Form is subject to the terms of the Mozilla Public (non-FIPS only) ssl.sh: skipping If a copy of the MPL was not distributed with this (non-FIPS only) ssl.sh: skipping obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:24:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:24:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:24:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4056: Waiting for Server - FAILED kill -0 8136 >/dev/null 2>/dev/null selfserv_9591 with PID 8136 found at Fri Jan 8 04:24:11 EST 2016 selfserv_9591 with PID 8136 started at Fri Jan 8 04:24:11 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 04:24:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:24:11 EST 2016 ssl.sh: #4057: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8136 at Fri Jan 8 04:24:12 EST 2016 kill -USR1 8136 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8136 killed at Fri Jan 8 04:24:12 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:24:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:24:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:24:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4058: Waiting for Server - FAILED kill -0 8216 >/dev/null 2>/dev/null selfserv_9591 with PID 8216 found at Fri Jan 8 04:24:18 EST 2016 selfserv_9591 with PID 8216 started at Fri Jan 8 04:24:18 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 04:24:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:24:19 EST 2016 ssl.sh: #4059: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8216 at Fri Jan 8 04:24:19 EST 2016 kill -USR1 8216 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8216 killed at Fri Jan 8 04:24:19 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:24:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:24:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:24:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4060: Waiting for Server - FAILED kill -0 8295 >/dev/null 2>/dev/null selfserv_9591 with PID 8295 found at Fri Jan 8 04:24:25 EST 2016 selfserv_9591 with PID 8295 started at Fri Jan 8 04:24:25 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:24:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:24:26 EST 2016 ssl.sh: #4061: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8295 at Fri Jan 8 04:24:26 EST 2016 kill -USR1 8295 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8295 killed at Fri Jan 8 04:24:26 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:24:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:24:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:24:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4062: Waiting for Server - FAILED kill -0 8375 >/dev/null 2>/dev/null selfserv_9591 with PID 8375 found at Fri Jan 8 04:24:32 EST 2016 selfserv_9591 with PID 8375 started at Fri Jan 8 04:24:32 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 04:24:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:24:33 EST 2016 ssl.sh: #4063: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 8375 at Fri Jan 8 04:24:33 EST 2016 kill -USR1 8375 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8375 killed at Fri Jan 8 04:24:33 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 04:24:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:24:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:24:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4064: Waiting for Server - FAILED kill -0 8454 >/dev/null 2>/dev/null selfserv_9591 with PID 8454 found at Fri Jan 8 04:24:39 EST 2016 selfserv_9591 with PID 8454 started at Fri Jan 8 04:24:39 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 04:24:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:24:40 EST 2016 ssl.sh: #4065: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 8454 at Fri Jan 8 04:24:40 EST 2016 kill -USR1 8454 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8454 killed at Fri Jan 8 04:24:40 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:24:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:24:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:24:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4066: Waiting for Server - FAILED kill -0 8533 >/dev/null 2>/dev/null selfserv_9591 with PID 8533 found at Fri Jan 8 04:24:46 EST 2016 selfserv_9591 with PID 8533 started at Fri Jan 8 04:24:46 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 04:24:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:24:47 EST 2016 ssl.sh: #4067: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8533 at Fri Jan 8 04:24:47 EST 2016 kill -USR1 8533 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8533 killed at Fri Jan 8 04:24:47 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 04:24:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:24:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:24:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4068: Waiting for Server - FAILED kill -0 8613 >/dev/null 2>/dev/null selfserv_9591 with PID 8613 found at Fri Jan 8 04:24:53 EST 2016 selfserv_9591 with PID 8613 started at Fri Jan 8 04:24:53 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 04:24:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:24:54 EST 2016 ssl.sh: #4069: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8613 at Fri Jan 8 04:24:54 EST 2016 kill -USR1 8613 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8613 killed at Fri Jan 8 04:24:54 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9591 starting at Fri Jan 8 04:24:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:24:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:25:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4070: Waiting for Server - FAILED kill -0 8698 >/dev/null 2>/dev/null selfserv_9591 with PID 8698 found at Fri Jan 8 04:25:00 EST 2016 selfserv_9591 with PID 8698 started at Fri Jan 8 04:25:00 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:25:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:25:01 EST 2016 ssl.sh: #4071: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8698 at Fri Jan 8 04:25:01 EST 2016 kill -USR1 8698 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8698 killed at Fri Jan 8 04:25:01 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9591 starting at Fri Jan 8 04:25:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:25:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:25:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4072: Waiting for Server - FAILED kill -0 8783 >/dev/null 2>/dev/null selfserv_9591 with PID 8783 found at Fri Jan 8 04:25:07 EST 2016 selfserv_9591 with PID 8783 started at Fri Jan 8 04:25:07 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Fri Jan 8 04:25:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:25:08 EST 2016 ssl.sh: #4073: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8783 at Fri Jan 8 04:25:08 EST 2016 kill -USR1 8783 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8783 killed at Fri Jan 8 04:25:08 EST 2016 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA256 (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 GCM (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:25:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:25:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:25:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4074: Waiting for Server - FAILED kill -0 8927 >/dev/null 2>/dev/null selfserv_9591 with PID 8927 found at Fri Jan 8 04:25:15 EST 2016 selfserv_9591 with PID 8927 started at Fri Jan 8 04:25:15 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:25:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:25:15 EST 2016 ssl.sh: #4075: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 8927 at Fri Jan 8 04:25:15 EST 2016 kill -USR1 8927 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8927 killed at Fri Jan 8 04:25:16 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:25:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:25:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:25:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4076: Waiting for Server - FAILED kill -0 9006 >/dev/null 2>/dev/null selfserv_9591 with PID 9006 found at Fri Jan 8 04:25:22 EST 2016 selfserv_9591 with PID 9006 started at Fri Jan 8 04:25:22 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:25:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:25:22 EST 2016 ssl.sh: #4077: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 9006 at Fri Jan 8 04:25:22 EST 2016 kill -USR1 9006 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9006 killed at Fri Jan 8 04:25:23 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:25:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:25:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:25:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4078: Waiting for Server - FAILED kill -0 9085 >/dev/null 2>/dev/null selfserv_9591 with PID 9085 found at Fri Jan 8 04:25:29 EST 2016 selfserv_9591 with PID 9085 started at Fri Jan 8 04:25:29 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:25:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:25:29 EST 2016 ssl.sh: #4079: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9085 at Fri Jan 8 04:25:29 EST 2016 kill -USR1 9085 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9085 killed at Fri Jan 8 04:25:30 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:25:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:25:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:25:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4080: Waiting for Server - FAILED kill -0 9165 >/dev/null 2>/dev/null selfserv_9591 with PID 9165 found at Fri Jan 8 04:25:36 EST 2016 selfserv_9591 with PID 9165 started at Fri Jan 8 04:25:36 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 04:25:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:25:36 EST 2016 ssl.sh: #4081: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9165 at Fri Jan 8 04:25:36 EST 2016 kill -USR1 9165 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9165 killed at Fri Jan 8 04:25:37 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9591 starting at Fri Jan 8 04:25:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:25:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:25:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4082: Waiting for Server - FAILED kill -0 9244 >/dev/null 2>/dev/null selfserv_9591 with PID 9244 found at Fri Jan 8 04:25:43 EST 2016 selfserv_9591 with PID 9244 started at Fri Jan 8 04:25:43 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:25:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:25:43 EST 2016 ssl.sh: #4083: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 9244 at Fri Jan 8 04:25:43 EST 2016 kill -USR1 9244 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9244 killed at Fri Jan 8 04:25:44 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:25:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:25:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:25:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4084: Waiting for Server - FAILED kill -0 9324 >/dev/null 2>/dev/null selfserv_9591 with PID 9324 found at Fri Jan 8 04:25:50 EST 2016 selfserv_9591 with PID 9324 started at Fri Jan 8 04:25:50 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:25:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:25:50 EST 2016 ssl.sh: #4085: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9324 at Fri Jan 8 04:25:50 EST 2016 kill -USR1 9324 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9324 killed at Fri Jan 8 04:25:51 EST 2016 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:_-c_1000_-C_:0038_-u Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (session ticket) (non-FIPS only) ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:_-c_1000_-C_:006A Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (non-FIPS only) ssl.sh: skipping reuse test, once the session cache with DHE_DSS is working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:25:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:25:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:25:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4086: Waiting for Server - FAILED kill -0 9475 >/dev/null 2>/dev/null selfserv_9591 with PID 9475 found at Fri Jan 8 04:25:57 EST 2016 selfserv_9591 with PID 9475 started at Fri Jan 8 04:25:57 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 04:25:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:25:58 EST 2016 ssl.sh: #4087: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9475 at Fri Jan 8 04:25:58 EST 2016 kill -USR1 9475 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9475 killed at Fri Jan 8 04:25:58 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:25:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:25:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:26:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4088: Waiting for Server - FAILED kill -0 9554 >/dev/null 2>/dev/null selfserv_9591 with PID 9554 found at Fri Jan 8 04:26:04 EST 2016 selfserv_9591 with PID 9554 started at Fri Jan 8 04:26:04 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 04:26:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:26:05 EST 2016 ssl.sh: #4089: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 9554 at Fri Jan 8 04:26:05 EST 2016 kill -USR1 9554 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9554 killed at Fri Jan 8 04:26:05 EST 2016 ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:26:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:26:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:26:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4090: Waiting for Server - FAILED kill -0 9645 >/dev/null 2>/dev/null selfserv_9591 with PID 9645 found at Fri Jan 8 04:26:11 EST 2016 selfserv_9591 with PID 9645 started at Fri Jan 8 04:26:11 EST 2016 strsclnt -q -p 9591 -d ../client -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 04:26:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:26:12 EST 2016 ssl.sh: #4091: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 9645 at Fri Jan 8 04:26:12 EST 2016 kill -USR1 9645 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9645 killed at Fri Jan 8 04:26:12 EST 2016 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips - with ECC =============================== selfserv_9591 starting at Fri Jan 8 04:26:12 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:26:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:26:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4092: Waiting for Server - FAILED kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:18 EST 2016 selfserv_9591 with PID 9711 started at Fri Jan 8 04:26:18 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping A SSL2_RC4_128_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping F SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4093: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4094: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4095: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4096: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4097: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4098: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4099: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4100: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4101: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4102: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4103: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4104: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4105: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4106: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4107: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4108: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4109: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4110: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4111: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4112: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4113: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4114: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4115: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4116: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4117: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4118: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4119: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4120: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4121: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4122: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4123: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4124: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4125: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4126: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4127: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4128: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4129: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4130: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4131: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS12_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS12_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4132: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4133: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4134: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4135: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4136: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4137: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4138: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4139: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4140: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4141: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4142: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4143: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4144: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4145: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4146: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4147: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4148: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4149: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4150: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4151: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4152: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4153: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4154: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4155: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4156: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4157: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4158: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4159: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9711 >/dev/null 2>/dev/null selfserv_9591 with PID 9711 found at Fri Jan 8 04:26:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4160: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 9711 at Fri Jan 8 04:26:56 EST 2016 kill -USR1 9711 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9711 killed at Fri Jan 8 04:26:56 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:26:56 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:26:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:27:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4161: Waiting for Server - FAILED kill -0 11746 >/dev/null 2>/dev/null selfserv_9591 with PID 11746 found at Fri Jan 8 04:27:02 EST 2016 selfserv_9591 with PID 11746 started at Fri Jan 8 04:27:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4162: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11746 >/dev/null 2>/dev/null selfserv_9591 with PID 11746 found at Fri Jan 8 04:27:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4163: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11746 >/dev/null 2>/dev/null selfserv_9591 with PID 11746 found at Fri Jan 8 04:27:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4164: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11746 >/dev/null 2>/dev/null selfserv_9591 with PID 11746 found at Fri Jan 8 04:27:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4165: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11746 >/dev/null 2>/dev/null selfserv_9591 with PID 11746 found at Fri Jan 8 04:27:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4166: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 11746 at Fri Jan 8 04:27:05 EST 2016 kill -USR1 11746 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11746 killed at Fri Jan 8 04:27:05 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:27:05 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:27:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:27:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4167: Waiting for Server - FAILED kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:11 EST 2016 selfserv_9591 with PID 11911 started at Fri Jan 8 04:27:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4168: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4169: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4170: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4171: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4172: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4173: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4174: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4175: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4176: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4177: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4178: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4179: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4180: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4181: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11911 >/dev/null 2>/dev/null selfserv_9591 with PID 11911 found at Fri Jan 8 04:27:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4182: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 11911 at Fri Jan 8 04:27:19 EST 2016 kill -USR1 11911 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11911 killed at Fri Jan 8 04:27:19 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:27:19 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:27:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:27:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4183: Waiting for Server - FAILED kill -0 12325 >/dev/null 2>/dev/null selfserv_9591 with PID 12325 found at Fri Jan 8 04:27:25 EST 2016 selfserv_9591 with PID 12325 started at Fri Jan 8 04:27:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4184: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 12325 >/dev/null 2>/dev/null selfserv_9591 with PID 12325 found at Fri Jan 8 04:27:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4185: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12325 >/dev/null 2>/dev/null selfserv_9591 with PID 12325 found at Fri Jan 8 04:27:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4186: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12325 >/dev/null 2>/dev/null selfserv_9591 with PID 12325 found at Fri Jan 8 04:27:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4187: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12325 >/dev/null 2>/dev/null selfserv_9591 with PID 12325 found at Fri Jan 8 04:27:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4188: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 12325 at Fri Jan 8 04:27:28 EST 2016 kill -USR1 12325 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12325 killed at Fri Jan 8 04:27:28 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:27:28 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:27:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:27:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4189: Waiting for Server - FAILED kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:34 EST 2016 selfserv_9591 with PID 12491 started at Fri Jan 8 04:27:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4190: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4191: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4192: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4193: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4194: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4195: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4196: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4197: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4198: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4199: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4200: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4201: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4202: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4203: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12491 >/dev/null 2>/dev/null selfserv_9591 with PID 12491 found at Fri Jan 8 04:27:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4204: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 12491 at Fri Jan 8 04:27:42 EST 2016 kill -USR1 12491 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12491 killed at Fri Jan 8 04:27:43 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:27:43 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:27:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:27:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4205: Waiting for Server - FAILED kill -0 12904 >/dev/null 2>/dev/null selfserv_9591 with PID 12904 found at Fri Jan 8 04:27:49 EST 2016 selfserv_9591 with PID 12904 started at Fri Jan 8 04:27:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4206: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 12904 >/dev/null 2>/dev/null selfserv_9591 with PID 12904 found at Fri Jan 8 04:27:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4207: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12904 >/dev/null 2>/dev/null selfserv_9591 with PID 12904 found at Fri Jan 8 04:27:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4208: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12904 >/dev/null 2>/dev/null selfserv_9591 with PID 12904 found at Fri Jan 8 04:27:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4209: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12904 >/dev/null 2>/dev/null selfserv_9591 with PID 12904 found at Fri Jan 8 04:27:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4210: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 12904 at Fri Jan 8 04:27:51 EST 2016 kill -USR1 12904 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12904 killed at Fri Jan 8 04:27:52 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 04:27:52 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:27:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:27:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4211: Waiting for Server - FAILED kill -0 13070 >/dev/null 2>/dev/null selfserv_9591 with PID 13070 found at Fri Jan 8 04:27:58 EST 2016 selfserv_9591 with PID 13070 started at Fri Jan 8 04:27:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4212: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13070 >/dev/null 2>/dev/null selfserv_9591 with PID 13070 found at Fri Jan 8 04:27:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4213: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13070 >/dev/null 2>/dev/null selfserv_9591 with PID 13070 found at Fri Jan 8 04:27:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4214: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13070 >/dev/null 2>/dev/null selfserv_9591 with PID 13070 found at Fri Jan 8 04:27:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4215: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13070 >/dev/null 2>/dev/null selfserv_9591 with PID 13070 found at Fri Jan 8 04:28:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4216: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 13070 >/dev/null 2>/dev/null selfserv_9591 with PID 13070 found at Fri Jan 8 04:28:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4217: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 13070 >/dev/null 2>/dev/null selfserv_9591 with PID 13070 found at Fri Jan 8 04:28:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4218: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 13070 >/dev/null 2>/dev/null selfserv_9591 with PID 13070 found at Fri Jan 8 04:28:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4219: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 13070 >/dev/null 2>/dev/null selfserv_9591 with PID 13070 found at Fri Jan 8 04:28:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4220: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 13070 >/dev/null 2>/dev/null selfserv_9591 with PID 13070 found at Fri Jan 8 04:28:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4221: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 13070 >/dev/null 2>/dev/null selfserv_9591 with PID 13070 found at Fri Jan 8 04:28:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4222: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 13070 >/dev/null 2>/dev/null selfserv_9591 with PID 13070 found at Fri Jan 8 04:28:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4223: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 13070 >/dev/null 2>/dev/null selfserv_9591 with PID 13070 found at Fri Jan 8 04:28:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4224: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13070 at Fri Jan 8 04:28:05 EST 2016 kill -USR1 13070 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13070 killed at Fri Jan 8 04:28:05 EST 2016 ssl.sh: SSL Client Authentication Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:28:05 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:28:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:28:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4225: Waiting for Server - FAILED kill -0 13483 >/dev/null 2>/dev/null selfserv_9591 with PID 13483 found at Fri Jan 8 04:28:11 EST 2016 selfserv_9591 with PID 13483 started at Fri Jan 8 04:28:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4226: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13483 at Fri Jan 8 04:28:12 EST 2016 kill -USR1 13483 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13483 killed at Fri Jan 8 04:28:12 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:28:12 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:28:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:28:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4227: Waiting for Server - FAILED kill -0 13553 >/dev/null 2>/dev/null selfserv_9591 with PID 13553 found at Fri Jan 8 04:28:18 EST 2016 selfserv_9591 with PID 13553 started at Fri Jan 8 04:28:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4228: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13553 at Fri Jan 8 04:28:19 EST 2016 kill -USR1 13553 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13553 killed at Fri Jan 8 04:28:19 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:28:19 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:28:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:28:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4229: Waiting for Server - FAILED kill -0 13622 >/dev/null 2>/dev/null selfserv_9591 with PID 13622 found at Fri Jan 8 04:28:25 EST 2016 selfserv_9591 with PID 13622 started at Fri Jan 8 04:28:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4230: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13622 at Fri Jan 8 04:28:26 EST 2016 kill -USR1 13622 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13622 killed at Fri Jan 8 04:28:26 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:28:26 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:28:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:28:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4231: Waiting for Server - FAILED kill -0 13697 >/dev/null 2>/dev/null selfserv_9591 with PID 13697 found at Fri Jan 8 04:28:32 EST 2016 selfserv_9591 with PID 13697 started at Fri Jan 8 04:28:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4232: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13697 at Fri Jan 8 04:28:32 EST 2016 kill -USR1 13697 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13697 killed at Fri Jan 8 04:28:33 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:28:33 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:28:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:28:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4233: Waiting for Server - FAILED kill -0 13767 >/dev/null 2>/dev/null selfserv_9591 with PID 13767 found at Fri Jan 8 04:28:39 EST 2016 selfserv_9591 with PID 13767 started at Fri Jan 8 04:28:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4234: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13767 at Fri Jan 8 04:28:39 EST 2016 kill -USR1 13767 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13767 killed at Fri Jan 8 04:28:40 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:28:40 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:28:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:28:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4235: Waiting for Server - FAILED kill -0 13836 >/dev/null 2>/dev/null selfserv_9591 with PID 13836 found at Fri Jan 8 04:28:46 EST 2016 selfserv_9591 with PID 13836 started at Fri Jan 8 04:28:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4236: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13836 at Fri Jan 8 04:28:46 EST 2016 kill -USR1 13836 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13836 killed at Fri Jan 8 04:28:47 EST 2016 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:28:47 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:28:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:28:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4237: Waiting for Server - FAILED kill -0 13911 >/dev/null 2>/dev/null selfserv_9591 with PID 13911 found at Fri Jan 8 04:28:53 EST 2016 selfserv_9591 with PID 13911 started at Fri Jan 8 04:28:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4238: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13911 at Fri Jan 8 04:28:53 EST 2016 kill -USR1 13911 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13911 killed at Fri Jan 8 04:28:54 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:28:54 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:28:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:28:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4239: Waiting for Server - FAILED kill -0 13981 >/dev/null 2>/dev/null selfserv_9591 with PID 13981 found at Fri Jan 8 04:29:00 EST 2016 selfserv_9591 with PID 13981 started at Fri Jan 8 04:29:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4240: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13981 at Fri Jan 8 04:29:00 EST 2016 kill -USR1 13981 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13981 killed at Fri Jan 8 04:29:01 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:29:01 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:29:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:29:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4241: Waiting for Server - FAILED kill -0 14050 >/dev/null 2>/dev/null selfserv_9591 with PID 14050 found at Fri Jan 8 04:29:07 EST 2016 selfserv_9591 with PID 14050 started at Fri Jan 8 04:29:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4242: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14050 at Fri Jan 8 04:29:07 EST 2016 kill -USR1 14050 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14050 killed at Fri Jan 8 04:29:08 EST 2016 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:29:08 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:29:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:29:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4243: Waiting for Server - FAILED kill -0 14125 >/dev/null 2>/dev/null selfserv_9591 with PID 14125 found at Fri Jan 8 04:29:14 EST 2016 selfserv_9591 with PID 14125 started at Fri Jan 8 04:29:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4244: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14125 at Fri Jan 8 04:29:14 EST 2016 kill -USR1 14125 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14125 killed at Fri Jan 8 04:29:15 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:29:15 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:29:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:29:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4245: Waiting for Server - FAILED kill -0 14195 >/dev/null 2>/dev/null selfserv_9591 with PID 14195 found at Fri Jan 8 04:29:21 EST 2016 selfserv_9591 with PID 14195 started at Fri Jan 8 04:29:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4246: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14195 at Fri Jan 8 04:29:21 EST 2016 kill -USR1 14195 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14195 killed at Fri Jan 8 04:29:21 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:29:22 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:29:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:29:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4247: Waiting for Server - FAILED kill -0 14264 >/dev/null 2>/dev/null selfserv_9591 with PID 14264 found at Fri Jan 8 04:29:27 EST 2016 selfserv_9591 with PID 14264 started at Fri Jan 8 04:29:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4248: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14264 at Fri Jan 8 04:29:28 EST 2016 kill -USR1 14264 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14264 killed at Fri Jan 8 04:29:28 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 04:29:29 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:29:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:29:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4249: Waiting for Server - FAILED kill -0 14339 >/dev/null 2>/dev/null selfserv_9591 with PID 14339 found at Fri Jan 8 04:29:34 EST 2016 selfserv_9591 with PID 14339 started at Fri Jan 8 04:29:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4250: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14339 at Fri Jan 8 04:29:35 EST 2016 kill -USR1 14339 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14339 killed at Fri Jan 8 04:29:35 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:29:35 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:29:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:29:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4251: Waiting for Server - FAILED kill -0 14409 >/dev/null 2>/dev/null selfserv_9591 with PID 14409 found at Fri Jan 8 04:29:41 EST 2016 selfserv_9591 with PID 14409 started at Fri Jan 8 04:29:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4252: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14409 at Fri Jan 8 04:29:42 EST 2016 kill -USR1 14409 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14409 killed at Fri Jan 8 04:29:42 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:29:42 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:29:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:29:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4253: Waiting for Server - FAILED kill -0 14479 >/dev/null 2>/dev/null selfserv_9591 with PID 14479 found at Fri Jan 8 04:29:48 EST 2016 selfserv_9591 with PID 14479 started at Fri Jan 8 04:29:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4254: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14479 at Fri Jan 8 04:29:49 EST 2016 kill -USR1 14479 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14479 killed at Fri Jan 8 04:29:49 EST 2016 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:29:49 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:29:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:29:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4255: Waiting for Server - FAILED kill -0 14567 >/dev/null 2>/dev/null selfserv_9591 with PID 14567 found at Fri Jan 8 04:29:55 EST 2016 selfserv_9591 with PID 14567 started at Fri Jan 8 04:29:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4256: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14567 at Fri Jan 8 04:29:56 EST 2016 kill -USR1 14567 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14567 killed at Fri Jan 8 04:29:56 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:29:56 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:29:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:30:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4257: Waiting for Server - FAILED kill -0 14637 >/dev/null 2>/dev/null selfserv_9591 with PID 14637 found at Fri Jan 8 04:30:02 EST 2016 selfserv_9591 with PID 14637 started at Fri Jan 8 04:30:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4258: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14637 at Fri Jan 8 04:30:03 EST 2016 kill -USR1 14637 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14637 killed at Fri Jan 8 04:30:03 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:30:03 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:30:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:30:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4259: Waiting for Server - FAILED kill -0 14710 >/dev/null 2>/dev/null selfserv_9591 with PID 14710 found at Fri Jan 8 04:30:09 EST 2016 selfserv_9591 with PID 14710 started at Fri Jan 8 04:30:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4260: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14710 at Fri Jan 8 04:30:10 EST 2016 kill -USR1 14710 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14710 killed at Fri Jan 8 04:30:10 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:30:10 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:30:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:30:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4261: Waiting for Server - FAILED kill -0 14779 >/dev/null 2>/dev/null selfserv_9591 with PID 14779 found at Fri Jan 8 04:30:16 EST 2016 selfserv_9591 with PID 14779 started at Fri Jan 8 04:30:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4262: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14779 at Fri Jan 8 04:30:17 EST 2016 kill -USR1 14779 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14779 killed at Fri Jan 8 04:30:17 EST 2016 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:30:17 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:30:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:30:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4263: Waiting for Server - FAILED kill -0 14853 >/dev/null 2>/dev/null selfserv_9591 with PID 14853 found at Fri Jan 8 04:30:23 EST 2016 selfserv_9591 with PID 14853 started at Fri Jan 8 04:30:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4264: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14853 at Fri Jan 8 04:30:24 EST 2016 kill -USR1 14853 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14853 killed at Fri Jan 8 04:30:24 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:30:24 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:30:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:30:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4265: Waiting for Server - FAILED kill -0 14922 >/dev/null 2>/dev/null selfserv_9591 with PID 14922 found at Fri Jan 8 04:30:30 EST 2016 selfserv_9591 with PID 14922 started at Fri Jan 8 04:30:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4266: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14922 at Fri Jan 8 04:30:30 EST 2016 kill -USR1 14922 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14922 killed at Fri Jan 8 04:30:31 EST 2016 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:30:31 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:30:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:30:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4267: Waiting for Server - FAILED kill -0 14996 >/dev/null 2>/dev/null selfserv_9591 with PID 14996 found at Fri Jan 8 04:30:37 EST 2016 selfserv_9591 with PID 14996 started at Fri Jan 8 04:30:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4268: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14996 at Fri Jan 8 04:30:37 EST 2016 kill -USR1 14996 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14996 killed at Fri Jan 8 04:30:38 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:30:38 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:30:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:30:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4269: Waiting for Server - FAILED kill -0 15065 >/dev/null 2>/dev/null selfserv_9591 with PID 15065 found at Fri Jan 8 04:30:44 EST 2016 selfserv_9591 with PID 15065 started at Fri Jan 8 04:30:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4270: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15065 at Fri Jan 8 04:30:44 EST 2016 kill -USR1 15065 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15065 killed at Fri Jan 8 04:30:45 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 04:30:45 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:30:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:30:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4271: Waiting for Server - FAILED kill -0 15138 >/dev/null 2>/dev/null selfserv_9591 with PID 15138 found at Fri Jan 8 04:30:51 EST 2016 selfserv_9591 with PID 15138 started at Fri Jan 8 04:30:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4272: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 15138 at Fri Jan 8 04:30:51 EST 2016 kill -USR1 15138 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15138 killed at Fri Jan 8 04:30:52 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:30:52 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:30:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:30:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4273: Waiting for Server - FAILED kill -0 15208 >/dev/null 2>/dev/null selfserv_9591 with PID 15208 found at Fri Jan 8 04:30:58 EST 2016 selfserv_9591 with PID 15208 started at Fri Jan 8 04:30:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4274: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15208 at Fri Jan 8 04:30:58 EST 2016 kill -USR1 15208 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15208 killed at Fri Jan 8 04:30:59 EST 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping Form is subject to the terms of the Mozilla Public (non-FIPS only) ssl.sh: skipping If a copy of the MPL was not distributed with this (non-FIPS only) ssl.sh: skipping obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:30:59 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:30:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:31:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4275: Waiting for Server - FAILED kill -0 15409 >/dev/null 2>/dev/null selfserv_9591 with PID 15409 found at Fri Jan 8 04:31:05 EST 2016 selfserv_9591 with PID 15409 started at Fri Jan 8 04:31:05 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 04:31:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:31:06 EST 2016 ssl.sh: #4276: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15409 at Fri Jan 8 04:31:06 EST 2016 kill -USR1 15409 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15409 killed at Fri Jan 8 04:31:06 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:31:06 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:31:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:31:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4277: Waiting for Server - FAILED kill -0 15488 >/dev/null 2>/dev/null selfserv_9591 with PID 15488 found at Fri Jan 8 04:31:12 EST 2016 selfserv_9591 with PID 15488 started at Fri Jan 8 04:31:12 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 04:31:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:31:13 EST 2016 ssl.sh: #4278: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15488 at Fri Jan 8 04:31:13 EST 2016 kill -USR1 15488 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15488 killed at Fri Jan 8 04:31:13 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:31:13 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:31:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:31:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4279: Waiting for Server - FAILED kill -0 15568 >/dev/null 2>/dev/null selfserv_9591 with PID 15568 found at Fri Jan 8 04:31:19 EST 2016 selfserv_9591 with PID 15568 started at Fri Jan 8 04:31:19 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:31:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:31:20 EST 2016 ssl.sh: #4280: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15568 at Fri Jan 8 04:31:20 EST 2016 kill -USR1 15568 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15568 killed at Fri Jan 8 04:31:20 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:31:21 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:31:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:31:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4281: Waiting for Server - FAILED kill -0 15647 >/dev/null 2>/dev/null selfserv_9591 with PID 15647 found at Fri Jan 8 04:31:26 EST 2016 selfserv_9591 with PID 15647 started at Fri Jan 8 04:31:26 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 04:31:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:31:27 EST 2016 ssl.sh: #4282: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 15647 at Fri Jan 8 04:31:27 EST 2016 kill -USR1 15647 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15647 killed at Fri Jan 8 04:31:27 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 04:31:28 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:31:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:31:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4283: Waiting for Server - FAILED kill -0 15726 >/dev/null 2>/dev/null selfserv_9591 with PID 15726 found at Fri Jan 8 04:31:33 EST 2016 selfserv_9591 with PID 15726 started at Fri Jan 8 04:31:33 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 04:31:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:31:34 EST 2016 ssl.sh: #4284: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 15726 at Fri Jan 8 04:31:34 EST 2016 kill -USR1 15726 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15726 killed at Fri Jan 8 04:31:34 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:31:35 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:31:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:31:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4285: Waiting for Server - FAILED kill -0 15806 >/dev/null 2>/dev/null selfserv_9591 with PID 15806 found at Fri Jan 8 04:31:41 EST 2016 selfserv_9591 with PID 15806 started at Fri Jan 8 04:31:41 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 04:31:41 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:31:41 EST 2016 ssl.sh: #4286: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15806 at Fri Jan 8 04:31:41 EST 2016 kill -USR1 15806 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15806 killed at Fri Jan 8 04:31:42 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 04:31:42 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:31:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:31:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4287: Waiting for Server - FAILED kill -0 15886 >/dev/null 2>/dev/null selfserv_9591 with PID 15886 found at Fri Jan 8 04:31:48 EST 2016 selfserv_9591 with PID 15886 started at Fri Jan 8 04:31:48 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 04:31:48 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:31:48 EST 2016 ssl.sh: #4288: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15886 at Fri Jan 8 04:31:48 EST 2016 kill -USR1 15886 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15886 killed at Fri Jan 8 04:31:49 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA256 (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 GCM (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:31:49 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:31:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:31:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4289: Waiting for Server - FAILED kill -0 16037 >/dev/null 2>/dev/null selfserv_9591 with PID 16037 found at Fri Jan 8 04:31:55 EST 2016 selfserv_9591 with PID 16037 started at Fri Jan 8 04:31:55 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:31:55 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:31:55 EST 2016 ssl.sh: #4290: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16037 at Fri Jan 8 04:31:56 EST 2016 kill -USR1 16037 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16037 killed at Fri Jan 8 04:31:56 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:31:56 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:31:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:32:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4291: Waiting for Server - FAILED kill -0 16117 >/dev/null 2>/dev/null selfserv_9591 with PID 16117 found at Fri Jan 8 04:32:02 EST 2016 selfserv_9591 with PID 16117 started at Fri Jan 8 04:32:02 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:32:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:32:02 EST 2016 ssl.sh: #4292: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 16117 at Fri Jan 8 04:32:03 EST 2016 kill -USR1 16117 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16117 killed at Fri Jan 8 04:32:03 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:32:03 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:32:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:32:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4293: Waiting for Server - FAILED kill -0 16196 >/dev/null 2>/dev/null selfserv_9591 with PID 16196 found at Fri Jan 8 04:32:09 EST 2016 selfserv_9591 with PID 16196 started at Fri Jan 8 04:32:09 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:32:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:32:10 EST 2016 ssl.sh: #4294: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16196 at Fri Jan 8 04:32:10 EST 2016 kill -USR1 16196 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16196 killed at Fri Jan 8 04:32:10 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:32:10 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:32:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:32:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4295: Waiting for Server - FAILED kill -0 16275 >/dev/null 2>/dev/null selfserv_9591 with PID 16275 found at Fri Jan 8 04:32:16 EST 2016 selfserv_9591 with PID 16275 started at Fri Jan 8 04:32:16 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 04:32:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:32:17 EST 2016 ssl.sh: #4296: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16275 at Fri Jan 8 04:32:17 EST 2016 kill -USR1 16275 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16275 killed at Fri Jan 8 04:32:17 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9591 starting at Fri Jan 8 04:32:17 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:32:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:32:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4297: Waiting for Server - FAILED kill -0 16355 >/dev/null 2>/dev/null selfserv_9591 with PID 16355 found at Fri Jan 8 04:32:23 EST 2016 selfserv_9591 with PID 16355 started at Fri Jan 8 04:32:23 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 04:32:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:32:24 EST 2016 ssl.sh: #4298: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 16355 at Fri Jan 8 04:32:24 EST 2016 kill -USR1 16355 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16355 killed at Fri Jan 8 04:32:24 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:32:24 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:32:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:32:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4299: Waiting for Server - FAILED kill -0 16434 >/dev/null 2>/dev/null selfserv_9591 with PID 16434 found at Fri Jan 8 04:32:30 EST 2016 selfserv_9591 with PID 16434 started at Fri Jan 8 04:32:30 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 04:32:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:32:31 EST 2016 ssl.sh: #4300: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16434 at Fri Jan 8 04:32:31 EST 2016 kill -USR1 16434 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16434 killed at Fri Jan 8 04:32:31 EST 2016 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:_-c_1000_-C_:0038_-u Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (session ticket) (non-FIPS only) ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:_-c_1000_-C_:006A Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (non-FIPS only) ssl.sh: skipping reuse test, once the session cache with DHE_DSS is working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:32:32 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:32:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:32:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4301: Waiting for Server - FAILED kill -0 16585 >/dev/null 2>/dev/null selfserv_9591 with PID 16585 found at Fri Jan 8 04:32:38 EST 2016 selfserv_9591 with PID 16585 started at Fri Jan 8 04:32:38 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 04:32:38 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:32:38 EST 2016 ssl.sh: #4302: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16585 at Fri Jan 8 04:32:38 EST 2016 kill -USR1 16585 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16585 killed at Fri Jan 8 04:32:39 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9591 starting at Fri Jan 8 04:32:39 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:32:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:32:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4303: Waiting for Server - FAILED kill -0 16665 >/dev/null 2>/dev/null selfserv_9591 with PID 16665 found at Fri Jan 8 04:32:45 EST 2016 selfserv_9591 with PID 16665 started at Fri Jan 8 04:32:45 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 04:32:45 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:32:45 EST 2016 ssl.sh: #4304: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 16665 at Fri Jan 8 04:32:45 EST 2016 kill -USR1 16665 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16665 killed at Fri Jan 8 04:32:46 EST 2016 ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 04:32:46 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 04:32:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 04:32:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4305: Waiting for Server - FAILED kill -0 16755 >/dev/null 2>/dev/null selfserv_9591 with PID 16755 found at Fri Jan 8 04:32:52 EST 2016 selfserv_9591 with PID 16755 started at Fri Jan 8 04:32:52 EST 2016 strsclnt -q -p 9591 -d ../ext_client -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 04:32:52 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 04:32:52 EST 2016 ssl.sh: #4306: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16755 at Fri Jan 8 04:32:52 EST 2016 kill -USR1 16755 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16755 killed at Fri Jan 8 04:32:53 EST 2016 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -fips false -force FIPS mode disabled. ssl.sh: #4307: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -list ssl.sh: #4308: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #4309: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -fips false -force FIPS mode disabled. ssl.sh: #4310: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -list ssl.sh: #4311: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #4312: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Fri Jan 8 04:32:55 EST 2016 Running tests for ocsp TIMESTAMP ocsp BEGIN: Fri Jan 8 04:32:55 EST 2016 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Fri Jan 8 04:32:55 EST 2016 Running tests for merge TIMESTAMP merge BEGIN: Fri Jan 8 04:32:55 EST 2016 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v3.18586 -t Test2 -f ../tests.pw merge.sh: #4313: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4314: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4315: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4316: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4317: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4318: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:25:41 2016 Not After : Fri Jan 08 07:25:41 2021 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:68:e1:a2:0f:a6:e0:57:83:cb:ca:7b:1e:1e:07:02: 10:60:3d:6e:9b:c2:d2:20:0a:60:c8:65:9e:d9:04:38: 2f:ab:09:2a:54:d8:8e:61:c3:bd:8a:04:79:3e:a5:25: ee:8b:73:d1:f6:b1:16:f9:41:bf:ad:87:01:86:b0:f4: f6:eb:8b:b6:b4:26:5e:9b:36:e4:bb:c4:ed:59:28:32: e8:42:06:5b:c7:64:9b:80:97:dc:f6:2f:15:a2:5a:64: 48:9e:a6:9b:de:71:8b:14:aa:1b:0d:ce:4c:18:89:f8: 0e:28:4a:91:e7:c5:ab:e0:30:d9:fc:a2:59:9d:de:5d: d9:d3:80:05:49:d0:53:08:98:3b:13:25:41:1b:2b:17: 05:78:f6:51:bc:20:74:f1:5f:f6:77:7a:6b:57:b9:cf: 9c:8f:17:a1:57:36:ea:c8:34:86:64:d6:ad:81:f7:30: b0:e4:ac:52:b2:b9:68:c0:fe:2c:ff:86:ea:12:45:23: 92:7c:4f:c7:8b:41:da:62:04:87:e2:38:5b:3c:08:72: af:e8:ae:f1:f0:c5:45:44:4c:7d:3d:d5:3c:3a:ad:78: c4:c8:68:7d:96:d2:c0:00:0f:a4:b8:32:ca:e0:4c:20: 3e:a4:35:e5:bd:bc:ee:09:73:57:58:56:d7:28:fb:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:df:74:d5:5c:f3:5f:d7:56:56:e1:0d:88:f6:38:32: e7:06:03:aa:b5:db:28:ae:91:99:13:e6:19:d4:7b:91: 26:7f:29:48:73:01:db:90:6c:a5:5e:83:47:8c:eb:8b: b7:de:c1:62:e7:0e:95:c5:12:e5:c5:08:15:4a:14:1e: 9c:36:bc:c4:ca:ff:e7:3e:7c:9e:fe:a9:f5:a4:3a:6b: 76:8d:01:72:22:07:f2:62:09:36:08:47:12:92:71:11: 29:8f:92:e0:d7:71:da:1c:95:0b:cc:3b:d2:00:ae:a4: a7:ac:3c:cc:ed:20:75:ec:6d:ab:6d:3e:74:89:ab:22: 30:a1:38:7a:c4:10:9b:18:46:b1:27:37:b0:75:65:ae: 30:a0:11:a3:06:0c:e4:68:b7:c0:d5:19:ed:ba:6e:5b: f5:03:6d:91:b6:22:7c:19:88:35:27:99:51:2c:7e:db: 3f:39:0c:53:19:64:8c:32:79:46:00:e0:df:9c:06:ed: 55:8f:ea:06:7a:92:58:d7:6b:4a:7c:93:a4:42:a0:45: 2a:f2:0b:d2:ec:37:8b:6c:05:de:04:c9:7a:78:fc:c7: e4:e9:35:e3:94:11:be:ea:c2:86:ea:d2:08:6b:1f:d4: e7:bd:23:88:ac:33:42:15:aa:46:40:56:49:4e:89:4f Fingerprint (SHA-256): AD:2A:2A:73:3F:70:6C:76:E1:43:1F:B3:FD:40:73:F4:63:DC:95:C7:13:03:99:3B:BA:D7:9A:B5:4A:70:F7:7F Fingerprint (SHA1): F9:AB:84:C6:A1:E3:A6:13:60:CE:34:42:D1:4F:60:7A:A0:8F:D3:3A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #4319: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:26:04 2016 Not After : Fri Jan 08 07:26:04 2021 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e7:aa:dd:e9:e2:9b:0c:6c:45:d5:ee:2e:b5:0b:d3: 75:ab:29:01:91:49:ba:13:bf:d9:13:9b:b1:ec:33:ac: 84:7e:da:27:8f:3f:74:ca:a8:56:2f:52:57:49:09:90: f6:ba:f5:c3:6f:51:52:53:84:cc:e6:00:27:2e:55:60: 82:3f:58:c3:d2:38:46:a9:86:0f:89:1c:32:61:7d:2e: 6e:e8:1f:c5:af:54:18:8b:bc:65:26:35:7c:aa:d7:a9: d1:7c:7b:d8:77:47:ca:73:65:46:8a:99:86:51:f3:14: de:02:1b:40:39:8e:9b:97:9e:7d:06:bb:4f:83:2a:4f: ee:3a:e8:93:5c:2b:6f:20:77:ed:ea:d3:0a:22:41:ac: 85:ef:59:e4:4d:c9:21:76:45:2a:6f:a5:b7:ba:4a:55: 1e:00:67:9d:eb:0a:f9:3c:2b:48:13:ef:b1:a5:ee:bb: 77:6f:a2:8e:9c:ee:8d:87:a4:25:97:7e:01:19:e2:66: b0:20:aa:8d:f2:79:ee:03:2f:1a:28:ca:39:54:1c:76: 3f:db:d2:02:3d:94:e9:49:a6:a1:80:fe:77:26:b3:32: de:9c:b5:ae:dc:08:b8:8e:67:55:e5:e4:d3:fb:cb:2e: 8f:2c:1c:58:34:97:1f:77:e9:d2:5b:b4:51:ef:f0:41 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:72:81:11:ff:70:8b:af:26:00:20:55:b6:b0:d6:69: c3:7b:6a:b9:c5:6c:d3:6c:03:f3:85:4e:b0:4c:7e:9a: 34:7e:f0:85:a2:b4:c4:cf:09:5a:06:36:ef:7c:bc:02: ef:3f:b5:df:72:4a:66:0a:54:23:da:f1:1c:90:6b:23: 8f:dc:cf:9a:b4:57:5e:4d:62:98:91:e2:3d:f3:40:c9: 7b:b6:fc:7c:db:22:7b:db:5e:e5:0b:21:e0:05:86:dc: 90:0a:4a:50:bf:93:0f:59:12:6a:6d:9c:eb:33:e8:1e: 08:8b:8e:74:21:7b:a2:79:6d:17:4e:4b:45:03:79:2e: a7:84:99:21:93:c5:24:94:bd:42:30:f0:97:ab:0c:cf: f1:5c:c0:a9:69:92:d8:80:68:71:c8:d6:07:0e:5d:9a: f2:32:45:56:91:18:04:1a:b3:79:06:af:74:af:f8:9f: 8f:57:33:c4:0b:68:e9:0c:4c:56:7f:29:00:a4:c8:2d: c1:b7:c6:0f:a5:f2:4a:d0:8e:ec:7d:62:5b:eb:25:32: 5e:58:6b:2c:d0:2f:32:86:d1:2b:c2:d6:b3:76:6b:f9: 6e:86:46:6f:53:0f:00:a3:08:90:4e:fd:03:57:42:4c: 48:4c:34:94:d0:30:72:85:31:95:0b:47:d0:4b:c7:0a Fingerprint (SHA-256): 67:7D:05:60:5A:6D:97:4F:70:5B:DC:6A:D6:DA:1F:67:08:FF:72:5E:9D:49:72:69:3C:CB:62:49:34:78:80:CC Fingerprint (SHA1): E4:80:06:49:74:69:15:EB:D2:15:24:B0:B5:E7:7E:E1:5F:12:28:CE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #4320: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4321: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice-ec u,u,u Dave u,u,u localhost.localdomain-dsamixed ,, serverCA-dsa C,C,C chain-2-clientCA-ec ,, Alice #1 ,, Dave-dsa ,, localhost.localdomain-ecmixed ,, localhost-sni.localdomain-dsamixed ,, Alice #99 ,, Alice-dsamixed u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, localhost.localdomain u,u,u localhost-sni.localdomain-ecmixed ,, clientCA T,C,C Alice #3 ,, TestCA CT,C,C TestCA-ec CT,C,C Alice-ecmixed u,u,u Dave-ecmixed ,, localhost.localdomain-dsa ,, localhost-sni.localdomain u,u,u localhost-sni.localdomain-ec ,, ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-ec ,, serverCA-ec C,C,C clientCA-dsa T,C,C chain-1-clientCA ,, chain-1-clientCA-ec ,, Alice #2 ,, Alice #4 ,, Alice u,u,u Dave-ec ,, localhost-sni.localdomain-dsa ,, ExtendedSSLUser-dsa ,, ExtendedSSLUser-ecmixed ,, chain-1-clientCA-dsa ,, chain-2-clientCA ,, Alice #100 ,, Alice-dsa u,u,u ExtendedSSLUser-dsamixed ,, chain-2-clientCA-dsa ,, bob@bogus.com ,, Dave-dsamixed ,, localhost.localdomain-ec ,, clientCA-ec T,C,C CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v3.18586 -t Test2 -f ../tests.pw merge.sh: #4322: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v1.18586 -t Test1 -f ../tests.pw merge.sh: #4323: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #4324: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #4325: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #4326: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Fri Jan 08 07:28:26 2016 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 07:13:13 2016 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Fri Jan 08 07:28:19 2016 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #4327: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Fri Jan 8 04:33:08 EST 2016 Running tests for pkits TIMESTAMP pkits BEGIN: Fri Jan 8 04:33:08 EST 2016 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Fri Jan 8 04:33:08 EST 2016 Running tests for chains TIMESTAMP chains BEGIN: Fri Jan 8 04:33:08 EST 2016 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #4328: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043309 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4329: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #4330: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4331: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #4332: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4333: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4334: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4335: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4336: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #4337: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4338: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4339: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4340: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4341: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #4342: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4343: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9602 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4344: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4345: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4346: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #4347: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4348: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4349: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4350: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #4351: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4352: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4353: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4354: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #4355: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4356: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4357: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4358: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #4359: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4360: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4361: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4362: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #4363: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4364: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9602 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4365: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4366: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #4367: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4368: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4369: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4370: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #4371: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4372: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4373: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4374: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #4375: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4376: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9602 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4377: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4378: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #4379: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4380: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4381: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4382: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #4383: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4384: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4385: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4386: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #4387: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4388: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9602 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4389: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4390: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160108093556Z nextupdate=20170108093556Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Jan 08 09:35:56 2016 Next Update: Sun Jan 08 09:35:56 2017 CRL Extensions: chains.sh: #4391: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160108093557Z addcert 2 20160108093557Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Jan 08 09:35:57 2016 Next Update: Sun Jan 08 09:35:56 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 09:35:57 2016 CRL Extensions: chains.sh: #4392: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108093558Z nextupdate=20170108093558Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 09:35:58 2016 Next Update: Sun Jan 08 09:35:58 2017 CRL Extensions: chains.sh: #4393: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108093559Z addcert 2 20160108093559Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 09:35:59 2016 Next Update: Sun Jan 08 09:35:58 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 09:35:59 2016 CRL Extensions: chains.sh: #4394: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108093600Z addcert 4 20160108093600Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 09:36:00 2016 Next Update: Sun Jan 08 09:35:58 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 09:35:59 2016 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Fri Jan 08 09:36:00 2016 CRL Extensions: chains.sh: #4395: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108093601Z nextupdate=20170108093601Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 09:36:01 2016 Next Update: Sun Jan 08 09:36:01 2017 CRL Extensions: chains.sh: #4396: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108093602Z addcert 2 20160108093602Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 09:36:02 2016 Next Update: Sun Jan 08 09:36:01 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 09:36:02 2016 CRL Extensions: chains.sh: #4397: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108093603Z addcert 3 20160108093603Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 09:36:03 2016 Next Update: Sun Jan 08 09:36:01 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 09:36:02 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Jan 08 09:36:03 2016 CRL Extensions: chains.sh: #4398: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108093604Z nextupdate=20170108093604Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 09:36:04 2016 Next Update: Sun Jan 08 09:36:04 2017 CRL Extensions: chains.sh: #4399: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108093605Z addcert 2 20160108093605Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 09:36:05 2016 Next Update: Sun Jan 08 09:36:04 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 09:36:05 2016 CRL Extensions: chains.sh: #4400: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108093606Z addcert 3 20160108093606Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 09:36:06 2016 Next Update: Sun Jan 08 09:36:04 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 09:36:05 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Jan 08 09:36:06 2016 CRL Extensions: chains.sh: #4401: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #4402: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #4403: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #4404: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #4405: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #4406: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #4407: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #4408: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #4409: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #4410: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #4411: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #4412: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #4413: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #4414: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #4415: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #4416: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #4417: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #4418: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #4419: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #4420: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #4421: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #4422: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #4423: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #4424: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #4425: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Fri Jan 8 04:36:20 EST 2016 httpserv -D -p 9601 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/aiahttp/http_pid.18586 & trying to connect to httpserv at Fri Jan 8 04:36:20 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 04:36:25 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #4426: Waiting for Server - FAILED kill -0 18453 >/dev/null 2>/dev/null httpserv with PID 18453 found at Fri Jan 8 04:36:26 EST 2016 httpserv with PID 18453 started at Fri Jan 8 04:36:26 EST 2016 tstclnt -h localhost.localdomain -p 9601 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #4427: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 18453 at Fri Jan 8 04:36:27 EST 2016 kill -USR1 18453 httpserv: normal termination httpserv -b -p 9601 2>/dev/null; httpserv with PID 18453 killed at Fri Jan 8 04:36:28 EST 2016 httpserv starting at Fri Jan 8 04:36:28 EST 2016 httpserv -D -p 9601 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/aiahttp/http_pid.18586 & trying to connect to httpserv at Fri Jan 8 04:36:28 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 04:36:33 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #4428: Waiting for Server - FAILED kill -0 18539 >/dev/null 2>/dev/null httpserv with PID 18539 found at Fri Jan 8 04:36:34 EST 2016 httpserv with PID 18539 started at Fri Jan 8 04:36:34 EST 2016 tstclnt -h localhost.localdomain -p 9601 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #4429: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 18539 at Fri Jan 8 04:36:35 EST 2016 kill -USR1 18539 httpserv: normal termination httpserv -b -p 9601 2>/dev/null; httpserv with PID 18539 killed at Fri Jan 8 04:36:35 EST 2016 httpserv starting at Fri Jan 8 04:36:36 EST 2016 httpserv -D -p 9601 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/aiahttp/http_pid.18586 & trying to connect to httpserv at Fri Jan 8 04:36:36 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 04:36:41 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #4430: Waiting for Server - FAILED kill -0 18626 >/dev/null 2>/dev/null httpserv with PID 18626 found at Fri Jan 8 04:36:41 EST 2016 httpserv with PID 18626 started at Fri Jan 8 04:36:41 EST 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4431: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043310 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4432: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4433: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4434: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043311 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4435: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4436: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4437: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4438: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108043312 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4439: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4440: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108043313 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4441: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4442: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #4443: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4444: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4445: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 108043314 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4446: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4447: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4448: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #4449: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #4450: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043311 (0x6709c2f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 09:37:04 2016 Not After : Fri Jan 08 09:37:04 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:13:57:11:09:c5:e4:47:64:47:5b:f0:da:1e:f3:b9: 91:ee:7f:95:98:96:41:1a:54:7a:df:14:35:55:d3:52: 1d:52:84:4a:01:0e:76:16:d7:3e:8c:5c:08:a8:b1:c4: b9:40:28:25:6e:ed:50:33:1d:35:74:17:7b:1b:66:57: 07:04:82:0c:86:6c:9a:74:6b:70:49:e4:ed:76:ad:fb: e1:be:70:5a:a1:1e:7c:4d:08:4a:d9:2d:9c:9d:d3:7e: 00:70:cf:04:9f:e5:23:46:81:04:cb:93:81:75:31:30: 09:6c:85:16:a2:a5:b9:06:0c:db:9b:c1:0b:68:ba:90: a6:f2:28:df:03:e9:43:74:51:09:7c:e7:af:ef:80:55: c6:80:3d:19:f2:fe:6f:a3:0d:e9:ed:1d:f9:c6:9f:d5: 44:5e:49:da:4a:ae:a6:d6:36:b0:30:b8:d8:8e:6e:1b: 22:a5:40:f4:a6:a1:45:48:ad:ec:a1:59:fb:23:ac:3d: b1:47:2f:07:04:6b:66:32:28:d9:e5:ac:55:99:6b:a9: 8c:a4:33:d9:fe:da:52:22:a3:c3:86:ee:17:1a:89:bf: b8:09:92:58:8a:0a:45:43:07:42:d8:f0:26:4f:82:be: 4c:5a:fd:a4:51:bc:8f:50:4c:6d:a1:c1:c9:c4:33:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:cd:96:71:ad:aa:52:ee:f5:68:4b:21:30:03:f1:80: b9:1e:9b:fa:4c:61:e4:79:15:74:fc:4a:c8:0f:37:86: c1:cb:d4:cf:a1:f2:54:d6:f7:21:3b:40:f0:ae:c2:fb: ea:e4:8c:8d:65:9f:f8:f0:2f:60:39:ff:28:2b:b2:76: b3:15:cf:74:dc:8a:65:0f:c1:65:3d:45:de:31:2f:aa: 49:f7:b4:13:fd:7d:d5:55:9e:5e:b5:5b:c8:03:84:bc: ff:c4:b2:c3:ff:93:1b:b8:5d:53:7e:e2:74:ae:fb:40: 49:f8:91:51:cb:7d:c7:e1:c5:c5:56:61:0d:ef:ea:dc: ea:28:aa:c4:b8:b4:af:a4:ce:d8:0b:ca:00:b9:e5:54: 1b:d6:28:c0:74:3f:b1:82:4a:79:19:b8:c9:6c:10:97: 53:23:5e:3e:63:4f:67:5c:11:07:5e:e9:02:50:64:84: 94:4d:1f:f6:02:56:7f:08:d8:88:c3:e2:7b:18:ac:b4: 85:12:76:a1:4f:3e:0a:0b:00:16:7d:0c:03:96:9e:cc: 82:18:88:86:ca:e8:dd:a0:10:ff:3a:13:38:c4:34:42: 0a:8f:43:53:ca:e9:4c:20:2f:18:98:d8:f6:15:a9:c0: 4c:88:d5:6d:2b:a4:06:44:8b:33:84:18:9f:af:a3:6a Fingerprint (SHA-256): 2A:7B:D0:56:A9:C0:DF:8F:20:91:EA:5A:18:00:F4:5C:01:CA:93:73:23:7A:4E:57:9A:FD:AE:AE:5E:6C:CF:00 Fingerprint (SHA1): B5:8C:A3:96:BD:BE:37:B1:1D:11:2A:39:70:C5:F3:19:3F:A8:10:2D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4451: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043310 (0x6709c2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 09:36:51 2016 Not After : Fri Jan 08 09:36:51 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:d8:c8:7c:36:9b:6e:0f:41:f9:5b:e5:82:02:ea:ec: 1e:fe:97:fe:6f:4e:04:c7:e5:e3:cf:58:09:20:68:61: 42:9e:b9:73:07:0d:ea:68:aa:9e:24:97:40:54:39:60: 46:2d:0c:ac:30:0e:ce:a0:8d:80:8f:de:fb:74:11:44: 61:f7:bc:d3:6d:38:98:4b:84:40:dd:43:fd:55:fc:d7: f6:26:2f:63:77:d7:68:d0:fb:30:2b:98:90:f4:ab:58: cb:06:06:78:11:a3:93:a1:2c:d8:72:fb:47:c5:7b:9c: 1a:70:cf:85:fe:84:90:64:67:c1:4d:db:af:6d:0a:69: be:42:89:09:00:4f:cc:24:39:69:16:34:f1:65:1a:62: 58:a6:9f:e5:5d:d1:ca:4c:fe:31:cf:10:77:1e:f3:21: d5:2a:88:3f:47:be:91:ed:fe:57:45:93:4f:10:99:4b: 8d:1a:2e:92:c1:56:e0:ec:79:7b:de:53:78:e4:43:9a: 65:d8:bb:85:61:77:79:9e:bf:09:79:58:dc:cb:c4:0d: de:8d:07:88:f2:48:fb:cc:d3:16:02:54:ee:d9:b9:1f: 2e:73:c7:a3:3c:5a:f9:34:aa:31:26:47:cd:d3:85:89: 78:f3:1b:0a:c1:9d:49:cd:f4:0a:39:b3:ec:9c:d7:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:26:64:1a:00:4e:ed:d3:b3:65:80:38:32:20:76:a2: 11:49:36:9e:61:4a:6a:62:3f:55:a5:7c:8f:ab:55:c6: bb:25:ad:a6:5e:72:92:e9:e7:97:93:02:a0:87:d3:85: e9:7b:66:f1:78:39:be:08:26:05:42:45:7f:a5:f7:df: b0:f2:66:46:04:e7:7f:00:6e:fa:a5:58:0d:67:eb:f8: 27:8e:70:56:a2:d2:16:31:f3:fa:45:6f:e5:66:a8:5f: e1:ae:cf:3b:3b:17:19:aa:a6:ed:eb:36:e5:c6:f7:16: f6:b6:24:a0:5d:29:93:f4:89:c5:32:76:c5:9f:3f:b2: e7:d7:d6:00:11:01:1e:e4:b3:00:c2:eb:f0:fd:f7:ff: c1:d8:af:db:9b:cb:1e:94:5f:55:74:ea:d1:22:d3:f9: 78:1c:c1:d6:ff:15:e5:e9:a3:18:3b:01:56:73:f7:76: 41:e6:c2:bd:17:18:d6:33:c1:ba:00:07:40:69:fc:2e: 4c:10:39:c3:fd:af:b3:fc:e4:d2:12:a2:c7:c6:f0:7f: 1f:db:bd:4a:9c:49:2e:e9:e6:48:bc:0f:40:a3:30:b5: 9f:e4:95:59:d3:f0:16:39:97:7a:c9:c3:af:ae:84:bb: 92:21:0e:a3:b5:a2:bf:74:94:20:5d:b7:da:7a:5c:1f Fingerprint (SHA-256): 39:EC:7B:7B:C0:67:B4:75:09:E3:20:D9:FC:AB:60:96:9D:A8:F9:ED:31:5E:81:E6:9D:4C:02:30:53:CF:8E:06 Fingerprint (SHA1): F4:71:55:6A:A0:FA:3B:19:14:15:09:F6:6A:58:44:38:74:21:74:E0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4452: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4453: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #4454: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #4455: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043310 (0x6709c2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 09:36:51 2016 Not After : Fri Jan 08 09:36:51 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:d8:c8:7c:36:9b:6e:0f:41:f9:5b:e5:82:02:ea:ec: 1e:fe:97:fe:6f:4e:04:c7:e5:e3:cf:58:09:20:68:61: 42:9e:b9:73:07:0d:ea:68:aa:9e:24:97:40:54:39:60: 46:2d:0c:ac:30:0e:ce:a0:8d:80:8f:de:fb:74:11:44: 61:f7:bc:d3:6d:38:98:4b:84:40:dd:43:fd:55:fc:d7: f6:26:2f:63:77:d7:68:d0:fb:30:2b:98:90:f4:ab:58: cb:06:06:78:11:a3:93:a1:2c:d8:72:fb:47:c5:7b:9c: 1a:70:cf:85:fe:84:90:64:67:c1:4d:db:af:6d:0a:69: be:42:89:09:00:4f:cc:24:39:69:16:34:f1:65:1a:62: 58:a6:9f:e5:5d:d1:ca:4c:fe:31:cf:10:77:1e:f3:21: d5:2a:88:3f:47:be:91:ed:fe:57:45:93:4f:10:99:4b: 8d:1a:2e:92:c1:56:e0:ec:79:7b:de:53:78:e4:43:9a: 65:d8:bb:85:61:77:79:9e:bf:09:79:58:dc:cb:c4:0d: de:8d:07:88:f2:48:fb:cc:d3:16:02:54:ee:d9:b9:1f: 2e:73:c7:a3:3c:5a:f9:34:aa:31:26:47:cd:d3:85:89: 78:f3:1b:0a:c1:9d:49:cd:f4:0a:39:b3:ec:9c:d7:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:26:64:1a:00:4e:ed:d3:b3:65:80:38:32:20:76:a2: 11:49:36:9e:61:4a:6a:62:3f:55:a5:7c:8f:ab:55:c6: bb:25:ad:a6:5e:72:92:e9:e7:97:93:02:a0:87:d3:85: e9:7b:66:f1:78:39:be:08:26:05:42:45:7f:a5:f7:df: b0:f2:66:46:04:e7:7f:00:6e:fa:a5:58:0d:67:eb:f8: 27:8e:70:56:a2:d2:16:31:f3:fa:45:6f:e5:66:a8:5f: e1:ae:cf:3b:3b:17:19:aa:a6:ed:eb:36:e5:c6:f7:16: f6:b6:24:a0:5d:29:93:f4:89:c5:32:76:c5:9f:3f:b2: e7:d7:d6:00:11:01:1e:e4:b3:00:c2:eb:f0:fd:f7:ff: c1:d8:af:db:9b:cb:1e:94:5f:55:74:ea:d1:22:d3:f9: 78:1c:c1:d6:ff:15:e5:e9:a3:18:3b:01:56:73:f7:76: 41:e6:c2:bd:17:18:d6:33:c1:ba:00:07:40:69:fc:2e: 4c:10:39:c3:fd:af:b3:fc:e4:d2:12:a2:c7:c6:f0:7f: 1f:db:bd:4a:9c:49:2e:e9:e6:48:bc:0f:40:a3:30:b5: 9f:e4:95:59:d3:f0:16:39:97:7a:c9:c3:af:ae:84:bb: 92:21:0e:a3:b5:a2:bf:74:94:20:5d:b7:da:7a:5c:1f Fingerprint (SHA-256): 39:EC:7B:7B:C0:67:B4:75:09:E3:20:D9:FC:AB:60:96:9D:A8:F9:ED:31:5E:81:E6:9D:4C:02:30:53:CF:8E:06 Fingerprint (SHA1): F4:71:55:6A:A0:FA:3B:19:14:15:09:F6:6A:58:44:38:74:21:74:E0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4456: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043311 (0x6709c2f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 09:37:04 2016 Not After : Fri Jan 08 09:37:04 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:13:57:11:09:c5:e4:47:64:47:5b:f0:da:1e:f3:b9: 91:ee:7f:95:98:96:41:1a:54:7a:df:14:35:55:d3:52: 1d:52:84:4a:01:0e:76:16:d7:3e:8c:5c:08:a8:b1:c4: b9:40:28:25:6e:ed:50:33:1d:35:74:17:7b:1b:66:57: 07:04:82:0c:86:6c:9a:74:6b:70:49:e4:ed:76:ad:fb: e1:be:70:5a:a1:1e:7c:4d:08:4a:d9:2d:9c:9d:d3:7e: 00:70:cf:04:9f:e5:23:46:81:04:cb:93:81:75:31:30: 09:6c:85:16:a2:a5:b9:06:0c:db:9b:c1:0b:68:ba:90: a6:f2:28:df:03:e9:43:74:51:09:7c:e7:af:ef:80:55: c6:80:3d:19:f2:fe:6f:a3:0d:e9:ed:1d:f9:c6:9f:d5: 44:5e:49:da:4a:ae:a6:d6:36:b0:30:b8:d8:8e:6e:1b: 22:a5:40:f4:a6:a1:45:48:ad:ec:a1:59:fb:23:ac:3d: b1:47:2f:07:04:6b:66:32:28:d9:e5:ac:55:99:6b:a9: 8c:a4:33:d9:fe:da:52:22:a3:c3:86:ee:17:1a:89:bf: b8:09:92:58:8a:0a:45:43:07:42:d8:f0:26:4f:82:be: 4c:5a:fd:a4:51:bc:8f:50:4c:6d:a1:c1:c9:c4:33:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:cd:96:71:ad:aa:52:ee:f5:68:4b:21:30:03:f1:80: b9:1e:9b:fa:4c:61:e4:79:15:74:fc:4a:c8:0f:37:86: c1:cb:d4:cf:a1:f2:54:d6:f7:21:3b:40:f0:ae:c2:fb: ea:e4:8c:8d:65:9f:f8:f0:2f:60:39:ff:28:2b:b2:76: b3:15:cf:74:dc:8a:65:0f:c1:65:3d:45:de:31:2f:aa: 49:f7:b4:13:fd:7d:d5:55:9e:5e:b5:5b:c8:03:84:bc: ff:c4:b2:c3:ff:93:1b:b8:5d:53:7e:e2:74:ae:fb:40: 49:f8:91:51:cb:7d:c7:e1:c5:c5:56:61:0d:ef:ea:dc: ea:28:aa:c4:b8:b4:af:a4:ce:d8:0b:ca:00:b9:e5:54: 1b:d6:28:c0:74:3f:b1:82:4a:79:19:b8:c9:6c:10:97: 53:23:5e:3e:63:4f:67:5c:11:07:5e:e9:02:50:64:84: 94:4d:1f:f6:02:56:7f:08:d8:88:c3:e2:7b:18:ac:b4: 85:12:76:a1:4f:3e:0a:0b:00:16:7d:0c:03:96:9e:cc: 82:18:88:86:ca:e8:dd:a0:10:ff:3a:13:38:c4:34:42: 0a:8f:43:53:ca:e9:4c:20:2f:18:98:d8:f6:15:a9:c0: 4c:88:d5:6d:2b:a4:06:44:8b:33:84:18:9f:af:a3:6a Fingerprint (SHA-256): 2A:7B:D0:56:A9:C0:DF:8F:20:91:EA:5A:18:00:F4:5C:01:CA:93:73:23:7A:4E:57:9A:FD:AE:AE:5E:6C:CF:00 Fingerprint (SHA1): B5:8C:A3:96:BD:BE:37:B1:1D:11:2A:39:70:C5:F3:19:3F:A8:10:2D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4457: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #4458: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #4459: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4460: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4461: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4462: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043311 (0x6709c2f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 09:37:04 2016 Not After : Fri Jan 08 09:37:04 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:13:57:11:09:c5:e4:47:64:47:5b:f0:da:1e:f3:b9: 91:ee:7f:95:98:96:41:1a:54:7a:df:14:35:55:d3:52: 1d:52:84:4a:01:0e:76:16:d7:3e:8c:5c:08:a8:b1:c4: b9:40:28:25:6e:ed:50:33:1d:35:74:17:7b:1b:66:57: 07:04:82:0c:86:6c:9a:74:6b:70:49:e4:ed:76:ad:fb: e1:be:70:5a:a1:1e:7c:4d:08:4a:d9:2d:9c:9d:d3:7e: 00:70:cf:04:9f:e5:23:46:81:04:cb:93:81:75:31:30: 09:6c:85:16:a2:a5:b9:06:0c:db:9b:c1:0b:68:ba:90: a6:f2:28:df:03:e9:43:74:51:09:7c:e7:af:ef:80:55: c6:80:3d:19:f2:fe:6f:a3:0d:e9:ed:1d:f9:c6:9f:d5: 44:5e:49:da:4a:ae:a6:d6:36:b0:30:b8:d8:8e:6e:1b: 22:a5:40:f4:a6:a1:45:48:ad:ec:a1:59:fb:23:ac:3d: b1:47:2f:07:04:6b:66:32:28:d9:e5:ac:55:99:6b:a9: 8c:a4:33:d9:fe:da:52:22:a3:c3:86:ee:17:1a:89:bf: b8:09:92:58:8a:0a:45:43:07:42:d8:f0:26:4f:82:be: 4c:5a:fd:a4:51:bc:8f:50:4c:6d:a1:c1:c9:c4:33:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:cd:96:71:ad:aa:52:ee:f5:68:4b:21:30:03:f1:80: b9:1e:9b:fa:4c:61:e4:79:15:74:fc:4a:c8:0f:37:86: c1:cb:d4:cf:a1:f2:54:d6:f7:21:3b:40:f0:ae:c2:fb: ea:e4:8c:8d:65:9f:f8:f0:2f:60:39:ff:28:2b:b2:76: b3:15:cf:74:dc:8a:65:0f:c1:65:3d:45:de:31:2f:aa: 49:f7:b4:13:fd:7d:d5:55:9e:5e:b5:5b:c8:03:84:bc: ff:c4:b2:c3:ff:93:1b:b8:5d:53:7e:e2:74:ae:fb:40: 49:f8:91:51:cb:7d:c7:e1:c5:c5:56:61:0d:ef:ea:dc: ea:28:aa:c4:b8:b4:af:a4:ce:d8:0b:ca:00:b9:e5:54: 1b:d6:28:c0:74:3f:b1:82:4a:79:19:b8:c9:6c:10:97: 53:23:5e:3e:63:4f:67:5c:11:07:5e:e9:02:50:64:84: 94:4d:1f:f6:02:56:7f:08:d8:88:c3:e2:7b:18:ac:b4: 85:12:76:a1:4f:3e:0a:0b:00:16:7d:0c:03:96:9e:cc: 82:18:88:86:ca:e8:dd:a0:10:ff:3a:13:38:c4:34:42: 0a:8f:43:53:ca:e9:4c:20:2f:18:98:d8:f6:15:a9:c0: 4c:88:d5:6d:2b:a4:06:44:8b:33:84:18:9f:af:a3:6a Fingerprint (SHA-256): 2A:7B:D0:56:A9:C0:DF:8F:20:91:EA:5A:18:00:F4:5C:01:CA:93:73:23:7A:4E:57:9A:FD:AE:AE:5E:6C:CF:00 Fingerprint (SHA1): B5:8C:A3:96:BD:BE:37:B1:1D:11:2A:39:70:C5:F3:19:3F:A8:10:2D Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4463: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043311 (0x6709c2f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 09:37:04 2016 Not After : Fri Jan 08 09:37:04 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:13:57:11:09:c5:e4:47:64:47:5b:f0:da:1e:f3:b9: 91:ee:7f:95:98:96:41:1a:54:7a:df:14:35:55:d3:52: 1d:52:84:4a:01:0e:76:16:d7:3e:8c:5c:08:a8:b1:c4: b9:40:28:25:6e:ed:50:33:1d:35:74:17:7b:1b:66:57: 07:04:82:0c:86:6c:9a:74:6b:70:49:e4:ed:76:ad:fb: e1:be:70:5a:a1:1e:7c:4d:08:4a:d9:2d:9c:9d:d3:7e: 00:70:cf:04:9f:e5:23:46:81:04:cb:93:81:75:31:30: 09:6c:85:16:a2:a5:b9:06:0c:db:9b:c1:0b:68:ba:90: a6:f2:28:df:03:e9:43:74:51:09:7c:e7:af:ef:80:55: c6:80:3d:19:f2:fe:6f:a3:0d:e9:ed:1d:f9:c6:9f:d5: 44:5e:49:da:4a:ae:a6:d6:36:b0:30:b8:d8:8e:6e:1b: 22:a5:40:f4:a6:a1:45:48:ad:ec:a1:59:fb:23:ac:3d: b1:47:2f:07:04:6b:66:32:28:d9:e5:ac:55:99:6b:a9: 8c:a4:33:d9:fe:da:52:22:a3:c3:86:ee:17:1a:89:bf: b8:09:92:58:8a:0a:45:43:07:42:d8:f0:26:4f:82:be: 4c:5a:fd:a4:51:bc:8f:50:4c:6d:a1:c1:c9:c4:33:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:cd:96:71:ad:aa:52:ee:f5:68:4b:21:30:03:f1:80: b9:1e:9b:fa:4c:61:e4:79:15:74:fc:4a:c8:0f:37:86: c1:cb:d4:cf:a1:f2:54:d6:f7:21:3b:40:f0:ae:c2:fb: ea:e4:8c:8d:65:9f:f8:f0:2f:60:39:ff:28:2b:b2:76: b3:15:cf:74:dc:8a:65:0f:c1:65:3d:45:de:31:2f:aa: 49:f7:b4:13:fd:7d:d5:55:9e:5e:b5:5b:c8:03:84:bc: ff:c4:b2:c3:ff:93:1b:b8:5d:53:7e:e2:74:ae:fb:40: 49:f8:91:51:cb:7d:c7:e1:c5:c5:56:61:0d:ef:ea:dc: ea:28:aa:c4:b8:b4:af:a4:ce:d8:0b:ca:00:b9:e5:54: 1b:d6:28:c0:74:3f:b1:82:4a:79:19:b8:c9:6c:10:97: 53:23:5e:3e:63:4f:67:5c:11:07:5e:e9:02:50:64:84: 94:4d:1f:f6:02:56:7f:08:d8:88:c3:e2:7b:18:ac:b4: 85:12:76:a1:4f:3e:0a:0b:00:16:7d:0c:03:96:9e:cc: 82:18:88:86:ca:e8:dd:a0:10:ff:3a:13:38:c4:34:42: 0a:8f:43:53:ca:e9:4c:20:2f:18:98:d8:f6:15:a9:c0: 4c:88:d5:6d:2b:a4:06:44:8b:33:84:18:9f:af:a3:6a Fingerprint (SHA-256): 2A:7B:D0:56:A9:C0:DF:8F:20:91:EA:5A:18:00:F4:5C:01:CA:93:73:23:7A:4E:57:9A:FD:AE:AE:5E:6C:CF:00 Fingerprint (SHA1): B5:8C:A3:96:BD:BE:37:B1:1D:11:2A:39:70:C5:F3:19:3F:A8:10:2D Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4464: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #4465: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #4466: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4467: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #4468: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #4469: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043310 (0x6709c2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 09:36:51 2016 Not After : Fri Jan 08 09:36:51 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:d8:c8:7c:36:9b:6e:0f:41:f9:5b:e5:82:02:ea:ec: 1e:fe:97:fe:6f:4e:04:c7:e5:e3:cf:58:09:20:68:61: 42:9e:b9:73:07:0d:ea:68:aa:9e:24:97:40:54:39:60: 46:2d:0c:ac:30:0e:ce:a0:8d:80:8f:de:fb:74:11:44: 61:f7:bc:d3:6d:38:98:4b:84:40:dd:43:fd:55:fc:d7: f6:26:2f:63:77:d7:68:d0:fb:30:2b:98:90:f4:ab:58: cb:06:06:78:11:a3:93:a1:2c:d8:72:fb:47:c5:7b:9c: 1a:70:cf:85:fe:84:90:64:67:c1:4d:db:af:6d:0a:69: be:42:89:09:00:4f:cc:24:39:69:16:34:f1:65:1a:62: 58:a6:9f:e5:5d:d1:ca:4c:fe:31:cf:10:77:1e:f3:21: d5:2a:88:3f:47:be:91:ed:fe:57:45:93:4f:10:99:4b: 8d:1a:2e:92:c1:56:e0:ec:79:7b:de:53:78:e4:43:9a: 65:d8:bb:85:61:77:79:9e:bf:09:79:58:dc:cb:c4:0d: de:8d:07:88:f2:48:fb:cc:d3:16:02:54:ee:d9:b9:1f: 2e:73:c7:a3:3c:5a:f9:34:aa:31:26:47:cd:d3:85:89: 78:f3:1b:0a:c1:9d:49:cd:f4:0a:39:b3:ec:9c:d7:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:26:64:1a:00:4e:ed:d3:b3:65:80:38:32:20:76:a2: 11:49:36:9e:61:4a:6a:62:3f:55:a5:7c:8f:ab:55:c6: bb:25:ad:a6:5e:72:92:e9:e7:97:93:02:a0:87:d3:85: e9:7b:66:f1:78:39:be:08:26:05:42:45:7f:a5:f7:df: b0:f2:66:46:04:e7:7f:00:6e:fa:a5:58:0d:67:eb:f8: 27:8e:70:56:a2:d2:16:31:f3:fa:45:6f:e5:66:a8:5f: e1:ae:cf:3b:3b:17:19:aa:a6:ed:eb:36:e5:c6:f7:16: f6:b6:24:a0:5d:29:93:f4:89:c5:32:76:c5:9f:3f:b2: e7:d7:d6:00:11:01:1e:e4:b3:00:c2:eb:f0:fd:f7:ff: c1:d8:af:db:9b:cb:1e:94:5f:55:74:ea:d1:22:d3:f9: 78:1c:c1:d6:ff:15:e5:e9:a3:18:3b:01:56:73:f7:76: 41:e6:c2:bd:17:18:d6:33:c1:ba:00:07:40:69:fc:2e: 4c:10:39:c3:fd:af:b3:fc:e4:d2:12:a2:c7:c6:f0:7f: 1f:db:bd:4a:9c:49:2e:e9:e6:48:bc:0f:40:a3:30:b5: 9f:e4:95:59:d3:f0:16:39:97:7a:c9:c3:af:ae:84:bb: 92:21:0e:a3:b5:a2:bf:74:94:20:5d:b7:da:7a:5c:1f Fingerprint (SHA-256): 39:EC:7B:7B:C0:67:B4:75:09:E3:20:D9:FC:AB:60:96:9D:A8:F9:ED:31:5E:81:E6:9D:4C:02:30:53:CF:8E:06 Fingerprint (SHA1): F4:71:55:6A:A0:FA:3B:19:14:15:09:F6:6A:58:44:38:74:21:74:E0 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4470: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043310 (0x6709c2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 09:36:51 2016 Not After : Fri Jan 08 09:36:51 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:d8:c8:7c:36:9b:6e:0f:41:f9:5b:e5:82:02:ea:ec: 1e:fe:97:fe:6f:4e:04:c7:e5:e3:cf:58:09:20:68:61: 42:9e:b9:73:07:0d:ea:68:aa:9e:24:97:40:54:39:60: 46:2d:0c:ac:30:0e:ce:a0:8d:80:8f:de:fb:74:11:44: 61:f7:bc:d3:6d:38:98:4b:84:40:dd:43:fd:55:fc:d7: f6:26:2f:63:77:d7:68:d0:fb:30:2b:98:90:f4:ab:58: cb:06:06:78:11:a3:93:a1:2c:d8:72:fb:47:c5:7b:9c: 1a:70:cf:85:fe:84:90:64:67:c1:4d:db:af:6d:0a:69: be:42:89:09:00:4f:cc:24:39:69:16:34:f1:65:1a:62: 58:a6:9f:e5:5d:d1:ca:4c:fe:31:cf:10:77:1e:f3:21: d5:2a:88:3f:47:be:91:ed:fe:57:45:93:4f:10:99:4b: 8d:1a:2e:92:c1:56:e0:ec:79:7b:de:53:78:e4:43:9a: 65:d8:bb:85:61:77:79:9e:bf:09:79:58:dc:cb:c4:0d: de:8d:07:88:f2:48:fb:cc:d3:16:02:54:ee:d9:b9:1f: 2e:73:c7:a3:3c:5a:f9:34:aa:31:26:47:cd:d3:85:89: 78:f3:1b:0a:c1:9d:49:cd:f4:0a:39:b3:ec:9c:d7:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:26:64:1a:00:4e:ed:d3:b3:65:80:38:32:20:76:a2: 11:49:36:9e:61:4a:6a:62:3f:55:a5:7c:8f:ab:55:c6: bb:25:ad:a6:5e:72:92:e9:e7:97:93:02:a0:87:d3:85: e9:7b:66:f1:78:39:be:08:26:05:42:45:7f:a5:f7:df: b0:f2:66:46:04:e7:7f:00:6e:fa:a5:58:0d:67:eb:f8: 27:8e:70:56:a2:d2:16:31:f3:fa:45:6f:e5:66:a8:5f: e1:ae:cf:3b:3b:17:19:aa:a6:ed:eb:36:e5:c6:f7:16: f6:b6:24:a0:5d:29:93:f4:89:c5:32:76:c5:9f:3f:b2: e7:d7:d6:00:11:01:1e:e4:b3:00:c2:eb:f0:fd:f7:ff: c1:d8:af:db:9b:cb:1e:94:5f:55:74:ea:d1:22:d3:f9: 78:1c:c1:d6:ff:15:e5:e9:a3:18:3b:01:56:73:f7:76: 41:e6:c2:bd:17:18:d6:33:c1:ba:00:07:40:69:fc:2e: 4c:10:39:c3:fd:af:b3:fc:e4:d2:12:a2:c7:c6:f0:7f: 1f:db:bd:4a:9c:49:2e:e9:e6:48:bc:0f:40:a3:30:b5: 9f:e4:95:59:d3:f0:16:39:97:7a:c9:c3:af:ae:84:bb: 92:21:0e:a3:b5:a2:bf:74:94:20:5d:b7:da:7a:5c:1f Fingerprint (SHA-256): 39:EC:7B:7B:C0:67:B4:75:09:E3:20:D9:FC:AB:60:96:9D:A8:F9:ED:31:5E:81:E6:9D:4C:02:30:53:CF:8E:06 Fingerprint (SHA1): F4:71:55:6A:A0:FA:3B:19:14:15:09:F6:6A:58:44:38:74:21:74:E0 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4471: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #4472: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043315 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4473: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #4474: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #4475: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043316 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4476: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #4477: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #4478: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043317 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4479: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #4480: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #4481: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043318 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4482: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #4483: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #4484: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043319 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4485: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #4486: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #4487: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043320 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4488: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #4489: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #4490: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043321 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4491: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #4492: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #4493: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043322 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4494: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #4495: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #4496: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043323 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4497: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #4498: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #4499: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4500: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 108043324 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4501: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4502: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 108043325 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4503: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4504: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 108043326 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4505: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4506: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #4507: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #4508: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4509: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 108043327 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4510: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4511: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 108043328 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4512: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4513: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 108043329 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4514: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4515: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #4516: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #4517: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4518: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 108043330 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4519: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4520: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 108043331 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4521: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4522: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 108043332 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4523: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4524: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #4525: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #4526: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4527: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 108043333 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4528: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4529: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 108043334 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4530: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4531: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 108043335 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4532: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4533: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #4534: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4535: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4536: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 108043336 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4537: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4538: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4539: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4540: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108043337 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4541: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4542: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043315 (0x6709c33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Jan 08 09:37:39 2016 Not After : Fri Jan 08 09:37:39 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:cd:c9:e5:cc:61:a5:00:67:cc:44:d6:ba:9f:ca:27: c0:a2:c0:51:c9:b4:ab:cb:e5:02:51:2f:a3:d9:0c:55: 70:03:6d:41:8d:f2:d9:30:ec:81:4d:05:d8:a5:1e:6d: 05:df:c8:a2:0c:7c:27:19:5d:7e:ba:ba:e9:c2:db:00: 94:e8:3c:b7:70:1a:37:b8:6c:31:19:0d:af:6f:16:79: 2a:1b:96:a2:9f:03:7d:8b:16:91:fb:f2:5d:65:63:fc: 8e:2a:23:20:ef:8e:8c:9e:19:70:03:48:cc:db:fe:ab: aa:02:15:98:fd:cd:bf:4d:dd:06:0d:1f:a1:10:a4:1c: de:4f:5f:a9:65:0c:c4:80:fe:b1:e0:86:2f:cc:34:4d: ee:6a:80:97:22:5f:81:54:7b:47:f7:52:58:da:d7:5e: 24:a1:ce:4c:07:cf:38:39:b6:b9:71:c9:56:7b:f8:6e: 38:49:4b:e2:a8:e1:d8:8b:9e:e3:2c:04:a8:9c:81:59: ca:50:01:19:27:5e:85:1f:1e:3d:96:a5:ba:33:bb:4a: 23:01:9b:4c:f0:59:06:44:14:69:e1:d3:a8:73:9b:c3: e1:be:bd:51:45:e1:de:70:64:3a:f7:2e:ff:50:04:d6: 3c:62:ba:bb:06:e0:73:07:65:a6:bb:3f:46:2a:0a:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:fd:be:ae:ab:ed:28:90:1b:fa:fa:86:6a:3d:e0:f6: c3:5a:a8:74:96:9c:cb:ce:7e:d7:71:f6:68:9a:38:4d: c6:26:43:1c:ae:f2:3e:27:05:2b:1e:19:22:ac:85:c3: 4d:4b:22:ed:f4:ee:d8:e1:59:f7:66:a0:11:13:fa:d0: 08:4c:fc:b1:c3:b7:28:74:90:d7:bd:c7:bc:37:9d:83: 37:e2:e9:5e:b8:a2:a6:a3:07:de:67:7a:3a:78:59:0a: 76:2e:28:66:1d:0a:f7:57:fb:6d:14:d4:5e:9b:d1:57: a0:7d:67:d2:24:5e:cd:c2:a7:d7:85:0a:53:dc:8b:99: b9:61:18:7e:1d:5a:6f:ba:db:bc:e1:64:9a:9d:fd:bf: 19:dd:40:a6:e0:b0:e6:68:69:72:c0:27:7d:f5:15:a2: 7b:f1:76:f3:36:fb:4a:46:a3:b9:d6:7b:9f:46:6f:15: 6f:27:72:46:f3:dd:aa:71:66:a6:fe:be:a3:e8:60:20: 3a:cb:d7:5d:f2:95:44:d2:8e:71:10:9c:3d:28:a3:5b: 47:63:87:1f:81:f9:ee:1b:2a:4c:42:7d:e9:26:f1:90: 7b:c3:d2:b6:2d:a8:8b:07:d3:ad:a1:84:3d:43:1d:ba: 54:05:81:33:ff:20:31:32:22:a5:ba:9e:72:35:7b:2e Fingerprint (SHA-256): B8:EE:DB:CD:4E:F4:1C:33:00:6B:D2:BD:3A:89:10:81:BA:09:07:35:9D:4A:98:03:9B:C4:6D:11:14:B0:BE:A7 Fingerprint (SHA1): A4:29:49:3E:61:75:6B:F5:AE:D9:F2:AF:38:71:05:37:4D:75:3C:39 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #4543: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043316 (0x6709c34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Jan 08 09:37:50 2016 Not After : Fri Jan 08 09:37:50 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:9b:7d:f6:55:b5:4b:08:48:9f:8d:36:5d:dc:77:2b: 26:41:ac:9f:4e:ed:ad:fe:b3:5e:31:c9:41:cd:96:3a: 5d:da:19:9e:46:89:71:ab:55:cc:41:c6:49:ee:8c:fc: 1a:89:9d:ad:85:d2:0d:82:eb:45:1a:a3:f4:cc:73:a6: 59:5b:f4:4d:cd:82:98:81:bd:0d:52:c2:65:d3:5e:fb: fd:0c:9c:90:0f:d6:5b:62:dc:96:39:87:90:33:69:af: d2:eb:6d:ce:7c:e1:c0:f3:8e:24:69:21:84:0a:94:b6: c6:f7:f7:ba:79:b1:d7:ad:2a:f5:e1:3b:0c:b0:15:a5: 50:2e:b0:45:71:fa:17:82:2c:25:5e:fc:91:60:46:5a: d8:75:be:e5:c8:ad:ad:b8:2d:2d:9b:ed:2d:f0:c8:d2: d8:ee:7a:f3:91:ec:07:4e:44:d0:32:f3:ef:2f:18:db: ef:dc:69:3c:6d:a3:6f:5a:0c:2f:3c:89:39:86:6f:cf: 63:f0:b3:77:f6:79:95:12:65:58:4a:7b:94:53:e5:96: eb:cf:83:f7:10:3a:8c:b4:7e:7f:00:38:d6:ea:7c:cf: 6a:75:26:20:25:df:29:6f:70:f1:39:cf:06:63:3c:be: 63:d6:40:27:74:fc:ba:34:11:d8:d0:d2:2d:4a:2f:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:91:fd:d1:3c:f6:57:9b:92:5b:9f:4b:6a:1a:34:93: bc:b5:39:28:eb:87:37:de:b7:2d:66:67:9d:5d:01:2d: de:d8:14:83:8b:3f:61:0f:8d:49:b0:34:c6:69:9c:0e: 00:f3:1b:bf:06:fb:55:52:e8:ff:2a:3f:a5:90:60:72: 6d:be:03:a0:f6:6c:e2:36:d9:67:a0:17:60:42:7c:7c: f7:fc:31:d2:70:6c:31:4e:e7:e0:3e:54:09:31:d7:59: 72:a1:e3:fb:1d:e2:7e:31:93:b9:28:75:1d:bd:12:82: 88:98:19:44:05:71:62:e4:85:a4:d6:f5:f2:21:c1:58: 73:bb:60:10:c9:d3:60:f9:9e:e8:9e:df:20:2e:34:25: 69:51:d8:e1:62:94:61:8d:ac:75:e3:13:35:2a:2d:af: 2c:cb:2f:b5:6b:8c:d9:7e:7c:b6:fb:2f:3e:bf:d7:70: 94:18:41:89:32:af:9b:a1:43:2b:41:15:90:d8:74:95: aa:18:6e:db:42:f5:83:55:f3:07:fd:a0:10:9e:c0:44: f5:d1:83:ff:0f:00:ab:91:90:53:21:4f:38:7c:18:7c: bc:89:4e:66:bb:0a:4d:29:39:a1:12:e4:d4:d7:6f:01: a8:3e:1a:db:99:39:58:6d:0c:c5:d5:3e:dc:c0:f6:46 Fingerprint (SHA-256): B0:85:70:33:01:38:81:63:2D:B5:5F:15:22:4A:A7:79:77:23:AB:25:72:20:FC:55:DB:8D:BB:7A:16:AC:C2:D5 Fingerprint (SHA1): 61:09:F2:24:14:01:60:1A:EA:44:D2:91:BF:D9:64:61:C5:DE:78:50 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #4544: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043317 (0x6709c35) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Jan 08 09:38:19 2016 Not After : Fri Jan 08 09:38:19 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:59:c0:a0:8e:a8:6e:2d:1d:1a:c6:b2:68:40:57:38: bc:d5:3d:25:05:fd:96:7c:c5:08:fa:f1:2f:47:3c:38: ba:fb:77:98:3e:e6:58:32:8b:71:63:6a:75:21:f3:36: 28:ed:fe:82:2d:23:08:7d:2b:0d:ec:e1:20:9f:77:76: aa:bb:a0:04:30:04:d2:64:0f:ea:8c:dc:d3:f8:84:ec: c6:d0:90:1e:75:59:4e:3e:4b:80:45:44:34:33:19:99: 72:6b:cf:7e:b7:f9:be:a5:7f:46:e5:f0:d6:b8:8c:89: 79:3b:44:da:c1:cb:a8:5d:52:2e:4a:19:1c:29:7f:59: 61:5a:0d:fb:17:d1:0c:7b:12:99:0f:af:01:50:23:c7: e2:20:34:e3:e9:75:de:03:11:5b:9b:b5:41:36:99:b9: 8e:c6:41:fb:e2:9d:eb:67:e9:86:eb:73:e6:2f:91:f2: 21:80:ff:b6:c6:2d:bc:17:0d:c8:5c:9e:2e:cf:35:d0: 1e:2c:de:d8:92:2b:ea:59:6c:b3:b2:a1:23:76:ff:bc: 41:79:2d:20:53:fa:14:d4:98:a1:7c:e4:ea:74:90:55: 35:fb:58:5b:df:b4:3d:ff:c6:dd:e6:fd:5a:5b:56:1b: f7:d4:15:6c:a6:21:e3:80:e9:b8:f4:96:9a:c9:d8:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:61:7e:1a:d4:b4:3d:5a:f6:1a:52:aa:97:85:69:7c: 5e:c2:16:b9:49:0e:30:54:8b:2d:f3:98:c7:19:ce:21: 6d:7a:e4:ba:21:35:07:7f:b0:8a:c7:3e:b9:b7:b5:15: 8e:05:b4:61:6d:05:ea:57:ce:75:41:69:cd:af:d5:ea: 04:ba:41:1a:47:c4:c8:f0:20:1e:86:87:ef:5b:40:5c: 03:5c:37:04:76:46:d2:c0:99:68:21:b7:db:2b:e3:0c: 11:d2:a1:23:74:11:b9:5d:01:01:f8:9e:22:6e:a9:9b: 92:da:39:ca:e5:34:18:ec:47:10:0d:8a:95:b6:9b:65: 29:55:ce:14:69:60:02:18:6c:a8:30:79:1e:13:df:fd: 5c:a4:65:a1:95:9c:ae:7a:e1:b5:db:2e:22:d5:17:79: 0a:60:f6:b2:ea:8e:86:17:66:c8:02:ce:22:85:85:a7: 00:c4:47:96:63:1e:e9:db:70:5d:9e:c6:2c:dc:eb:fc: 3d:d6:8f:06:48:ce:5b:ed:41:52:c9:5a:32:0b:37:31: cc:b2:84:1a:73:7e:c8:a0:6f:1f:11:ee:2a:d4:16:c5: b3:5f:49:fa:aa:07:a4:2e:4b:99:9e:82:8c:c1:4c:e6: a0:b2:cf:dc:19:42:8b:f2:33:db:05:61:ba:1f:e6:a0 Fingerprint (SHA-256): 25:29:22:29:38:E3:4E:00:62:62:BC:83:BE:2A:B3:B3:D8:EF:27:0E:B0:B3:60:44:4C:6A:F6:02:44:B8:90:DD Fingerprint (SHA1): C2:53:F8:C3:D1:DC:9F:20:D6:B4:D1:B5:B8:0D:25:4C:3B:6B:48:AC Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #4545: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043318 (0x6709c36) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Jan 08 09:38:31 2016 Not After : Fri Jan 08 09:38:31 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:15:87:4e:3b:67:c1:de:45:68:99:d7:8a:e9:d0:3d: 35:66:4c:77:9c:4a:a3:1a:c3:a0:a4:00:bb:b9:ed:fa: f4:af:ba:8b:b9:97:ea:ed:d6:69:bd:1d:b9:3c:45:64: 4d:a2:61:40:46:0b:b3:a1:68:e7:15:8b:dc:72:ea:3d: 5d:de:87:c7:97:a7:e4:cb:3f:36:c8:11:51:f3:ce:4b: 6e:b1:90:2b:25:2e:36:40:bf:21:14:a4:23:70:a7:3d: ba:ed:5d:10:e5:63:e7:d8:18:2e:ad:82:1b:0a:61:6d: c1:bd:86:3f:59:b0:b9:9f:13:f7:33:67:96:47:27:54: c8:a6:01:cd:6d:c6:01:d1:f7:8b:da:da:cb:b6:cd:88: 8a:8b:aa:a0:f5:b4:5b:0f:32:10:aa:e7:6c:a0:38:23: 9c:bf:7f:58:b3:be:3c:49:5c:33:b5:f0:2a:dc:14:e6: 34:9d:6d:b9:e9:40:ab:8d:49:ca:0e:ed:3c:c4:c8:07: 87:e9:a8:fa:8e:64:ec:bc:ff:1e:e6:ea:82:06:dd:01: de:39:b0:6f:81:cf:79:3a:be:a4:5e:01:7f:da:38:b2: 8c:c2:51:1f:f8:94:54:ea:2f:2e:d9:bc:bd:1b:ab:c9: aa:83:3f:6d:13:53:96:49:dd:eb:c7:b6:65:5e:3a:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:dd:53:c4:09:05:e8:58:e7:b5:f5:08:86:a3:b0:f9: 27:08:61:5d:db:85:06:4c:63:b2:bb:6b:1b:1b:9c:10: c1:c3:9e:b8:3c:e7:c1:1b:5f:2d:30:a2:f7:18:1f:e5: 16:97:ce:f8:87:d8:e3:83:17:bb:d0:ad:7f:6f:29:f1: ab:65:73:d7:bc:bd:1f:d4:5d:c6:35:49:fc:a8:a9:00: aa:e7:81:07:e3:2d:8d:53:17:30:4d:07:72:41:82:d3: 04:1c:df:b7:35:d7:46:16:98:5a:ff:97:ef:c0:88:f5: 17:73:f6:8f:d3:9d:f3:d1:30:8f:cb:89:bf:7b:9b:1c: 61:15:4f:18:83:7e:fc:e9:8e:c1:98:55:ab:51:b9:a2: a3:e7:ed:95:f2:b9:ab:f2:40:d1:06:4a:f0:1f:dd:5e: 11:30:e2:25:7c:98:7a:2a:b5:75:bb:b6:3b:cc:ee:b3: 35:ac:68:06:24:6b:96:11:8f:e8:f0:ec:4d:32:ba:81: 05:95:44:18:a8:20:ed:b6:e8:c2:ac:b2:f2:6e:6f:ca: 91:01:e6:de:09:65:b9:eb:ea:5b:9b:79:ec:1f:a9:36: 2f:20:43:d6:62:78:4f:c7:72:96:f1:0d:80:0f:bf:79: be:19:59:7b:10:2e:b1:ed:1b:e3:19:08:17:c3:9b:9d Fingerprint (SHA-256): C8:EB:82:0B:B6:68:04:9D:9D:E0:F4:6C:FD:C7:DE:F1:96:FE:1F:BF:1B:A6:2A:99:34:11:BE:A3:54:90:13:FA Fingerprint (SHA1): DF:67:F4:CC:0D:A4:80:72:38:12:B3:0D:2F:A9:4F:AC:6D:6E:26:91 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #4546: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043319 (0x6709c37) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Jan 08 09:38:57 2016 Not After : Fri Jan 08 09:38:57 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:76:9b:44:57:1e:6f:9b:98:81:26:63:da:04:37:51: 9f:b4:ee:fa:af:7e:04:ab:c8:eb:d5:48:eb:c1:34:57: 95:d9:c9:e1:59:1e:31:ab:93:6c:4e:5f:c5:28:84:2e: a8:51:39:f4:a9:9b:9e:e3:a4:9f:23:70:05:d8:f6:e1: 31:a6:53:8b:67:d7:da:ba:81:af:27:74:ec:71:ba:f3: 04:f1:f8:88:94:e4:6b:8a:4f:0b:f5:9b:5f:5a:9f:21: b5:08:c4:24:78:68:7c:31:54:56:cb:bc:30:00:fa:c3: 78:96:07:c1:65:f4:29:91:43:7d:77:84:d9:a1:f3:ee: 7c:39:e6:de:75:d2:c8:c9:ec:81:f3:82:63:7e:9e:25: da:53:d6:0c:93:c7:fc:24:46:52:97:df:0c:2d:4f:93: 60:11:d4:99:f2:7c:0e:33:ec:d6:cc:46:0b:ef:7b:58: b0:23:e4:75:7f:de:a1:df:81:f3:38:67:34:ff:63:a7: 45:4c:16:b2:cc:10:81:8f:8f:db:48:d1:39:37:78:65: 8a:db:2d:2f:e0:73:e1:94:83:4d:57:bc:fd:01:19:44: 4b:7c:d0:31:22:c1:0b:c5:38:c0:08:7b:45:d8:2f:07: e2:76:e0:2e:18:b1:d6:9c:5f:a7:ac:21:5f:b3:d8:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:2d:c6:aa:cd:4e:fe:50:37:99:ba:1d:6d:46:8f:83: d9:30:d8:21:b6:5b:70:f8:ff:4b:cb:dd:36:99:f3:0f: 2f:9a:81:f2:11:42:0d:d2:e2:b0:1d:bc:9e:60:79:5b: 21:26:f5:00:ad:60:c3:ac:8c:62:67:eb:b7:ed:6e:4f: 10:6c:f1:25:aa:68:8b:e5:de:8f:22:77:5f:07:67:84: de:44:0a:9f:18:4b:8f:5a:04:2b:19:14:c4:b2:ab:4f: a7:e5:b3:48:7c:e9:82:ac:c6:96:d9:d9:d8:10:f7:6b: 1a:a9:67:6f:6b:f3:79:a7:6a:a1:24:14:e6:c8:ab:ad: ef:bd:58:9d:98:17:90:12:c8:cd:65:07:49:8e:4d:0a: dc:be:b7:1d:0b:bb:6b:bc:da:cf:b3:02:de:a2:55:a4: 2a:18:35:6a:09:95:5a:c7:62:f7:26:2f:c8:d7:50:97: 52:85:5e:da:a0:bb:0a:29:7d:4d:14:3a:c3:08:1e:7a: af:ac:e4:4d:76:d6:f0:ac:10:37:2a:f2:5a:d0:d6:33: cc:bb:4f:65:5d:7d:a7:18:16:03:b5:b8:71:b1:46:09: d9:f5:54:b5:8f:a6:54:9f:10:11:de:24:5e:bc:fc:ab: 04:72:b3:37:44:e9:b1:38:27:e9:46:8c:5e:f5:d3:16 Fingerprint (SHA-256): A9:02:DC:D5:3D:A1:C9:BA:CB:36:4E:24:72:0C:7B:65:49:96:CB:86:91:EE:BB:F9:AA:D1:5C:98:FE:F3:EC:2C Fingerprint (SHA1): 36:1D:89:BA:1F:CD:54:6A:41:D7:57:27:16:4A:46:95:8B:EE:DF:6D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #4547: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043320 (0x6709c38) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Jan 08 09:39:02 2016 Not After : Fri Jan 08 09:39:02 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:c4:7d:42:b8:46:54:bb:1a:4b:47:64:bd:19:7d:ae: c3:21:22:eb:cc:ce:a1:75:27:39:46:ac:72:ec:a4:db: a4:7a:03:e7:d0:6d:ba:7d:d6:2c:5f:db:49:26:84:2a: 63:4b:45:48:10:55:f3:a6:8f:df:c5:79:0a:76:8f:35: 6a:d6:de:a8:3e:c4:d1:ea:73:54:3f:57:0c:39:40:a1: 42:fa:e1:85:94:63:e0:2e:ac:b5:a7:ef:57:9a:d9:9a: 7d:41:3a:a2:a4:12:42:b6:2c:3f:46:59:37:07:ec:15: fc:2d:dc:00:0d:f5:08:1a:30:e0:fe:f8:8c:27:62:da: 1e:1a:02:7d:6b:6d:12:36:75:76:0f:ed:43:79:6e:a7: 85:81:37:03:e6:f1:a1:6d:1c:c9:45:b0:8a:6a:8b:8c: 24:05:b7:e0:9f:27:a3:4c:22:ce:3a:e8:6b:f1:36:49: 8d:bf:1b:b7:4b:e3:e6:c9:ad:be:1f:d8:62:86:6b:9a: bc:21:46:17:7d:71:d0:6b:9e:c5:de:22:e3:11:10:04: 88:cd:24:85:6b:a5:35:f9:6f:9c:5a:6f:29:e3:fd:c1: 6c:bb:c4:0a:cb:23:4c:d9:e3:13:50:a0:33:c3:b7:35: e8:60:28:9c:26:2c:7e:0a:e8:5e:87:29:96:1a:15:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:cd:23:ab:35:98:b6:02:d1:3f:2b:02:4b:be:90:b5: 2b:02:c3:0c:54:3b:0b:63:34:86:2c:ff:54:6d:c8:57: fe:c2:49:a7:c3:aa:11:8c:f4:d6:38:49:9a:df:35:e0: c4:e8:ee:38:ee:80:ba:9f:9f:bf:d0:95:d1:77:3f:1a: 19:a9:b6:ba:ea:3a:50:b4:18:a9:da:9d:7f:2b:3d:4c: fb:4c:30:44:44:6f:31:73:5e:43:d2:13:99:d1:db:b5: ad:4b:aa:ca:36:b0:8a:e7:d4:98:76:56:1d:f0:69:4a: 4b:fb:99:a5:1f:02:2e:40:e4:68:29:b2:dd:bd:85:c8: d2:c3:71:e7:ca:13:7c:d8:9e:d7:82:8f:eb:e5:65:55: a0:db:1e:0f:ce:f4:6d:f7:11:da:c4:7f:39:47:ce:e6: 1b:5c:1b:1f:d4:47:be:e9:97:91:fc:19:84:be:f0:f1: f4:4d:cd:d9:fa:a1:aa:56:3a:10:37:1d:5a:57:b1:fa: 71:71:5b:62:46:42:37:54:78:75:e8:c3:83:b8:6e:20: fc:5c:90:91:c7:d1:94:ab:6d:93:02:d7:a7:f9:12:c3: 3a:2c:9c:36:38:b9:94:16:32:65:2b:b0:58:20:06:9e: f2:66:0c:5a:8a:a9:39:49:62:6a:e2:28:4d:b9:f1:de Fingerprint (SHA-256): 49:A0:D2:E5:C2:9F:FA:90:12:20:64:62:8C:84:B7:3A:1B:B6:B4:E9:02:1C:1C:50:C2:8B:02:50:A4:BF:DA:91 Fingerprint (SHA1): F0:B7:23:60:80:89:8B:83:45:42:C0:6E:A0:41:8E:A1:C4:F8:7D:8C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #4548: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043321 (0x6709c39) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Jan 08 09:39:11 2016 Not After : Fri Jan 08 09:39:11 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:7c:33:6c:ff:a0:46:49:39:1e:50:bd:dc:d5:90:0d: c9:24:94:53:1e:72:a7:65:87:88:b7:86:b1:36:64:15: a0:96:5c:06:b1:ba:bf:87:26:f5:8f:5c:54:71:32:75: f3:5d:26:87:d2:7b:2b:8a:86:4a:d8:82:5f:84:4e:26: 11:76:49:7e:1f:13:1d:9d:7d:75:5a:3b:15:18:8a:b6: 2a:6c:1e:f1:5c:4d:81:b3:5c:67:b1:b6:6a:79:ac:2a: b2:fd:e3:5a:8e:65:2b:94:1c:2f:1d:6c:51:38:0a:53: f5:ea:fe:72:14:ba:32:93:9e:e4:81:9b:1d:a4:91:32: 87:9e:51:5c:7e:26:bd:91:40:56:f4:01:66:16:cb:49: ec:d0:c1:5b:ec:2e:32:f7:94:b2:07:e3:74:d4:98:5f: 5f:39:6c:2a:16:04:f5:47:7b:86:13:c2:86:77:61:1f: b0:94:bb:94:89:17:76:f4:5a:e7:2a:31:99:91:b6:6e: 5b:26:b8:3b:1d:6d:61:c0:5c:24:79:7a:39:da:66:64: fe:ab:77:05:e7:21:e7:ad:f1:2c:af:4c:4c:ac:74:ae: e6:42:5f:97:59:92:19:e6:25:93:53:56:bf:ba:2d:7a: 58:cd:07:fa:b6:07:30:22:54:c9:f6:94:b2:59:47:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:3c:63:06:e2:85:1f:f0:87:a2:a6:5c:87:46:8d:b4: 6d:f2:94:94:07:a0:df:47:c6:2c:a9:23:16:58:e3:fa: 70:b9:1c:b4:cd:54:58:30:8a:28:70:f4:30:5f:2d:5e: 52:bb:fd:9c:59:1d:16:18:8b:b9:65:35:92:b7:dc:0f: f0:7f:d1:61:1c:96:41:13:ee:70:7f:5a:2e:12:7d:34: 8e:18:f2:9e:42:65:e8:2b:0c:e1:1b:5c:d9:00:ec:cc: 7c:3d:fc:c4:9d:f8:63:36:61:6d:29:ab:d4:26:c2:96: 99:9d:29:f4:be:c9:0d:e2:26:fc:ff:71:b6:00:d8:35: 09:54:ff:62:eb:27:88:1e:01:f0:b4:63:e6:74:fd:b2: 7e:00:98:92:37:12:be:18:09:8c:a2:a0:ce:05:f5:25: 6e:23:5a:87:9d:dd:07:31:2f:2f:2b:a7:56:30:a6:59: 3f:7f:dd:df:f2:16:00:2c:01:71:d7:b8:d9:5b:93:8a: 34:cc:00:db:cb:a9:a2:aa:4a:04:4e:7c:fb:eb:3f:7c: df:8e:99:a4:85:92:1a:9c:ba:a3:8c:e4:01:e7:9c:33: 7b:f9:07:81:df:51:57:b7:8b:1a:91:22:52:02:5a:7a: 6d:7f:62:c4:cb:ca:c2:66:49:d2:ef:67:07:25:72:a5 Fingerprint (SHA-256): 85:C7:98:93:21:F6:3A:F2:E9:F0:20:EE:52:AA:28:46:4B:D4:8E:D4:31:1D:18:B1:B7:2B:8A:C7:51:AE:14:CB Fingerprint (SHA1): 26:9D:F3:78:8E:85:E3:41:9B:60:E9:64:86:0D:FA:76:FE:6A:71:43 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #4549: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043322 (0x6709c3a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Jan 08 09:39:45 2016 Not After : Fri Jan 08 09:39:45 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:22:06:65:f4:06:f9:7f:b4:3d:78:33:07:28:ad:81: 43:38:f5:18:a7:ca:b6:30:e0:64:0f:0d:01:ee:29:98: ca:97:05:12:2f:06:de:1f:78:fa:1e:1b:54:00:86:5e: f0:fb:55:8b:17:ef:4f:57:57:85:70:2a:fd:ee:f5:ff: fa:3e:cc:2a:31:91:c2:ab:8b:0c:7b:2a:cf:3e:50:d2: 56:d5:7b:17:99:a7:a1:be:65:ea:9d:ff:b2:f9:a8:c2: 23:b1:a0:69:aa:92:8d:1a:d3:42:82:df:42:59:de:e0: 1b:14:9d:a0:17:26:03:00:c5:6d:21:7a:20:2d:ff:b4: 17:fc:4b:51:4d:04:7f:fb:d6:8d:7f:bc:85:e9:53:62: ac:18:cd:1e:6f:55:17:d8:b0:b2:d0:f9:ee:78:18:69: c0:40:b0:bb:58:97:d6:82:63:e5:3c:7f:9e:95:8c:f5: 0f:02:42:6f:89:83:d7:cb:36:45:38:ac:ce:33:b2:32: 0e:4a:c6:b5:c1:ed:8e:da:24:93:dc:73:45:2c:df:1d: bd:a1:d1:a9:2a:b9:6c:72:69:50:0f:da:43:bf:fa:f0: a0:8b:1b:0c:79:14:7e:65:58:6a:58:1d:8a:c4:07:bd: 07:9f:fe:34:36:95:6f:e6:65:c3:02:56:22:ee:0a:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:78:9a:0a:a4:fb:e4:03:3b:f3:ca:d0:42:52:21:fc: 20:eb:c5:cd:c9:f5:c1:eb:74:f1:6c:d0:7b:9e:89:61: 27:60:c7:2d:04:cb:66:22:97:ff:11:3c:28:3a:cd:34: 06:fd:54:7e:e7:a1:5c:d7:54:b8:3c:88:85:66:d1:0e: 24:22:16:1a:4e:7e:8e:65:8c:de:39:01:09:5e:83:c6: fb:95:72:e7:4e:ea:00:a6:e9:42:2b:e6:d4:70:85:92: c0:34:a1:48:09:cd:98:49:39:99:96:19:b3:43:b4:34: 5f:ec:3f:81:bf:1f:db:2e:db:6a:8d:8f:fb:40:df:fb: 01:f5:96:79:73:b0:60:22:26:5d:0b:f1:56:3b:ac:bf: 0f:0f:1f:9e:5b:41:2b:4e:fe:cf:0e:b9:28:34:ba:82: 79:db:38:f8:75:32:3e:e8:1d:60:9c:ef:92:63:c0:db: 4a:b4:87:66:63:39:be:e3:dc:8f:d1:cf:a9:de:b6:2d: 89:ab:fb:f4:ed:73:71:78:58:39:bc:d5:75:b2:d4:06: f5:af:8d:6f:17:e7:43:1d:41:f6:a6:5f:dd:bd:8c:49: 98:92:37:74:73:bf:d1:b7:40:5f:bd:eb:ca:b9:34:99: 95:1e:68:41:d4:c2:58:ea:6f:e9:86:c7:58:e7:3f:93 Fingerprint (SHA-256): 39:62:8C:0D:78:D1:DE:F0:AD:7F:25:F5:5B:F6:45:73:B9:D7:C7:BE:94:43:99:43:7E:0B:E0:F7:69:7E:B1:52 Fingerprint (SHA1): 3D:B0:62:FA:BC:0B:56:02:4B:B7:D9:E9:B0:23:23:F1:C0:D9:7B:A8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #4550: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043323 (0x6709c3b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Jan 08 09:39:56 2016 Not After : Fri Jan 08 09:39:56 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:74:58:80:1b:ff:6b:1c:46:b6:31:40:02:7b:53:35: 4f:1f:9e:14:bd:25:f3:a3:1e:fd:50:95:b8:7d:75:d8: 00:96:f0:b0:84:07:d1:d1:cb:6d:a4:67:81:ec:0d:ed: b2:07:fc:1d:01:36:54:9f:98:e4:f6:e7:e9:e1:14:53: 98:75:70:b1:14:c3:54:75:16:1b:24:b7:c7:01:37:b9: 8e:01:22:37:66:a3:41:f4:b8:cb:ea:4d:ac:4a:0a:7c: 40:0e:c6:26:9f:2c:20:96:cf:f4:ed:44:64:a2:c8:f1: 81:f0:83:ce:af:a2:a5:ae:61:ed:6e:d6:59:5a:25:d6: 46:3b:d9:dd:d2:6e:e3:15:93:1b:6e:2b:9a:5d:bc:94: f4:8b:fa:1f:4d:ac:56:07:41:ca:f4:97:5f:5f:e1:69: 47:40:40:73:48:60:a5:33:c1:39:93:2a:b6:9b:f8:da: e6:7f:5e:61:a4:70:14:87:25:13:23:f1:52:13:e2:0c: 7b:f4:77:bb:44:45:5b:8c:42:4c:90:e5:ef:4b:43:e2: 6c:4d:cc:63:bf:a0:1b:e3:f0:05:b3:54:ec:bd:03:61: 79:67:b1:85:4e:30:33:f0:dc:35:f1:80:1f:a9:f6:bd: 6b:1f:f8:aa:3c:e3:bb:7d:cf:e0:da:1c:4f:f3:d1:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:28:d2:8e:62:f9:55:38:bb:75:db:9f:58:87:dc:70: 50:74:6b:f9:9f:37:22:e8:ee:2a:39:74:58:62:01:84: e3:67:85:99:00:22:3e:ed:9a:cc:3e:c8:84:33:57:96: 2a:d5:62:25:27:ab:f9:40:c7:ca:6a:dc:0e:65:81:35: dd:e4:8a:1a:45:34:e9:f1:48:3d:ea:4d:08:8c:ab:87: 05:c9:db:4a:01:0c:e4:e9:d6:08:97:5f:56:5a:b8:e7: 03:35:8d:d3:e1:a8:2e:12:6b:07:c3:10:34:c2:bc:af: 24:6b:75:81:24:2a:a4:47:8a:c9:05:11:3d:dd:af:5b: 5e:3e:69:ee:f2:3f:8c:35:17:c9:09:01:14:e1:d3:03: bd:82:84:3d:08:c6:65:24:79:0d:00:95:71:2d:b4:0d: e4:ef:d8:2a:23:a9:ee:e9:1f:69:97:21:bd:83:3f:14: c6:17:1a:15:f4:03:c7:68:84:6f:0a:40:b1:6a:29:b6: 06:f7:22:aa:d3:44:09:9d:57:b4:98:b8:83:09:7e:06: 73:21:1e:45:b9:2a:63:30:82:9f:66:50:0a:56:b2:6c: 4f:21:e3:82:0e:4f:3e:6e:7e:18:12:ab:ab:f1:93:bb: a2:83:5c:4d:ab:b6:f3:eb:5b:53:a1:0c:32:5a:15:bb Fingerprint (SHA-256): 21:E1:BC:7B:0F:97:28:75:40:6E:0A:63:29:48:95:76:34:44:51:4C:17:43:CF:02:C2:94:BF:F3:96:91:9D:93 Fingerprint (SHA1): F3:2B:2D:69:9A:B5:71:22:22:25:06:F0:99:24:6E:21:83:2E:11:C9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #4551: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4552: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043338 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4553: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4554: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4555: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4556: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108043339 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4557: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4558: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4559: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4560: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108043340 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4561: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4562: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4563: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4564: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108043341 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4565: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4566: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4567: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043338 (0x6709c4a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:41:16 2016 Not After : Fri Jan 08 09:41:16 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:05:fc:09:c8:6a:94:90:b8:d3:00:94:74:b0:94:d5: ff:f3:38:58:a1:9e:3e:07:6f:bc:25:10:f8:fa:53:1d: fc:51:f0:0d:aa:60:3e:43:0d:b4:74:6d:46:64:f1:53: 48:73:bb:0f:38:81:19:c6:bb:b7:04:c7:99:b8:b0:70: 34:ae:73:31:18:0f:f4:89:05:0a:14:84:63:5f:d9:22: a3:7a:c1:b4:6c:60:8b:57:26:92:ac:e6:f7:e5:ba:87: d9:26:7e:eb:0d:1e:47:b5:24:8c:dd:7b:ff:0a:da:54: cf:82:71:aa:38:4a:1e:31:e4:0b:97:5d:ff:0f:a9:fe: c6:95:e4:b1:00:b7:85:70:f4:47:dc:fd:b6:5f:a6:16: 99:9c:3a:04:6a:28:f7:67:c5:37:7d:e1:77:c0:73:bc: b2:be:f3:72:99:0f:81:99:a7:57:b1:d2:a4:4e:34:98: fe:22:03:93:7b:c8:51:12:f3:f5:a7:18:50:12:10:74: 57:34:ca:ef:a6:f9:cf:ca:86:24:67:ee:2b:81:89:0b: 0e:fc:04:11:52:02:10:a5:60:6b:97:0e:50:58:a8:f3: f1:16:eb:da:63:45:fd:58:17:34:95:5f:99:bf:49:e0: c7:d0:c9:33:1f:52:3e:18:2d:12:c7:53:58:60:94:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:28:34:70:b0:64:06:3b:49:20:94:49:82:66:15:c3: 01:a6:47:8b:a3:01:5f:34:cd:9f:e6:a4:3a:08:27:84: 08:13:79:4c:f5:9d:26:c3:78:bb:5e:15:35:11:d3:1e: 65:cf:ff:88:2e:e5:cb:d1:6e:bd:ee:35:c0:2d:0a:8d: 02:b1:83:98:66:24:52:ba:d3:6d:6b:05:43:c4:81:51: 52:16:00:ea:b1:ff:7d:15:14:8d:4b:e3:35:10:a0:09: 52:3b:95:5f:3d:d7:fa:38:ce:df:63:09:98:5c:e0:ec: a1:a3:62:e6:ad:b3:45:1b:c7:81:f8:34:6f:ff:09:21: a6:cd:d3:d9:5b:bc:d9:09:92:ad:73:88:a9:58:32:86: 0f:19:95:88:be:10:f1:6e:e0:ca:5a:78:19:40:97:a8: 98:04:76:d0:a3:5d:f0:96:ec:68:9d:7d:e6:db:da:5f: 94:78:c0:83:f4:1c:8b:b5:45:00:00:dd:b2:3d:9a:20: 4d:b1:00:bd:ec:e4:45:de:29:81:8f:c7:9f:68:b3:b7: 39:b5:98:63:d1:44:9b:9b:30:c8:5b:69:0f:fe:bc:20: d9:0f:1a:d0:71:61:fb:29:16:b3:50:be:05:ae:8a:43: 1d:a7:94:f5:4d:03:06:18:a5:87:06:a0:21:f6:06:df Fingerprint (SHA-256): C2:96:C0:F3:CE:47:1E:14:39:6A:23:41:EC:E5:AA:C8:66:26:8F:76:88:8D:E7:BA:F0:B4:4C:B3:76:2E:C2:9E Fingerprint (SHA1): F6:83:FC:F5:C2:EA:71:79:29:D0:F6:EF:22:8D:D0:A7:B6:31:09:BE Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4568: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4569: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043339 (0x6709c4b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:41:25 2016 Not After : Fri Jan 08 09:41:25 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:bc:ff:b6:47:44:ad:11:b4:48:2f:5e:96:02:10:20: ea:a8:dc:2d:8b:83:af:b3:ad:7a:ce:e5:e8:74:8e:2a: 37:e8:d6:bf:b7:97:f0:19:2b:84:fc:01:66:fe:7b:eb: 47:11:d5:c4:39:25:ce:55:f5:43:29:d7:77:ec:53:48: 30:03:af:86:cc:fd:81:03:62:dc:45:fb:e2:33:ae:49: 1a:2e:d0:1c:2f:d8:a2:4f:33:2a:9c:6b:8c:01:12:0a: d2:7a:1c:73:b4:b6:f8:3d:2a:25:5a:62:35:70:75:81: ee:98:30:84:51:a6:f0:b5:a1:a9:06:72:b4:b2:c2:91: 35:16:28:ee:57:8a:2e:4b:fa:d5:24:a2:77:4f:b9:82: e4:be:32:e1:95:5c:4a:d4:f9:44:eb:8c:69:74:f7:64: a2:14:78:33:db:5d:d7:8c:5a:82:37:16:3a:5b:3b:bb: 6e:09:bd:24:52:83:df:97:90:6a:60:36:4e:46:68:5c: 4e:66:44:06:99:40:8f:c0:fc:94:37:00:6a:3f:6f:ed: 56:b7:ff:95:30:60:35:f8:bc:bf:e1:e8:95:04:21:68: 4e:49:0f:86:4c:79:cd:14:72:bd:27:91:74:98:f1:ff: 89:4a:1e:d3:94:a5:33:e0:1b:0f:9b:8c:cf:d0:ab:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:2e:87:3d:01:28:94:87:5f:c3:83:b3:69:02:f5:d8: eb:0d:90:e8:ee:c3:9f:46:5d:bb:c8:f7:0f:9b:0b:bd: 13:33:e6:ec:35:54:95:d9:a1:17:bd:29:3a:78:2b:20: e1:54:04:46:e1:55:ec:a1:20:e6:8d:35:55:0c:bd:e3: 69:e0:d1:67:11:2f:ca:b5:5b:09:f7:0a:ee:3b:9c:cc: 8e:9c:ac:fe:98:e5:36:96:a4:4e:7f:f6:78:7f:f1:ec: 89:55:4e:27:c4:7e:a9:79:d9:c9:78:dd:74:5d:5a:e5: 51:5c:0a:e0:1b:9e:e5:90:dc:32:fa:76:62:65:b8:61: ea:a2:8e:91:30:4e:c0:69:ef:0e:c5:1f:51:97:6b:8e: 48:0a:38:ce:29:18:25:3b:f6:86:8c:8e:83:cb:7b:2a: b4:49:b0:cb:a5:b9:a6:98:1f:20:19:97:d7:fa:71:6a: 91:e2:26:2c:9b:78:c4:94:92:52:1f:bc:84:1d:9d:de: 0a:5d:2b:1a:72:de:ab:bb:a1:a7:72:8c:6e:cd:03:4e: 7e:f9:f0:43:f9:86:f9:7f:e1:e3:c0:92:a6:2d:fd:ae: 97:11:ef:51:b0:c3:62:8c:3e:2d:80:81:61:f6:e6:27: f2:ce:a9:eb:29:97:42:4e:21:cc:2c:4e:2a:d8:df:24 Fingerprint (SHA-256): DE:77:EF:F6:46:E8:29:B9:B5:8B:C5:38:C0:8C:43:38:34:41:AF:B2:B4:E0:89:D6:AD:0D:A9:85:1F:A3:7F:11 Fingerprint (SHA1): 00:A0:AB:8E:4A:85:D8:7C:60:F6:4F:BC:68:B7:9F:ED:3D:D1:B6:52 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4570: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4571: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043340 (0x6709c4c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 09:41:43 2016 Not After : Fri Jan 08 09:41:43 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:4f:61:db:51:7c:bc:45:19:06:a9:2c:6f:9d:42:00: 74:2e:3a:32:ad:6c:b2:90:42:70:72:c0:1e:06:41:02: 5c:9d:fa:9f:68:90:9e:c3:40:3f:17:c4:89:2a:21:a3: fb:e1:91:6f:5a:d9:81:28:f0:db:6f:c5:48:e4:a6:40: c6:df:9f:01:4e:5e:0c:35:46:4d:c4:2d:38:70:4e:7f: fd:1c:2b:1a:94:39:60:ef:d3:19:a5:0d:64:a2:47:43: 07:58:6b:03:d2:ca:23:6c:86:5d:9e:c6:a2:99:1e:2c: 75:82:79:1d:51:c4:aa:cc:10:88:bf:88:c7:44:92:70: 1a:b0:ea:64:cc:da:f9:72:eb:a1:45:23:b4:1f:7f:a2: 9b:47:a7:3b:fa:1e:87:0e:58:35:cd:9a:94:9a:9d:97: 71:01:6f:23:a1:31:61:07:ab:9c:a5:88:81:c6:15:41: d9:cd:19:97:d4:3e:f0:f8:97:cb:72:57:40:91:71:0f: 2d:fd:53:40:7e:ba:61:7b:30:70:a8:31:25:1e:24:5c: 1c:bb:85:f3:8b:42:f9:6e:8c:da:82:37:54:19:76:32: d0:67:ff:61:35:fa:c6:99:dc:de:dc:f5:6f:ad:2d:f6: d9:90:95:0e:e5:c0:0a:ce:db:c2:37:e2:c3:1e:11:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:f0:de:ca:11:18:40:b0:58:87:98:a4:2c:45:0f:55: 03:ab:ac:a0:55:d3:4c:7b:bd:32:58:e1:4c:15:6c:22: b1:ec:1a:8e:9b:8a:56:f8:0e:56:56:68:d7:ab:03:ff: aa:68:78:59:bd:d9:d0:18:5d:eb:d7:31:2d:85:10:de: 59:80:de:0b:cb:36:bb:22:83:be:38:18:f1:44:02:d3: 32:b1:9a:64:b2:d3:3e:cb:59:86:fe:28:0a:64:88:56: 6e:2c:c5:16:79:15:6d:1e:dd:09:ee:6e:24:ef:af:fe: 6e:15:16:e3:e1:6c:40:d9:09:19:9b:b6:5d:14:5e:68: 35:53:19:c8:ad:31:28:ef:a7:18:5e:22:39:38:7e:50: c5:fb:f2:1e:ed:ce:12:65:ff:b1:a8:ea:cb:b9:a0:bb: 52:fe:f1:a4:15:b3:c9:3a:77:28:18:30:02:de:5a:6e: 73:75:1d:e3:1c:03:46:bd:a5:e6:69:3b:d2:60:d1:ae: 4c:8d:ff:51:38:03:2f:6d:d5:d8:f6:2d:0f:90:0a:71: 4f:a3:b9:b0:3c:ce:b9:70:93:d4:36:1b:ef:95:8e:cc: d5:6c:68:f5:3f:d0:e7:c8:44:1a:18:80:29:41:a1:27: d0:30:67:7a:4f:24:fd:93:d7:28:eb:f3:be:99:7a:92 Fingerprint (SHA-256): 60:C8:60:BD:80:E9:BE:2E:9B:81:07:FA:0B:A4:90:AE:26:D9:11:CC:4E:6B:2A:98:8A:FC:00:2D:1A:B0:EF:52 Fingerprint (SHA1): 00:84:86:C8:0E:D3:D9:CE:59:1F:74:05:0E:15:E7:F9:E9:0E:7E:C8 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #4572: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4573: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4574: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4575: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4576: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043338 (0x6709c4a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:41:16 2016 Not After : Fri Jan 08 09:41:16 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:05:fc:09:c8:6a:94:90:b8:d3:00:94:74:b0:94:d5: ff:f3:38:58:a1:9e:3e:07:6f:bc:25:10:f8:fa:53:1d: fc:51:f0:0d:aa:60:3e:43:0d:b4:74:6d:46:64:f1:53: 48:73:bb:0f:38:81:19:c6:bb:b7:04:c7:99:b8:b0:70: 34:ae:73:31:18:0f:f4:89:05:0a:14:84:63:5f:d9:22: a3:7a:c1:b4:6c:60:8b:57:26:92:ac:e6:f7:e5:ba:87: d9:26:7e:eb:0d:1e:47:b5:24:8c:dd:7b:ff:0a:da:54: cf:82:71:aa:38:4a:1e:31:e4:0b:97:5d:ff:0f:a9:fe: c6:95:e4:b1:00:b7:85:70:f4:47:dc:fd:b6:5f:a6:16: 99:9c:3a:04:6a:28:f7:67:c5:37:7d:e1:77:c0:73:bc: b2:be:f3:72:99:0f:81:99:a7:57:b1:d2:a4:4e:34:98: fe:22:03:93:7b:c8:51:12:f3:f5:a7:18:50:12:10:74: 57:34:ca:ef:a6:f9:cf:ca:86:24:67:ee:2b:81:89:0b: 0e:fc:04:11:52:02:10:a5:60:6b:97:0e:50:58:a8:f3: f1:16:eb:da:63:45:fd:58:17:34:95:5f:99:bf:49:e0: c7:d0:c9:33:1f:52:3e:18:2d:12:c7:53:58:60:94:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:28:34:70:b0:64:06:3b:49:20:94:49:82:66:15:c3: 01:a6:47:8b:a3:01:5f:34:cd:9f:e6:a4:3a:08:27:84: 08:13:79:4c:f5:9d:26:c3:78:bb:5e:15:35:11:d3:1e: 65:cf:ff:88:2e:e5:cb:d1:6e:bd:ee:35:c0:2d:0a:8d: 02:b1:83:98:66:24:52:ba:d3:6d:6b:05:43:c4:81:51: 52:16:00:ea:b1:ff:7d:15:14:8d:4b:e3:35:10:a0:09: 52:3b:95:5f:3d:d7:fa:38:ce:df:63:09:98:5c:e0:ec: a1:a3:62:e6:ad:b3:45:1b:c7:81:f8:34:6f:ff:09:21: a6:cd:d3:d9:5b:bc:d9:09:92:ad:73:88:a9:58:32:86: 0f:19:95:88:be:10:f1:6e:e0:ca:5a:78:19:40:97:a8: 98:04:76:d0:a3:5d:f0:96:ec:68:9d:7d:e6:db:da:5f: 94:78:c0:83:f4:1c:8b:b5:45:00:00:dd:b2:3d:9a:20: 4d:b1:00:bd:ec:e4:45:de:29:81:8f:c7:9f:68:b3:b7: 39:b5:98:63:d1:44:9b:9b:30:c8:5b:69:0f:fe:bc:20: d9:0f:1a:d0:71:61:fb:29:16:b3:50:be:05:ae:8a:43: 1d:a7:94:f5:4d:03:06:18:a5:87:06:a0:21:f6:06:df Fingerprint (SHA-256): C2:96:C0:F3:CE:47:1E:14:39:6A:23:41:EC:E5:AA:C8:66:26:8F:76:88:8D:E7:BA:F0:B4:4C:B3:76:2E:C2:9E Fingerprint (SHA1): F6:83:FC:F5:C2:EA:71:79:29:D0:F6:EF:22:8D:D0:A7:B6:31:09:BE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4577: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4578: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043339 (0x6709c4b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:41:25 2016 Not After : Fri Jan 08 09:41:25 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:bc:ff:b6:47:44:ad:11:b4:48:2f:5e:96:02:10:20: ea:a8:dc:2d:8b:83:af:b3:ad:7a:ce:e5:e8:74:8e:2a: 37:e8:d6:bf:b7:97:f0:19:2b:84:fc:01:66:fe:7b:eb: 47:11:d5:c4:39:25:ce:55:f5:43:29:d7:77:ec:53:48: 30:03:af:86:cc:fd:81:03:62:dc:45:fb:e2:33:ae:49: 1a:2e:d0:1c:2f:d8:a2:4f:33:2a:9c:6b:8c:01:12:0a: d2:7a:1c:73:b4:b6:f8:3d:2a:25:5a:62:35:70:75:81: ee:98:30:84:51:a6:f0:b5:a1:a9:06:72:b4:b2:c2:91: 35:16:28:ee:57:8a:2e:4b:fa:d5:24:a2:77:4f:b9:82: e4:be:32:e1:95:5c:4a:d4:f9:44:eb:8c:69:74:f7:64: a2:14:78:33:db:5d:d7:8c:5a:82:37:16:3a:5b:3b:bb: 6e:09:bd:24:52:83:df:97:90:6a:60:36:4e:46:68:5c: 4e:66:44:06:99:40:8f:c0:fc:94:37:00:6a:3f:6f:ed: 56:b7:ff:95:30:60:35:f8:bc:bf:e1:e8:95:04:21:68: 4e:49:0f:86:4c:79:cd:14:72:bd:27:91:74:98:f1:ff: 89:4a:1e:d3:94:a5:33:e0:1b:0f:9b:8c:cf:d0:ab:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:2e:87:3d:01:28:94:87:5f:c3:83:b3:69:02:f5:d8: eb:0d:90:e8:ee:c3:9f:46:5d:bb:c8:f7:0f:9b:0b:bd: 13:33:e6:ec:35:54:95:d9:a1:17:bd:29:3a:78:2b:20: e1:54:04:46:e1:55:ec:a1:20:e6:8d:35:55:0c:bd:e3: 69:e0:d1:67:11:2f:ca:b5:5b:09:f7:0a:ee:3b:9c:cc: 8e:9c:ac:fe:98:e5:36:96:a4:4e:7f:f6:78:7f:f1:ec: 89:55:4e:27:c4:7e:a9:79:d9:c9:78:dd:74:5d:5a:e5: 51:5c:0a:e0:1b:9e:e5:90:dc:32:fa:76:62:65:b8:61: ea:a2:8e:91:30:4e:c0:69:ef:0e:c5:1f:51:97:6b:8e: 48:0a:38:ce:29:18:25:3b:f6:86:8c:8e:83:cb:7b:2a: b4:49:b0:cb:a5:b9:a6:98:1f:20:19:97:d7:fa:71:6a: 91:e2:26:2c:9b:78:c4:94:92:52:1f:bc:84:1d:9d:de: 0a:5d:2b:1a:72:de:ab:bb:a1:a7:72:8c:6e:cd:03:4e: 7e:f9:f0:43:f9:86:f9:7f:e1:e3:c0:92:a6:2d:fd:ae: 97:11:ef:51:b0:c3:62:8c:3e:2d:80:81:61:f6:e6:27: f2:ce:a9:eb:29:97:42:4e:21:cc:2c:4e:2a:d8:df:24 Fingerprint (SHA-256): DE:77:EF:F6:46:E8:29:B9:B5:8B:C5:38:C0:8C:43:38:34:41:AF:B2:B4:E0:89:D6:AD:0D:A9:85:1F:A3:7F:11 Fingerprint (SHA1): 00:A0:AB:8E:4A:85:D8:7C:60:F6:4F:BC:68:B7:9F:ED:3D:D1:B6:52 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4579: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4580: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043340 (0x6709c4c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 09:41:43 2016 Not After : Fri Jan 08 09:41:43 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:4f:61:db:51:7c:bc:45:19:06:a9:2c:6f:9d:42:00: 74:2e:3a:32:ad:6c:b2:90:42:70:72:c0:1e:06:41:02: 5c:9d:fa:9f:68:90:9e:c3:40:3f:17:c4:89:2a:21:a3: fb:e1:91:6f:5a:d9:81:28:f0:db:6f:c5:48:e4:a6:40: c6:df:9f:01:4e:5e:0c:35:46:4d:c4:2d:38:70:4e:7f: fd:1c:2b:1a:94:39:60:ef:d3:19:a5:0d:64:a2:47:43: 07:58:6b:03:d2:ca:23:6c:86:5d:9e:c6:a2:99:1e:2c: 75:82:79:1d:51:c4:aa:cc:10:88:bf:88:c7:44:92:70: 1a:b0:ea:64:cc:da:f9:72:eb:a1:45:23:b4:1f:7f:a2: 9b:47:a7:3b:fa:1e:87:0e:58:35:cd:9a:94:9a:9d:97: 71:01:6f:23:a1:31:61:07:ab:9c:a5:88:81:c6:15:41: d9:cd:19:97:d4:3e:f0:f8:97:cb:72:57:40:91:71:0f: 2d:fd:53:40:7e:ba:61:7b:30:70:a8:31:25:1e:24:5c: 1c:bb:85:f3:8b:42:f9:6e:8c:da:82:37:54:19:76:32: d0:67:ff:61:35:fa:c6:99:dc:de:dc:f5:6f:ad:2d:f6: d9:90:95:0e:e5:c0:0a:ce:db:c2:37:e2:c3:1e:11:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:f0:de:ca:11:18:40:b0:58:87:98:a4:2c:45:0f:55: 03:ab:ac:a0:55:d3:4c:7b:bd:32:58:e1:4c:15:6c:22: b1:ec:1a:8e:9b:8a:56:f8:0e:56:56:68:d7:ab:03:ff: aa:68:78:59:bd:d9:d0:18:5d:eb:d7:31:2d:85:10:de: 59:80:de:0b:cb:36:bb:22:83:be:38:18:f1:44:02:d3: 32:b1:9a:64:b2:d3:3e:cb:59:86:fe:28:0a:64:88:56: 6e:2c:c5:16:79:15:6d:1e:dd:09:ee:6e:24:ef:af:fe: 6e:15:16:e3:e1:6c:40:d9:09:19:9b:b6:5d:14:5e:68: 35:53:19:c8:ad:31:28:ef:a7:18:5e:22:39:38:7e:50: c5:fb:f2:1e:ed:ce:12:65:ff:b1:a8:ea:cb:b9:a0:bb: 52:fe:f1:a4:15:b3:c9:3a:77:28:18:30:02:de:5a:6e: 73:75:1d:e3:1c:03:46:bd:a5:e6:69:3b:d2:60:d1:ae: 4c:8d:ff:51:38:03:2f:6d:d5:d8:f6:2d:0f:90:0a:71: 4f:a3:b9:b0:3c:ce:b9:70:93:d4:36:1b:ef:95:8e:cc: d5:6c:68:f5:3f:d0:e7:c8:44:1a:18:80:29:41:a1:27: d0:30:67:7a:4f:24:fd:93:d7:28:eb:f3:be:99:7a:92 Fingerprint (SHA-256): 60:C8:60:BD:80:E9:BE:2E:9B:81:07:FA:0B:A4:90:AE:26:D9:11:CC:4E:6B:2A:98:8A:FC:00:2D:1A:B0:EF:52 Fingerprint (SHA1): 00:84:86:C8:0E:D3:D9:CE:59:1F:74:05:0E:15:E7:F9:E9:0E:7E:C8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #4581: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4582: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4583: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043342 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4584: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4585: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4586: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4587: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108043343 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4588: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4589: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4590: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4591: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108043344 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4592: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4593: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #4594: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4595: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108043345 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4596: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4597: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #4598: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4599: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108043346 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4600: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4601: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4602: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043342 (0x6709c4e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:42:16 2016 Not After : Fri Jan 08 09:42:16 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:ba:a2:10:75:4d:24:3f:15:d1:13:32:82:6a:be:97: 3d:83:ee:9d:84:f8:d5:47:bc:9d:78:57:21:03:d4:63: 71:3f:b8:81:8c:dc:3a:b4:e2:0b:df:d8:cd:8b:12:fc: 21:c2:c9:08:0b:c6:0d:57:d0:ed:37:68:6c:fb:61:b4: 04:e3:fe:45:87:b0:22:c3:ce:f4:08:57:4f:f0:59:c2: a2:10:81:a1:9a:d7:f5:a7:47:da:ff:89:ad:03:e4:43: 9f:e4:00:26:c7:57:8c:5b:8c:b6:2c:d4:2a:a6:c2:3b: 2c:40:c2:ac:92:36:33:5e:2c:e8:8d:9f:4c:5e:77:83: 2e:37:b9:ca:47:fa:18:3b:30:1c:87:31:09:dc:90:c6: de:b6:32:46:94:b4:d2:79:b2:00:02:8b:6b:e3:fe:9d: 37:1d:7f:7a:27:1f:c5:12:86:b6:eb:29:3f:4b:7e:ff: f4:6c:41:a6:0a:b7:71:37:93:4d:01:5d:dc:59:4d:2f: 1f:07:d4:d7:4d:f6:af:0b:a2:a4:0f:b2:ba:d9:77:bd: 0e:ac:aa:3c:0e:0e:ea:6a:f4:2e:ec:46:a5:50:bc:3c: d2:b1:09:2a:22:e7:d5:77:46:1d:8f:89:73:98:fb:d5: 43:0b:0e:60:6f:28:a1:aa:7b:13:fe:4e:7b:b8:57:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:5f:97:5d:70:e2:8a:50:b8:90:ab:9d:47:41:55:42: 2a:70:37:d4:37:71:2c:d6:88:08:cb:9e:9d:20:d5:17: 7c:7b:c5:a6:0a:4e:46:12:22:c6:a1:da:02:90:e9:c3: bf:fb:7d:c8:cd:f5:83:f7:80:6f:96:f3:dd:f9:84:1a: cf:f5:35:b7:b2:75:2e:b8:99:9d:d4:44:04:e9:f1:ab: 14:52:70:b3:06:71:7e:e0:ef:f7:83:2c:43:19:1d:07: b6:6d:90:5e:bd:5f:84:3e:14:26:b5:ad:1f:49:5e:89: 0f:51:21:83:52:bc:97:84:7b:c9:34:78:86:d8:15:70: 8b:c3:35:d0:89:5a:43:45:72:c5:a9:c8:75:a0:e5:c2: 05:8d:20:ae:5c:dd:15:30:59:32:eb:47:97:2e:6a:0d: e7:7f:d0:e0:29:82:2d:6b:19:fd:ec:4c:07:ae:67:a3: 2c:dc:a8:30:57:4e:69:d3:b9:f3:71:19:59:0e:4b:49: 30:60:3e:7c:c9:2a:f9:64:06:c1:c0:1b:8e:ea:b6:ec: 8b:39:1e:58:57:2c:1e:38:b0:46:5c:74:cd:c2:ce:db: e1:3c:47:1a:fb:ef:a1:2b:12:2e:db:23:76:c3:f4:1e: 7c:4a:14:bf:c0:7d:e2:bc:e3:b4:22:e9:38:2b:ff:18 Fingerprint (SHA-256): 4E:71:8A:06:97:CC:98:8C:70:8A:81:8C:B1:6F:C0:3D:52:5D:CD:66:38:81:4A:CC:CF:7C:E6:55:B0:ED:F8:1D Fingerprint (SHA1): 2F:67:4B:C8:23:49:1D:FE:BD:22:C5:D5:95:AF:2D:34:53:A8:0E:15 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4603: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4604: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043343 (0x6709c4f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:42:35 2016 Not After : Fri Jan 08 09:42:35 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:3b:88:2d:81:56:5a:5b:7c:60:76:1e:09:d1:b4:b5: 67:ce:f9:40:c8:98:f1:6b:e0:9c:05:cc:87:17:86:e2: 07:7c:e8:6e:44:c4:6a:f7:9f:42:9a:ba:fb:00:5f:eb: 06:3a:52:b1:8f:cd:ca:84:ab:21:8b:49:e2:b1:a9:37: b7:17:26:28:e7:21:88:6c:bf:e6:67:69:5c:f5:94:9f: f8:a7:14:f0:e4:20:1f:c1:19:e5:ec:99:73:07:b3:90: 3f:bb:1a:bc:42:33:86:9e:4a:26:13:f9:a8:65:f7:a3: dd:85:92:34:c1:fd:c5:41:d3:1e:8b:82:51:66:75:c7: eb:97:30:25:00:32:fd:4c:75:f1:d0:02:6f:c0:bb:52: 75:e4:fe:28:e9:31:f0:0f:b3:e9:de:af:6e:12:78:e2: 78:e0:20:2f:b0:a6:a8:e6:96:cb:43:d4:66:f7:7d:28: 22:d2:3a:02:27:b8:49:19:c6:e9:ff:0f:1d:f2:d5:53: ea:73:00:2d:c5:05:1b:c2:6b:f8:59:b2:c6:e6:00:5a: fe:59:f5:ef:d5:75:ae:bf:ca:68:fd:35:62:12:3c:50: 8b:67:d2:b7:b8:bd:21:3e:ae:37:73:83:ae:66:a9:a9: 83:68:a8:69:10:8e:9f:98:a6:ef:47:0a:1c:bd:45:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:a9:7b:7d:df:71:c1:9f:72:b2:f9:68:f3:f9:db:16: a8:16:b2:0a:f8:a3:d2:da:3e:2b:db:40:16:ae:bf:e5: 2a:d9:31:a4:c9:88:33:a7:9a:00:aa:8f:e4:8d:d9:93: 8f:23:8b:fb:25:be:e0:5d:7a:e6:44:ca:11:d7:d2:27: 3a:67:91:56:b9:50:ae:33:45:f4:cd:35:65:07:66:da: 4e:b4:c0:28:50:30:8b:5b:94:b0:25:92:5f:1d:31:55: 84:56:3f:8c:82:49:c3:e6:65:3b:e3:28:38:ff:d8:a8: 22:7c:4f:10:56:0c:41:ae:62:78:2b:23:d2:17:44:d1: 90:33:35:0e:f1:5e:52:52:76:2d:98:50:55:27:98:5b: 97:b2:2e:8b:f3:23:e0:e2:7e:6a:49:b3:9f:3a:45:e7: e0:95:78:72:10:b2:f9:40:6d:56:fd:c5:91:f2:16:48: 1e:6b:b4:66:57:a4:81:29:1a:7f:f7:e4:7a:15:89:d1: 4c:3c:48:b0:e0:c5:9f:c8:a1:5d:8d:e1:3b:ff:7b:0e: a8:5a:6d:a7:1d:76:47:3a:8e:b1:7a:1b:fd:50:82:ec: a2:aa:fa:85:59:85:f7:af:97:14:4d:ed:fa:f6:b7:98: 8a:f1:a7:c8:97:35:63:87:c0:d5:dd:02:bb:79:5b:19 Fingerprint (SHA-256): B0:9C:CC:81:D0:0F:F8:FD:81:81:3A:E1:02:1E:8D:EC:17:0D:9D:F6:CA:AA:38:F2:A4:00:2D:47:00:31:95:14 Fingerprint (SHA1): 72:F6:7D:13:CA:CB:70:8C:DE:0A:97:88:04:B0:C1:80:DF:06:8E:BA Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4605: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4606: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043344 (0x6709c50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 09:42:42 2016 Not After : Fri Jan 08 09:42:42 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:f0:33:79:a4:5c:bd:6e:67:b9:a1:48:ec:20:cb:0b: 0c:61:7e:ba:94:bc:70:2d:3f:a4:87:ac:02:92:f0:2d: a1:cc:3d:d9:06:42:f8:09:6a:c5:cd:8a:d5:11:bf:50: 5e:96:e3:8b:a5:f8:36:99:51:ee:52:f9:3a:26:d7:9e: 2b:6f:24:19:39:bd:83:bc:85:57:cb:e6:01:3c:2a:85: 52:92:4f:e6:eb:a1:d4:e9:e4:08:8d:63:57:7b:c4:b2: 0a:64:0f:d2:2c:0a:9b:9e:81:d7:57:9f:e2:e8:97:3c: a3:fc:fd:47:54:df:71:de:00:0d:f6:3a:bb:38:0c:67: 4d:a3:6b:43:a3:c9:0a:dc:4b:c4:95:b0:96:87:65:e6: e2:0d:67:5b:10:b4:75:0c:2c:4c:0d:b5:cc:3e:6d:f3: fe:69:bc:01:eb:ca:9c:94:4a:d1:4d:70:70:6f:a4:4f: 84:fd:0b:52:0e:f7:23:06:34:eb:67:c9:a4:92:fb:70: f2:1b:19:75:af:45:ef:11:d1:95:02:83:49:8e:a7:4d: 03:1a:6c:7a:0a:30:5c:a1:e7:b9:d9:94:2d:b1:43:cb: 00:82:08:4e:94:4c:70:8b:93:73:6b:ab:19:85:fd:52: 3d:b7:6a:f1:16:d7:f9:00:cb:12:18:85:e6:c9:c3:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:65:1e:d8:a7:7e:d7:03:33:b7:f4:68:2a:95:a6:33: 2c:b3:b3:59:20:94:dc:51:7d:16:3a:37:18:fc:7b:4c: 34:99:5d:f0:6a:67:e4:82:99:74:37:e7:ed:cb:81:f0: 57:29:0e:dc:92:62:aa:9b:b1:2e:d5:cc:ee:d6:83:30: 07:7f:fa:0d:7d:9e:36:67:e0:46:d7:30:5e:c6:7c:37: f6:14:da:49:9f:1f:c1:2d:3d:0b:14:31:02:1e:2b:1e: 6e:6f:a8:74:0e:30:47:e4:f5:6a:5d:70:16:a6:1a:3b: 41:4a:16:b3:e2:fc:c3:3c:50:16:49:49:7a:9e:6c:df: a7:4e:89:6c:53:c5:16:7d:a1:63:52:55:46:11:c1:a5: 91:87:de:9d:d3:3e:17:9e:79:ef:1f:4a:06:d0:34:2e: 0e:09:ab:a0:b2:9d:26:53:83:e6:ab:84:cd:21:b7:b7: e6:4a:94:4d:78:e3:5f:9d:e0:2d:45:13:06:f2:25:e2: fc:33:51:a8:96:cb:9a:21:7d:dd:a7:ea:8c:26:db:ed: 13:26:70:2c:b8:7d:df:96:c1:57:86:bf:cc:6d:6a:f2: b6:33:30:85:f3:a0:46:e4:20:97:47:8f:d4:81:63:f7: c8:7f:f1:cb:b3:01:78:c4:f5:5b:ea:1d:4b:07:33:a4 Fingerprint (SHA-256): 1D:AB:72:01:61:F2:DA:D8:B3:9C:84:D0:F2:A7:D6:32:52:A0:58:AA:AE:54:48:29:1D:0C:C8:C9:23:EC:A3:BB Fingerprint (SHA1): D4:C4:41:4C:2A:C2:35:64:51:4D:D4:0C:CD:EF:EB:3D:2D:BD:55:DC Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #4607: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4608: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4609: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4610: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4611: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043342 (0x6709c4e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:42:16 2016 Not After : Fri Jan 08 09:42:16 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:ba:a2:10:75:4d:24:3f:15:d1:13:32:82:6a:be:97: 3d:83:ee:9d:84:f8:d5:47:bc:9d:78:57:21:03:d4:63: 71:3f:b8:81:8c:dc:3a:b4:e2:0b:df:d8:cd:8b:12:fc: 21:c2:c9:08:0b:c6:0d:57:d0:ed:37:68:6c:fb:61:b4: 04:e3:fe:45:87:b0:22:c3:ce:f4:08:57:4f:f0:59:c2: a2:10:81:a1:9a:d7:f5:a7:47:da:ff:89:ad:03:e4:43: 9f:e4:00:26:c7:57:8c:5b:8c:b6:2c:d4:2a:a6:c2:3b: 2c:40:c2:ac:92:36:33:5e:2c:e8:8d:9f:4c:5e:77:83: 2e:37:b9:ca:47:fa:18:3b:30:1c:87:31:09:dc:90:c6: de:b6:32:46:94:b4:d2:79:b2:00:02:8b:6b:e3:fe:9d: 37:1d:7f:7a:27:1f:c5:12:86:b6:eb:29:3f:4b:7e:ff: f4:6c:41:a6:0a:b7:71:37:93:4d:01:5d:dc:59:4d:2f: 1f:07:d4:d7:4d:f6:af:0b:a2:a4:0f:b2:ba:d9:77:bd: 0e:ac:aa:3c:0e:0e:ea:6a:f4:2e:ec:46:a5:50:bc:3c: d2:b1:09:2a:22:e7:d5:77:46:1d:8f:89:73:98:fb:d5: 43:0b:0e:60:6f:28:a1:aa:7b:13:fe:4e:7b:b8:57:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:5f:97:5d:70:e2:8a:50:b8:90:ab:9d:47:41:55:42: 2a:70:37:d4:37:71:2c:d6:88:08:cb:9e:9d:20:d5:17: 7c:7b:c5:a6:0a:4e:46:12:22:c6:a1:da:02:90:e9:c3: bf:fb:7d:c8:cd:f5:83:f7:80:6f:96:f3:dd:f9:84:1a: cf:f5:35:b7:b2:75:2e:b8:99:9d:d4:44:04:e9:f1:ab: 14:52:70:b3:06:71:7e:e0:ef:f7:83:2c:43:19:1d:07: b6:6d:90:5e:bd:5f:84:3e:14:26:b5:ad:1f:49:5e:89: 0f:51:21:83:52:bc:97:84:7b:c9:34:78:86:d8:15:70: 8b:c3:35:d0:89:5a:43:45:72:c5:a9:c8:75:a0:e5:c2: 05:8d:20:ae:5c:dd:15:30:59:32:eb:47:97:2e:6a:0d: e7:7f:d0:e0:29:82:2d:6b:19:fd:ec:4c:07:ae:67:a3: 2c:dc:a8:30:57:4e:69:d3:b9:f3:71:19:59:0e:4b:49: 30:60:3e:7c:c9:2a:f9:64:06:c1:c0:1b:8e:ea:b6:ec: 8b:39:1e:58:57:2c:1e:38:b0:46:5c:74:cd:c2:ce:db: e1:3c:47:1a:fb:ef:a1:2b:12:2e:db:23:76:c3:f4:1e: 7c:4a:14:bf:c0:7d:e2:bc:e3:b4:22:e9:38:2b:ff:18 Fingerprint (SHA-256): 4E:71:8A:06:97:CC:98:8C:70:8A:81:8C:B1:6F:C0:3D:52:5D:CD:66:38:81:4A:CC:CF:7C:E6:55:B0:ED:F8:1D Fingerprint (SHA1): 2F:67:4B:C8:23:49:1D:FE:BD:22:C5:D5:95:AF:2D:34:53:A8:0E:15 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4612: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4613: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043343 (0x6709c4f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:42:35 2016 Not After : Fri Jan 08 09:42:35 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:3b:88:2d:81:56:5a:5b:7c:60:76:1e:09:d1:b4:b5: 67:ce:f9:40:c8:98:f1:6b:e0:9c:05:cc:87:17:86:e2: 07:7c:e8:6e:44:c4:6a:f7:9f:42:9a:ba:fb:00:5f:eb: 06:3a:52:b1:8f:cd:ca:84:ab:21:8b:49:e2:b1:a9:37: b7:17:26:28:e7:21:88:6c:bf:e6:67:69:5c:f5:94:9f: f8:a7:14:f0:e4:20:1f:c1:19:e5:ec:99:73:07:b3:90: 3f:bb:1a:bc:42:33:86:9e:4a:26:13:f9:a8:65:f7:a3: dd:85:92:34:c1:fd:c5:41:d3:1e:8b:82:51:66:75:c7: eb:97:30:25:00:32:fd:4c:75:f1:d0:02:6f:c0:bb:52: 75:e4:fe:28:e9:31:f0:0f:b3:e9:de:af:6e:12:78:e2: 78:e0:20:2f:b0:a6:a8:e6:96:cb:43:d4:66:f7:7d:28: 22:d2:3a:02:27:b8:49:19:c6:e9:ff:0f:1d:f2:d5:53: ea:73:00:2d:c5:05:1b:c2:6b:f8:59:b2:c6:e6:00:5a: fe:59:f5:ef:d5:75:ae:bf:ca:68:fd:35:62:12:3c:50: 8b:67:d2:b7:b8:bd:21:3e:ae:37:73:83:ae:66:a9:a9: 83:68:a8:69:10:8e:9f:98:a6:ef:47:0a:1c:bd:45:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:a9:7b:7d:df:71:c1:9f:72:b2:f9:68:f3:f9:db:16: a8:16:b2:0a:f8:a3:d2:da:3e:2b:db:40:16:ae:bf:e5: 2a:d9:31:a4:c9:88:33:a7:9a:00:aa:8f:e4:8d:d9:93: 8f:23:8b:fb:25:be:e0:5d:7a:e6:44:ca:11:d7:d2:27: 3a:67:91:56:b9:50:ae:33:45:f4:cd:35:65:07:66:da: 4e:b4:c0:28:50:30:8b:5b:94:b0:25:92:5f:1d:31:55: 84:56:3f:8c:82:49:c3:e6:65:3b:e3:28:38:ff:d8:a8: 22:7c:4f:10:56:0c:41:ae:62:78:2b:23:d2:17:44:d1: 90:33:35:0e:f1:5e:52:52:76:2d:98:50:55:27:98:5b: 97:b2:2e:8b:f3:23:e0:e2:7e:6a:49:b3:9f:3a:45:e7: e0:95:78:72:10:b2:f9:40:6d:56:fd:c5:91:f2:16:48: 1e:6b:b4:66:57:a4:81:29:1a:7f:f7:e4:7a:15:89:d1: 4c:3c:48:b0:e0:c5:9f:c8:a1:5d:8d:e1:3b:ff:7b:0e: a8:5a:6d:a7:1d:76:47:3a:8e:b1:7a:1b:fd:50:82:ec: a2:aa:fa:85:59:85:f7:af:97:14:4d:ed:fa:f6:b7:98: 8a:f1:a7:c8:97:35:63:87:c0:d5:dd:02:bb:79:5b:19 Fingerprint (SHA-256): B0:9C:CC:81:D0:0F:F8:FD:81:81:3A:E1:02:1E:8D:EC:17:0D:9D:F6:CA:AA:38:F2:A4:00:2D:47:00:31:95:14 Fingerprint (SHA1): 72:F6:7D:13:CA:CB:70:8C:DE:0A:97:88:04:B0:C1:80:DF:06:8E:BA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4614: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4615: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043344 (0x6709c50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 09:42:42 2016 Not After : Fri Jan 08 09:42:42 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:f0:33:79:a4:5c:bd:6e:67:b9:a1:48:ec:20:cb:0b: 0c:61:7e:ba:94:bc:70:2d:3f:a4:87:ac:02:92:f0:2d: a1:cc:3d:d9:06:42:f8:09:6a:c5:cd:8a:d5:11:bf:50: 5e:96:e3:8b:a5:f8:36:99:51:ee:52:f9:3a:26:d7:9e: 2b:6f:24:19:39:bd:83:bc:85:57:cb:e6:01:3c:2a:85: 52:92:4f:e6:eb:a1:d4:e9:e4:08:8d:63:57:7b:c4:b2: 0a:64:0f:d2:2c:0a:9b:9e:81:d7:57:9f:e2:e8:97:3c: a3:fc:fd:47:54:df:71:de:00:0d:f6:3a:bb:38:0c:67: 4d:a3:6b:43:a3:c9:0a:dc:4b:c4:95:b0:96:87:65:e6: e2:0d:67:5b:10:b4:75:0c:2c:4c:0d:b5:cc:3e:6d:f3: fe:69:bc:01:eb:ca:9c:94:4a:d1:4d:70:70:6f:a4:4f: 84:fd:0b:52:0e:f7:23:06:34:eb:67:c9:a4:92:fb:70: f2:1b:19:75:af:45:ef:11:d1:95:02:83:49:8e:a7:4d: 03:1a:6c:7a:0a:30:5c:a1:e7:b9:d9:94:2d:b1:43:cb: 00:82:08:4e:94:4c:70:8b:93:73:6b:ab:19:85:fd:52: 3d:b7:6a:f1:16:d7:f9:00:cb:12:18:85:e6:c9:c3:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:65:1e:d8:a7:7e:d7:03:33:b7:f4:68:2a:95:a6:33: 2c:b3:b3:59:20:94:dc:51:7d:16:3a:37:18:fc:7b:4c: 34:99:5d:f0:6a:67:e4:82:99:74:37:e7:ed:cb:81:f0: 57:29:0e:dc:92:62:aa:9b:b1:2e:d5:cc:ee:d6:83:30: 07:7f:fa:0d:7d:9e:36:67:e0:46:d7:30:5e:c6:7c:37: f6:14:da:49:9f:1f:c1:2d:3d:0b:14:31:02:1e:2b:1e: 6e:6f:a8:74:0e:30:47:e4:f5:6a:5d:70:16:a6:1a:3b: 41:4a:16:b3:e2:fc:c3:3c:50:16:49:49:7a:9e:6c:df: a7:4e:89:6c:53:c5:16:7d:a1:63:52:55:46:11:c1:a5: 91:87:de:9d:d3:3e:17:9e:79:ef:1f:4a:06:d0:34:2e: 0e:09:ab:a0:b2:9d:26:53:83:e6:ab:84:cd:21:b7:b7: e6:4a:94:4d:78:e3:5f:9d:e0:2d:45:13:06:f2:25:e2: fc:33:51:a8:96:cb:9a:21:7d:dd:a7:ea:8c:26:db:ed: 13:26:70:2c:b8:7d:df:96:c1:57:86:bf:cc:6d:6a:f2: b6:33:30:85:f3:a0:46:e4:20:97:47:8f:d4:81:63:f7: c8:7f:f1:cb:b3:01:78:c4:f5:5b:ea:1d:4b:07:33:a4 Fingerprint (SHA-256): 1D:AB:72:01:61:F2:DA:D8:B3:9C:84:D0:F2:A7:D6:32:52:A0:58:AA:AE:54:48:29:1D:0C:C8:C9:23:EC:A3:BB Fingerprint (SHA1): D4:C4:41:4C:2A:C2:35:64:51:4D:D4:0C:CD:EF:EB:3D:2D:BD:55:DC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #4616: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4617: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043342 (0x6709c4e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:42:16 2016 Not After : Fri Jan 08 09:42:16 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:ba:a2:10:75:4d:24:3f:15:d1:13:32:82:6a:be:97: 3d:83:ee:9d:84:f8:d5:47:bc:9d:78:57:21:03:d4:63: 71:3f:b8:81:8c:dc:3a:b4:e2:0b:df:d8:cd:8b:12:fc: 21:c2:c9:08:0b:c6:0d:57:d0:ed:37:68:6c:fb:61:b4: 04:e3:fe:45:87:b0:22:c3:ce:f4:08:57:4f:f0:59:c2: a2:10:81:a1:9a:d7:f5:a7:47:da:ff:89:ad:03:e4:43: 9f:e4:00:26:c7:57:8c:5b:8c:b6:2c:d4:2a:a6:c2:3b: 2c:40:c2:ac:92:36:33:5e:2c:e8:8d:9f:4c:5e:77:83: 2e:37:b9:ca:47:fa:18:3b:30:1c:87:31:09:dc:90:c6: de:b6:32:46:94:b4:d2:79:b2:00:02:8b:6b:e3:fe:9d: 37:1d:7f:7a:27:1f:c5:12:86:b6:eb:29:3f:4b:7e:ff: f4:6c:41:a6:0a:b7:71:37:93:4d:01:5d:dc:59:4d:2f: 1f:07:d4:d7:4d:f6:af:0b:a2:a4:0f:b2:ba:d9:77:bd: 0e:ac:aa:3c:0e:0e:ea:6a:f4:2e:ec:46:a5:50:bc:3c: d2:b1:09:2a:22:e7:d5:77:46:1d:8f:89:73:98:fb:d5: 43:0b:0e:60:6f:28:a1:aa:7b:13:fe:4e:7b:b8:57:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:5f:97:5d:70:e2:8a:50:b8:90:ab:9d:47:41:55:42: 2a:70:37:d4:37:71:2c:d6:88:08:cb:9e:9d:20:d5:17: 7c:7b:c5:a6:0a:4e:46:12:22:c6:a1:da:02:90:e9:c3: bf:fb:7d:c8:cd:f5:83:f7:80:6f:96:f3:dd:f9:84:1a: cf:f5:35:b7:b2:75:2e:b8:99:9d:d4:44:04:e9:f1:ab: 14:52:70:b3:06:71:7e:e0:ef:f7:83:2c:43:19:1d:07: b6:6d:90:5e:bd:5f:84:3e:14:26:b5:ad:1f:49:5e:89: 0f:51:21:83:52:bc:97:84:7b:c9:34:78:86:d8:15:70: 8b:c3:35:d0:89:5a:43:45:72:c5:a9:c8:75:a0:e5:c2: 05:8d:20:ae:5c:dd:15:30:59:32:eb:47:97:2e:6a:0d: e7:7f:d0:e0:29:82:2d:6b:19:fd:ec:4c:07:ae:67:a3: 2c:dc:a8:30:57:4e:69:d3:b9:f3:71:19:59:0e:4b:49: 30:60:3e:7c:c9:2a:f9:64:06:c1:c0:1b:8e:ea:b6:ec: 8b:39:1e:58:57:2c:1e:38:b0:46:5c:74:cd:c2:ce:db: e1:3c:47:1a:fb:ef:a1:2b:12:2e:db:23:76:c3:f4:1e: 7c:4a:14:bf:c0:7d:e2:bc:e3:b4:22:e9:38:2b:ff:18 Fingerprint (SHA-256): 4E:71:8A:06:97:CC:98:8C:70:8A:81:8C:B1:6F:C0:3D:52:5D:CD:66:38:81:4A:CC:CF:7C:E6:55:B0:ED:F8:1D Fingerprint (SHA1): 2F:67:4B:C8:23:49:1D:FE:BD:22:C5:D5:95:AF:2D:34:53:A8:0E:15 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4618: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043342 (0x6709c4e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:42:16 2016 Not After : Fri Jan 08 09:42:16 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:ba:a2:10:75:4d:24:3f:15:d1:13:32:82:6a:be:97: 3d:83:ee:9d:84:f8:d5:47:bc:9d:78:57:21:03:d4:63: 71:3f:b8:81:8c:dc:3a:b4:e2:0b:df:d8:cd:8b:12:fc: 21:c2:c9:08:0b:c6:0d:57:d0:ed:37:68:6c:fb:61:b4: 04:e3:fe:45:87:b0:22:c3:ce:f4:08:57:4f:f0:59:c2: a2:10:81:a1:9a:d7:f5:a7:47:da:ff:89:ad:03:e4:43: 9f:e4:00:26:c7:57:8c:5b:8c:b6:2c:d4:2a:a6:c2:3b: 2c:40:c2:ac:92:36:33:5e:2c:e8:8d:9f:4c:5e:77:83: 2e:37:b9:ca:47:fa:18:3b:30:1c:87:31:09:dc:90:c6: de:b6:32:46:94:b4:d2:79:b2:00:02:8b:6b:e3:fe:9d: 37:1d:7f:7a:27:1f:c5:12:86:b6:eb:29:3f:4b:7e:ff: f4:6c:41:a6:0a:b7:71:37:93:4d:01:5d:dc:59:4d:2f: 1f:07:d4:d7:4d:f6:af:0b:a2:a4:0f:b2:ba:d9:77:bd: 0e:ac:aa:3c:0e:0e:ea:6a:f4:2e:ec:46:a5:50:bc:3c: d2:b1:09:2a:22:e7:d5:77:46:1d:8f:89:73:98:fb:d5: 43:0b:0e:60:6f:28:a1:aa:7b:13:fe:4e:7b:b8:57:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:5f:97:5d:70:e2:8a:50:b8:90:ab:9d:47:41:55:42: 2a:70:37:d4:37:71:2c:d6:88:08:cb:9e:9d:20:d5:17: 7c:7b:c5:a6:0a:4e:46:12:22:c6:a1:da:02:90:e9:c3: bf:fb:7d:c8:cd:f5:83:f7:80:6f:96:f3:dd:f9:84:1a: cf:f5:35:b7:b2:75:2e:b8:99:9d:d4:44:04:e9:f1:ab: 14:52:70:b3:06:71:7e:e0:ef:f7:83:2c:43:19:1d:07: b6:6d:90:5e:bd:5f:84:3e:14:26:b5:ad:1f:49:5e:89: 0f:51:21:83:52:bc:97:84:7b:c9:34:78:86:d8:15:70: 8b:c3:35:d0:89:5a:43:45:72:c5:a9:c8:75:a0:e5:c2: 05:8d:20:ae:5c:dd:15:30:59:32:eb:47:97:2e:6a:0d: e7:7f:d0:e0:29:82:2d:6b:19:fd:ec:4c:07:ae:67:a3: 2c:dc:a8:30:57:4e:69:d3:b9:f3:71:19:59:0e:4b:49: 30:60:3e:7c:c9:2a:f9:64:06:c1:c0:1b:8e:ea:b6:ec: 8b:39:1e:58:57:2c:1e:38:b0:46:5c:74:cd:c2:ce:db: e1:3c:47:1a:fb:ef:a1:2b:12:2e:db:23:76:c3:f4:1e: 7c:4a:14:bf:c0:7d:e2:bc:e3:b4:22:e9:38:2b:ff:18 Fingerprint (SHA-256): 4E:71:8A:06:97:CC:98:8C:70:8A:81:8C:B1:6F:C0:3D:52:5D:CD:66:38:81:4A:CC:CF:7C:E6:55:B0:ED:F8:1D Fingerprint (SHA1): 2F:67:4B:C8:23:49:1D:FE:BD:22:C5:D5:95:AF:2D:34:53:A8:0E:15 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4619: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043343 (0x6709c4f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:42:35 2016 Not After : Fri Jan 08 09:42:35 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:3b:88:2d:81:56:5a:5b:7c:60:76:1e:09:d1:b4:b5: 67:ce:f9:40:c8:98:f1:6b:e0:9c:05:cc:87:17:86:e2: 07:7c:e8:6e:44:c4:6a:f7:9f:42:9a:ba:fb:00:5f:eb: 06:3a:52:b1:8f:cd:ca:84:ab:21:8b:49:e2:b1:a9:37: b7:17:26:28:e7:21:88:6c:bf:e6:67:69:5c:f5:94:9f: f8:a7:14:f0:e4:20:1f:c1:19:e5:ec:99:73:07:b3:90: 3f:bb:1a:bc:42:33:86:9e:4a:26:13:f9:a8:65:f7:a3: dd:85:92:34:c1:fd:c5:41:d3:1e:8b:82:51:66:75:c7: eb:97:30:25:00:32:fd:4c:75:f1:d0:02:6f:c0:bb:52: 75:e4:fe:28:e9:31:f0:0f:b3:e9:de:af:6e:12:78:e2: 78:e0:20:2f:b0:a6:a8:e6:96:cb:43:d4:66:f7:7d:28: 22:d2:3a:02:27:b8:49:19:c6:e9:ff:0f:1d:f2:d5:53: ea:73:00:2d:c5:05:1b:c2:6b:f8:59:b2:c6:e6:00:5a: fe:59:f5:ef:d5:75:ae:bf:ca:68:fd:35:62:12:3c:50: 8b:67:d2:b7:b8:bd:21:3e:ae:37:73:83:ae:66:a9:a9: 83:68:a8:69:10:8e:9f:98:a6:ef:47:0a:1c:bd:45:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:a9:7b:7d:df:71:c1:9f:72:b2:f9:68:f3:f9:db:16: a8:16:b2:0a:f8:a3:d2:da:3e:2b:db:40:16:ae:bf:e5: 2a:d9:31:a4:c9:88:33:a7:9a:00:aa:8f:e4:8d:d9:93: 8f:23:8b:fb:25:be:e0:5d:7a:e6:44:ca:11:d7:d2:27: 3a:67:91:56:b9:50:ae:33:45:f4:cd:35:65:07:66:da: 4e:b4:c0:28:50:30:8b:5b:94:b0:25:92:5f:1d:31:55: 84:56:3f:8c:82:49:c3:e6:65:3b:e3:28:38:ff:d8:a8: 22:7c:4f:10:56:0c:41:ae:62:78:2b:23:d2:17:44:d1: 90:33:35:0e:f1:5e:52:52:76:2d:98:50:55:27:98:5b: 97:b2:2e:8b:f3:23:e0:e2:7e:6a:49:b3:9f:3a:45:e7: e0:95:78:72:10:b2:f9:40:6d:56:fd:c5:91:f2:16:48: 1e:6b:b4:66:57:a4:81:29:1a:7f:f7:e4:7a:15:89:d1: 4c:3c:48:b0:e0:c5:9f:c8:a1:5d:8d:e1:3b:ff:7b:0e: a8:5a:6d:a7:1d:76:47:3a:8e:b1:7a:1b:fd:50:82:ec: a2:aa:fa:85:59:85:f7:af:97:14:4d:ed:fa:f6:b7:98: 8a:f1:a7:c8:97:35:63:87:c0:d5:dd:02:bb:79:5b:19 Fingerprint (SHA-256): B0:9C:CC:81:D0:0F:F8:FD:81:81:3A:E1:02:1E:8D:EC:17:0D:9D:F6:CA:AA:38:F2:A4:00:2D:47:00:31:95:14 Fingerprint (SHA1): 72:F6:7D:13:CA:CB:70:8C:DE:0A:97:88:04:B0:C1:80:DF:06:8E:BA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4620: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043343 (0x6709c4f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:42:35 2016 Not After : Fri Jan 08 09:42:35 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:3b:88:2d:81:56:5a:5b:7c:60:76:1e:09:d1:b4:b5: 67:ce:f9:40:c8:98:f1:6b:e0:9c:05:cc:87:17:86:e2: 07:7c:e8:6e:44:c4:6a:f7:9f:42:9a:ba:fb:00:5f:eb: 06:3a:52:b1:8f:cd:ca:84:ab:21:8b:49:e2:b1:a9:37: b7:17:26:28:e7:21:88:6c:bf:e6:67:69:5c:f5:94:9f: f8:a7:14:f0:e4:20:1f:c1:19:e5:ec:99:73:07:b3:90: 3f:bb:1a:bc:42:33:86:9e:4a:26:13:f9:a8:65:f7:a3: dd:85:92:34:c1:fd:c5:41:d3:1e:8b:82:51:66:75:c7: eb:97:30:25:00:32:fd:4c:75:f1:d0:02:6f:c0:bb:52: 75:e4:fe:28:e9:31:f0:0f:b3:e9:de:af:6e:12:78:e2: 78:e0:20:2f:b0:a6:a8:e6:96:cb:43:d4:66:f7:7d:28: 22:d2:3a:02:27:b8:49:19:c6:e9:ff:0f:1d:f2:d5:53: ea:73:00:2d:c5:05:1b:c2:6b:f8:59:b2:c6:e6:00:5a: fe:59:f5:ef:d5:75:ae:bf:ca:68:fd:35:62:12:3c:50: 8b:67:d2:b7:b8:bd:21:3e:ae:37:73:83:ae:66:a9:a9: 83:68:a8:69:10:8e:9f:98:a6:ef:47:0a:1c:bd:45:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:a9:7b:7d:df:71:c1:9f:72:b2:f9:68:f3:f9:db:16: a8:16:b2:0a:f8:a3:d2:da:3e:2b:db:40:16:ae:bf:e5: 2a:d9:31:a4:c9:88:33:a7:9a:00:aa:8f:e4:8d:d9:93: 8f:23:8b:fb:25:be:e0:5d:7a:e6:44:ca:11:d7:d2:27: 3a:67:91:56:b9:50:ae:33:45:f4:cd:35:65:07:66:da: 4e:b4:c0:28:50:30:8b:5b:94:b0:25:92:5f:1d:31:55: 84:56:3f:8c:82:49:c3:e6:65:3b:e3:28:38:ff:d8:a8: 22:7c:4f:10:56:0c:41:ae:62:78:2b:23:d2:17:44:d1: 90:33:35:0e:f1:5e:52:52:76:2d:98:50:55:27:98:5b: 97:b2:2e:8b:f3:23:e0:e2:7e:6a:49:b3:9f:3a:45:e7: e0:95:78:72:10:b2:f9:40:6d:56:fd:c5:91:f2:16:48: 1e:6b:b4:66:57:a4:81:29:1a:7f:f7:e4:7a:15:89:d1: 4c:3c:48:b0:e0:c5:9f:c8:a1:5d:8d:e1:3b:ff:7b:0e: a8:5a:6d:a7:1d:76:47:3a:8e:b1:7a:1b:fd:50:82:ec: a2:aa:fa:85:59:85:f7:af:97:14:4d:ed:fa:f6:b7:98: 8a:f1:a7:c8:97:35:63:87:c0:d5:dd:02:bb:79:5b:19 Fingerprint (SHA-256): B0:9C:CC:81:D0:0F:F8:FD:81:81:3A:E1:02:1E:8D:EC:17:0D:9D:F6:CA:AA:38:F2:A4:00:2D:47:00:31:95:14 Fingerprint (SHA1): 72:F6:7D:13:CA:CB:70:8C:DE:0A:97:88:04:B0:C1:80:DF:06:8E:BA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4621: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043344 (0x6709c50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 09:42:42 2016 Not After : Fri Jan 08 09:42:42 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:f0:33:79:a4:5c:bd:6e:67:b9:a1:48:ec:20:cb:0b: 0c:61:7e:ba:94:bc:70:2d:3f:a4:87:ac:02:92:f0:2d: a1:cc:3d:d9:06:42:f8:09:6a:c5:cd:8a:d5:11:bf:50: 5e:96:e3:8b:a5:f8:36:99:51:ee:52:f9:3a:26:d7:9e: 2b:6f:24:19:39:bd:83:bc:85:57:cb:e6:01:3c:2a:85: 52:92:4f:e6:eb:a1:d4:e9:e4:08:8d:63:57:7b:c4:b2: 0a:64:0f:d2:2c:0a:9b:9e:81:d7:57:9f:e2:e8:97:3c: a3:fc:fd:47:54:df:71:de:00:0d:f6:3a:bb:38:0c:67: 4d:a3:6b:43:a3:c9:0a:dc:4b:c4:95:b0:96:87:65:e6: e2:0d:67:5b:10:b4:75:0c:2c:4c:0d:b5:cc:3e:6d:f3: fe:69:bc:01:eb:ca:9c:94:4a:d1:4d:70:70:6f:a4:4f: 84:fd:0b:52:0e:f7:23:06:34:eb:67:c9:a4:92:fb:70: f2:1b:19:75:af:45:ef:11:d1:95:02:83:49:8e:a7:4d: 03:1a:6c:7a:0a:30:5c:a1:e7:b9:d9:94:2d:b1:43:cb: 00:82:08:4e:94:4c:70:8b:93:73:6b:ab:19:85:fd:52: 3d:b7:6a:f1:16:d7:f9:00:cb:12:18:85:e6:c9:c3:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:65:1e:d8:a7:7e:d7:03:33:b7:f4:68:2a:95:a6:33: 2c:b3:b3:59:20:94:dc:51:7d:16:3a:37:18:fc:7b:4c: 34:99:5d:f0:6a:67:e4:82:99:74:37:e7:ed:cb:81:f0: 57:29:0e:dc:92:62:aa:9b:b1:2e:d5:cc:ee:d6:83:30: 07:7f:fa:0d:7d:9e:36:67:e0:46:d7:30:5e:c6:7c:37: f6:14:da:49:9f:1f:c1:2d:3d:0b:14:31:02:1e:2b:1e: 6e:6f:a8:74:0e:30:47:e4:f5:6a:5d:70:16:a6:1a:3b: 41:4a:16:b3:e2:fc:c3:3c:50:16:49:49:7a:9e:6c:df: a7:4e:89:6c:53:c5:16:7d:a1:63:52:55:46:11:c1:a5: 91:87:de:9d:d3:3e:17:9e:79:ef:1f:4a:06:d0:34:2e: 0e:09:ab:a0:b2:9d:26:53:83:e6:ab:84:cd:21:b7:b7: e6:4a:94:4d:78:e3:5f:9d:e0:2d:45:13:06:f2:25:e2: fc:33:51:a8:96:cb:9a:21:7d:dd:a7:ea:8c:26:db:ed: 13:26:70:2c:b8:7d:df:96:c1:57:86:bf:cc:6d:6a:f2: b6:33:30:85:f3:a0:46:e4:20:97:47:8f:d4:81:63:f7: c8:7f:f1:cb:b3:01:78:c4:f5:5b:ea:1d:4b:07:33:a4 Fingerprint (SHA-256): 1D:AB:72:01:61:F2:DA:D8:B3:9C:84:D0:F2:A7:D6:32:52:A0:58:AA:AE:54:48:29:1D:0C:C8:C9:23:EC:A3:BB Fingerprint (SHA1): D4:C4:41:4C:2A:C2:35:64:51:4D:D4:0C:CD:EF:EB:3D:2D:BD:55:DC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #4622: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043344 (0x6709c50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 09:42:42 2016 Not After : Fri Jan 08 09:42:42 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:f0:33:79:a4:5c:bd:6e:67:b9:a1:48:ec:20:cb:0b: 0c:61:7e:ba:94:bc:70:2d:3f:a4:87:ac:02:92:f0:2d: a1:cc:3d:d9:06:42:f8:09:6a:c5:cd:8a:d5:11:bf:50: 5e:96:e3:8b:a5:f8:36:99:51:ee:52:f9:3a:26:d7:9e: 2b:6f:24:19:39:bd:83:bc:85:57:cb:e6:01:3c:2a:85: 52:92:4f:e6:eb:a1:d4:e9:e4:08:8d:63:57:7b:c4:b2: 0a:64:0f:d2:2c:0a:9b:9e:81:d7:57:9f:e2:e8:97:3c: a3:fc:fd:47:54:df:71:de:00:0d:f6:3a:bb:38:0c:67: 4d:a3:6b:43:a3:c9:0a:dc:4b:c4:95:b0:96:87:65:e6: e2:0d:67:5b:10:b4:75:0c:2c:4c:0d:b5:cc:3e:6d:f3: fe:69:bc:01:eb:ca:9c:94:4a:d1:4d:70:70:6f:a4:4f: 84:fd:0b:52:0e:f7:23:06:34:eb:67:c9:a4:92:fb:70: f2:1b:19:75:af:45:ef:11:d1:95:02:83:49:8e:a7:4d: 03:1a:6c:7a:0a:30:5c:a1:e7:b9:d9:94:2d:b1:43:cb: 00:82:08:4e:94:4c:70:8b:93:73:6b:ab:19:85:fd:52: 3d:b7:6a:f1:16:d7:f9:00:cb:12:18:85:e6:c9:c3:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:65:1e:d8:a7:7e:d7:03:33:b7:f4:68:2a:95:a6:33: 2c:b3:b3:59:20:94:dc:51:7d:16:3a:37:18:fc:7b:4c: 34:99:5d:f0:6a:67:e4:82:99:74:37:e7:ed:cb:81:f0: 57:29:0e:dc:92:62:aa:9b:b1:2e:d5:cc:ee:d6:83:30: 07:7f:fa:0d:7d:9e:36:67:e0:46:d7:30:5e:c6:7c:37: f6:14:da:49:9f:1f:c1:2d:3d:0b:14:31:02:1e:2b:1e: 6e:6f:a8:74:0e:30:47:e4:f5:6a:5d:70:16:a6:1a:3b: 41:4a:16:b3:e2:fc:c3:3c:50:16:49:49:7a:9e:6c:df: a7:4e:89:6c:53:c5:16:7d:a1:63:52:55:46:11:c1:a5: 91:87:de:9d:d3:3e:17:9e:79:ef:1f:4a:06:d0:34:2e: 0e:09:ab:a0:b2:9d:26:53:83:e6:ab:84:cd:21:b7:b7: e6:4a:94:4d:78:e3:5f:9d:e0:2d:45:13:06:f2:25:e2: fc:33:51:a8:96:cb:9a:21:7d:dd:a7:ea:8c:26:db:ed: 13:26:70:2c:b8:7d:df:96:c1:57:86:bf:cc:6d:6a:f2: b6:33:30:85:f3:a0:46:e4:20:97:47:8f:d4:81:63:f7: c8:7f:f1:cb:b3:01:78:c4:f5:5b:ea:1d:4b:07:33:a4 Fingerprint (SHA-256): 1D:AB:72:01:61:F2:DA:D8:B3:9C:84:D0:F2:A7:D6:32:52:A0:58:AA:AE:54:48:29:1D:0C:C8:C9:23:EC:A3:BB Fingerprint (SHA1): D4:C4:41:4C:2A:C2:35:64:51:4D:D4:0C:CD:EF:EB:3D:2D:BD:55:DC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #4623: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #4624: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043347 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4625: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #4626: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4627: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4628: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108043348 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4629: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4630: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4631: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4632: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108043349 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4633: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4634: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #4635: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4636: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 108043350 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4637: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4638: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #4639: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4640: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108043351 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4641: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4642: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #4643: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4644: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108043352 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4645: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4646: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #4647: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4648: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 108043353 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4649: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4650: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4651: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #4652: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #4653: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4654: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #4655: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043347 (0x6709c53) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 09:43:35 2016 Not After : Fri Jan 08 09:43:35 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:3c:e4:da:21:ea:1f:cd:75:36:23:54:21:b7:2b:d7: f6:a3:36:cd:33:99:bb:a3:44:69:32:56:8c:f8:fe:ad: 39:7d:47:92:45:0f:05:7f:8d:6e:24:f3:3a:c2:f3:6f: ff:b8:54:41:5b:55:52:85:4b:6b:8e:c4:75:8e:7b:d4: d1:d4:19:4e:7d:90:50:9e:d4:d2:11:07:4f:60:5c:5f: 37:d5:3e:89:71:8b:7f:e6:f4:42:be:04:60:9d:c0:ba: dd:44:15:3d:ef:b9:02:43:42:c1:91:f4:7f:4b:ef:a8: 2c:90:c1:8b:04:fb:ac:bb:47:45:cc:65:48:46:8b:c7: d4:55:fb:d5:16:89:3f:0c:ca:18:76:48:1f:0e:81:cd: 09:30:5a:f4:49:3b:a4:26:56:99:df:8d:b8:fc:87:66: 8b:49:11:36:63:be:df:e9:41:f3:3d:64:42:8e:3d:29: 80:80:79:c0:9d:32:55:d8:25:7f:79:6a:53:4d:3f:d7: 66:aa:0f:1a:9c:6c:74:db:07:d5:a3:fe:28:b5:ff:40: be:52:6e:be:f9:df:0e:7a:02:e0:01:ff:59:32:2c:08: c1:e3:31:87:3e:a4:f4:b9:7d:d4:60:9e:85:57:2e:ae: a7:f7:6d:e7:eb:42:3f:8d:77:54:11:a3:7f:70:15:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:ea:f2:ab:76:08:9b:23:16:fc:16:7c:7d:ac:d6:47: 69:39:70:7c:20:51:dc:b3:87:79:ed:83:7d:eb:3c:b2: c9:dc:9b:88:a0:ca:35:6a:94:94:68:45:4d:77:9b:a8: 2d:2b:76:1c:ed:ee:42:8c:f6:72:9f:44:c1:58:4c:45: bc:a8:be:74:84:bc:c7:33:58:4c:f9:64:4c:44:b2:ba: e4:9f:5f:9a:89:5b:b3:d2:38:2c:7e:92:f1:bb:48:15: 13:20:01:84:8d:77:cb:db:3c:3b:c7:70:fe:e5:b5:2f: b3:54:20:a2:e1:2c:cc:2f:a4:7e:f8:bb:fd:48:96:8a: 4a:a6:34:01:e0:b2:a9:15:7d:8a:39:d1:2c:d4:42:54: 15:dc:0a:a9:32:f8:97:27:f8:d9:0a:f1:f5:e0:96:23: e6:0b:86:a6:22:f4:48:98:52:d6:6b:e3:a4:92:e6:9e: 7b:ed:ba:54:b4:d0:e7:ad:89:98:34:d5:4c:1b:57:45: 5f:61:95:26:35:ce:12:a5:35:61:34:1b:e8:f5:d2:ba: c9:f1:a8:75:31:79:9e:7f:c8:dd:c2:5f:06:f5:40:41: 97:f7:a4:a3:7a:9f:1f:f4:95:bb:3b:5f:99:f6:e9:b8: e2:53:86:72:63:7c:2d:42:8d:d4:3f:2e:fb:5c:2b:22 Fingerprint (SHA-256): 01:4F:38:9B:3E:F9:C5:58:7E:15:53:56:B1:E2:6D:B0:E1:A6:F3:CF:96:C7:DF:58:AA:46:B4:9B:93:0D:9B:EB Fingerprint (SHA1): 67:FB:89:32:5A:56:84:73:2C:9A:85:03:07:4B:6D:D5:CE:E9:62:4A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4656: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4657: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4658: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4659: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043347 (0x6709c53) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 09:43:35 2016 Not After : Fri Jan 08 09:43:35 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:3c:e4:da:21:ea:1f:cd:75:36:23:54:21:b7:2b:d7: f6:a3:36:cd:33:99:bb:a3:44:69:32:56:8c:f8:fe:ad: 39:7d:47:92:45:0f:05:7f:8d:6e:24:f3:3a:c2:f3:6f: ff:b8:54:41:5b:55:52:85:4b:6b:8e:c4:75:8e:7b:d4: d1:d4:19:4e:7d:90:50:9e:d4:d2:11:07:4f:60:5c:5f: 37:d5:3e:89:71:8b:7f:e6:f4:42:be:04:60:9d:c0:ba: dd:44:15:3d:ef:b9:02:43:42:c1:91:f4:7f:4b:ef:a8: 2c:90:c1:8b:04:fb:ac:bb:47:45:cc:65:48:46:8b:c7: d4:55:fb:d5:16:89:3f:0c:ca:18:76:48:1f:0e:81:cd: 09:30:5a:f4:49:3b:a4:26:56:99:df:8d:b8:fc:87:66: 8b:49:11:36:63:be:df:e9:41:f3:3d:64:42:8e:3d:29: 80:80:79:c0:9d:32:55:d8:25:7f:79:6a:53:4d:3f:d7: 66:aa:0f:1a:9c:6c:74:db:07:d5:a3:fe:28:b5:ff:40: be:52:6e:be:f9:df:0e:7a:02:e0:01:ff:59:32:2c:08: c1:e3:31:87:3e:a4:f4:b9:7d:d4:60:9e:85:57:2e:ae: a7:f7:6d:e7:eb:42:3f:8d:77:54:11:a3:7f:70:15:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:ea:f2:ab:76:08:9b:23:16:fc:16:7c:7d:ac:d6:47: 69:39:70:7c:20:51:dc:b3:87:79:ed:83:7d:eb:3c:b2: c9:dc:9b:88:a0:ca:35:6a:94:94:68:45:4d:77:9b:a8: 2d:2b:76:1c:ed:ee:42:8c:f6:72:9f:44:c1:58:4c:45: bc:a8:be:74:84:bc:c7:33:58:4c:f9:64:4c:44:b2:ba: e4:9f:5f:9a:89:5b:b3:d2:38:2c:7e:92:f1:bb:48:15: 13:20:01:84:8d:77:cb:db:3c:3b:c7:70:fe:e5:b5:2f: b3:54:20:a2:e1:2c:cc:2f:a4:7e:f8:bb:fd:48:96:8a: 4a:a6:34:01:e0:b2:a9:15:7d:8a:39:d1:2c:d4:42:54: 15:dc:0a:a9:32:f8:97:27:f8:d9:0a:f1:f5:e0:96:23: e6:0b:86:a6:22:f4:48:98:52:d6:6b:e3:a4:92:e6:9e: 7b:ed:ba:54:b4:d0:e7:ad:89:98:34:d5:4c:1b:57:45: 5f:61:95:26:35:ce:12:a5:35:61:34:1b:e8:f5:d2:ba: c9:f1:a8:75:31:79:9e:7f:c8:dd:c2:5f:06:f5:40:41: 97:f7:a4:a3:7a:9f:1f:f4:95:bb:3b:5f:99:f6:e9:b8: e2:53:86:72:63:7c:2d:42:8d:d4:3f:2e:fb:5c:2b:22 Fingerprint (SHA-256): 01:4F:38:9B:3E:F9:C5:58:7E:15:53:56:B1:E2:6D:B0:E1:A6:F3:CF:96:C7:DF:58:AA:46:B4:9B:93:0D:9B:EB Fingerprint (SHA1): 67:FB:89:32:5A:56:84:73:2C:9A:85:03:07:4B:6D:D5:CE:E9:62:4A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4660: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4661: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #4662: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043354 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4663: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #4664: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4665: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4666: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108043355 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4667: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4668: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #4669: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4670: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 108043356 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4671: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4672: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #4673: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4674: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 108043357 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4675: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4676: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4677: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4678: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 108043358 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4679: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4680: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #4681: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4682: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 108043359 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4683: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4684: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #4685: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4686: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 108043360 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4687: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4688: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4689: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4690: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 108043361 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4691: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4692: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #4693: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4694: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 108043362 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4695: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4696: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #4697: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4698: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 108043363 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4699: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4700: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #4701: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4702: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 108043364 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4703: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4704: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #4705: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4706: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 108043365 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4707: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4708: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #4709: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4710: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 108043366 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4711: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4712: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #4713: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4714: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 108043367 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4715: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4716: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #4717: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4718: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 108043368 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4719: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4720: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #4721: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4722: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 108043369 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4723: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4724: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #4725: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4726: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 108043370 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4727: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4728: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #4729: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4730: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 108043371 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4731: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4732: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #4733: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4734: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 108043372 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4735: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4736: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #4737: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4738: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 108043373 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4739: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4740: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #4741: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4742: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 108043374 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4743: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4744: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #4745: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4746: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 108043375 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4747: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4748: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #4749: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4750: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 108043376 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4751: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4752: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #4753: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4754: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 108043377 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4755: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4756: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #4757: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4758: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 108043378 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4759: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4760: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #4761: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4762: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 108043379 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4763: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4764: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #4765: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4766: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 108043380 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4767: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4768: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #4769: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4770: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 108043381 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4771: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4772: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #4773: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4774: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 108043382 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4775: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4776: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #4777: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4778: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 108043383 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4779: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4780: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4781: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043354 (0x6709c5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 09:44:43 2016 Not After : Fri Jan 08 09:44:43 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:14:0b:11:20:75:ec:21:50:fd:6a:22:71:28:c1:b4: 2c:e1:94:c9:ea:4a:5a:59:53:44:48:41:aa:dc:41:5e: 6b:bd:dd:1a:3a:15:b8:ac:97:ef:08:50:b5:67:b0:de: d7:3c:e3:92:5b:84:b5:c7:9e:2b:8b:22:bb:c6:69:02: be:63:b5:9a:86:ca:06:b2:62:63:04:00:9b:e2:e9:86: e2:cd:c1:0f:1d:1a:6a:96:6e:a1:b1:99:6e:31:09:e1: 29:ce:e2:71:ac:db:57:35:f3:56:f0:91:68:f8:0e:42: e4:07:32:0e:bf:5c:8f:fd:11:d6:03:62:82:17:4c:69: 46:aa:cd:d6:e7:ef:4b:b7:5f:50:04:bc:a1:a9:c7:b0: 3e:f1:bb:9b:5d:07:06:a3:4c:f5:24:97:0d:da:d0:fc: 2d:be:ce:78:1c:49:42:76:e5:a8:6c:5a:c8:28:09:03: 0b:26:73:ed:af:d0:54:d6:e7:21:0b:09:1d:f6:d8:75: ab:4a:1e:6e:2e:cd:94:18:d5:d1:4c:2f:d2:51:04:94: 8b:e4:16:2c:5e:a1:c0:d4:19:08:b4:f5:3f:c5:bd:44: ed:7a:95:38:ce:79:7f:cb:4d:fa:de:56:67:d9:73:95: 3f:d5:07:fc:f9:63:04:3f:73:18:f9:ca:c2:2b:b4:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:09:0b:65:b9:e3:3d:47:e1:37:79:63:c9:2e:61:6e: 20:a6:cf:71:11:bd:3b:97:70:da:37:2c:9b:71:3e:ee: ee:62:bc:ed:88:65:3e:6e:8a:87:e4:60:cd:27:c2:bc: 1f:76:e4:25:1c:0c:4e:ab:c2:1a:2a:b2:75:6a:4d:56: 71:49:f4:45:12:df:3f:ac:17:ed:da:7d:55:59:f9:14: 53:ff:e2:3a:c3:4a:74:17:82:dd:49:f0:47:5d:a4:8b: f4:e8:ef:73:90:5c:bc:58:c6:83:f8:8d:b7:e9:ba:ca: f7:ba:91:56:40:2a:d1:e5:f7:13:a9:a0:8c:d9:6c:06: 12:20:7a:90:35:f2:d1:c7:47:79:46:65:f6:33:f8:bc: 1e:4f:aa:56:05:f8:7c:54:30:45:0c:c5:82:b1:9d:28: d4:0d:e6:83:a5:42:22:b2:7e:49:7b:45:6d:cc:66:5c: 6e:00:d6:f8:d4:da:b7:0e:71:af:e4:1e:8a:89:1f:2c: 32:2a:25:79:f6:d7:24:4b:de:91:1f:63:37:89:c1:33: 96:85:03:1f:23:0f:3b:51:ea:bc:d3:f4:05:e6:1c:f9: 70:9c:52:7b:e0:b6:89:a4:c4:e7:14:c7:2b:37:5d:ef: a0:d9:71:e7:df:8d:14:e0:bf:4b:9f:df:69:98:41:01 Fingerprint (SHA-256): 8F:65:42:60:8F:DD:53:F2:D0:22:D1:BC:F2:67:1D:CD:D5:B0:5B:C0:C5:A2:4E:8D:3C:6B:F7:99:A8:90:51:28 Fingerprint (SHA1): 63:87:83:72:A0:85:9B:6B:96:4A:07:3C:EC:BF:9D:FB:A5:E7:26:1E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4782: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4783: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043354 (0x6709c5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 09:44:43 2016 Not After : Fri Jan 08 09:44:43 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:14:0b:11:20:75:ec:21:50:fd:6a:22:71:28:c1:b4: 2c:e1:94:c9:ea:4a:5a:59:53:44:48:41:aa:dc:41:5e: 6b:bd:dd:1a:3a:15:b8:ac:97:ef:08:50:b5:67:b0:de: d7:3c:e3:92:5b:84:b5:c7:9e:2b:8b:22:bb:c6:69:02: be:63:b5:9a:86:ca:06:b2:62:63:04:00:9b:e2:e9:86: e2:cd:c1:0f:1d:1a:6a:96:6e:a1:b1:99:6e:31:09:e1: 29:ce:e2:71:ac:db:57:35:f3:56:f0:91:68:f8:0e:42: e4:07:32:0e:bf:5c:8f:fd:11:d6:03:62:82:17:4c:69: 46:aa:cd:d6:e7:ef:4b:b7:5f:50:04:bc:a1:a9:c7:b0: 3e:f1:bb:9b:5d:07:06:a3:4c:f5:24:97:0d:da:d0:fc: 2d:be:ce:78:1c:49:42:76:e5:a8:6c:5a:c8:28:09:03: 0b:26:73:ed:af:d0:54:d6:e7:21:0b:09:1d:f6:d8:75: ab:4a:1e:6e:2e:cd:94:18:d5:d1:4c:2f:d2:51:04:94: 8b:e4:16:2c:5e:a1:c0:d4:19:08:b4:f5:3f:c5:bd:44: ed:7a:95:38:ce:79:7f:cb:4d:fa:de:56:67:d9:73:95: 3f:d5:07:fc:f9:63:04:3f:73:18:f9:ca:c2:2b:b4:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:09:0b:65:b9:e3:3d:47:e1:37:79:63:c9:2e:61:6e: 20:a6:cf:71:11:bd:3b:97:70:da:37:2c:9b:71:3e:ee: ee:62:bc:ed:88:65:3e:6e:8a:87:e4:60:cd:27:c2:bc: 1f:76:e4:25:1c:0c:4e:ab:c2:1a:2a:b2:75:6a:4d:56: 71:49:f4:45:12:df:3f:ac:17:ed:da:7d:55:59:f9:14: 53:ff:e2:3a:c3:4a:74:17:82:dd:49:f0:47:5d:a4:8b: f4:e8:ef:73:90:5c:bc:58:c6:83:f8:8d:b7:e9:ba:ca: f7:ba:91:56:40:2a:d1:e5:f7:13:a9:a0:8c:d9:6c:06: 12:20:7a:90:35:f2:d1:c7:47:79:46:65:f6:33:f8:bc: 1e:4f:aa:56:05:f8:7c:54:30:45:0c:c5:82:b1:9d:28: d4:0d:e6:83:a5:42:22:b2:7e:49:7b:45:6d:cc:66:5c: 6e:00:d6:f8:d4:da:b7:0e:71:af:e4:1e:8a:89:1f:2c: 32:2a:25:79:f6:d7:24:4b:de:91:1f:63:37:89:c1:33: 96:85:03:1f:23:0f:3b:51:ea:bc:d3:f4:05:e6:1c:f9: 70:9c:52:7b:e0:b6:89:a4:c4:e7:14:c7:2b:37:5d:ef: a0:d9:71:e7:df:8d:14:e0:bf:4b:9f:df:69:98:41:01 Fingerprint (SHA-256): 8F:65:42:60:8F:DD:53:F2:D0:22:D1:BC:F2:67:1D:CD:D5:B0:5B:C0:C5:A2:4E:8D:3C:6B:F7:99:A8:90:51:28 Fingerprint (SHA1): 63:87:83:72:A0:85:9B:6B:96:4A:07:3C:EC:BF:9D:FB:A5:E7:26:1E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4784: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4785: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4786: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4787: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043354 (0x6709c5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 09:44:43 2016 Not After : Fri Jan 08 09:44:43 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:14:0b:11:20:75:ec:21:50:fd:6a:22:71:28:c1:b4: 2c:e1:94:c9:ea:4a:5a:59:53:44:48:41:aa:dc:41:5e: 6b:bd:dd:1a:3a:15:b8:ac:97:ef:08:50:b5:67:b0:de: d7:3c:e3:92:5b:84:b5:c7:9e:2b:8b:22:bb:c6:69:02: be:63:b5:9a:86:ca:06:b2:62:63:04:00:9b:e2:e9:86: e2:cd:c1:0f:1d:1a:6a:96:6e:a1:b1:99:6e:31:09:e1: 29:ce:e2:71:ac:db:57:35:f3:56:f0:91:68:f8:0e:42: e4:07:32:0e:bf:5c:8f:fd:11:d6:03:62:82:17:4c:69: 46:aa:cd:d6:e7:ef:4b:b7:5f:50:04:bc:a1:a9:c7:b0: 3e:f1:bb:9b:5d:07:06:a3:4c:f5:24:97:0d:da:d0:fc: 2d:be:ce:78:1c:49:42:76:e5:a8:6c:5a:c8:28:09:03: 0b:26:73:ed:af:d0:54:d6:e7:21:0b:09:1d:f6:d8:75: ab:4a:1e:6e:2e:cd:94:18:d5:d1:4c:2f:d2:51:04:94: 8b:e4:16:2c:5e:a1:c0:d4:19:08:b4:f5:3f:c5:bd:44: ed:7a:95:38:ce:79:7f:cb:4d:fa:de:56:67:d9:73:95: 3f:d5:07:fc:f9:63:04:3f:73:18:f9:ca:c2:2b:b4:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:09:0b:65:b9:e3:3d:47:e1:37:79:63:c9:2e:61:6e: 20:a6:cf:71:11:bd:3b:97:70:da:37:2c:9b:71:3e:ee: ee:62:bc:ed:88:65:3e:6e:8a:87:e4:60:cd:27:c2:bc: 1f:76:e4:25:1c:0c:4e:ab:c2:1a:2a:b2:75:6a:4d:56: 71:49:f4:45:12:df:3f:ac:17:ed:da:7d:55:59:f9:14: 53:ff:e2:3a:c3:4a:74:17:82:dd:49:f0:47:5d:a4:8b: f4:e8:ef:73:90:5c:bc:58:c6:83:f8:8d:b7:e9:ba:ca: f7:ba:91:56:40:2a:d1:e5:f7:13:a9:a0:8c:d9:6c:06: 12:20:7a:90:35:f2:d1:c7:47:79:46:65:f6:33:f8:bc: 1e:4f:aa:56:05:f8:7c:54:30:45:0c:c5:82:b1:9d:28: d4:0d:e6:83:a5:42:22:b2:7e:49:7b:45:6d:cc:66:5c: 6e:00:d6:f8:d4:da:b7:0e:71:af:e4:1e:8a:89:1f:2c: 32:2a:25:79:f6:d7:24:4b:de:91:1f:63:37:89:c1:33: 96:85:03:1f:23:0f:3b:51:ea:bc:d3:f4:05:e6:1c:f9: 70:9c:52:7b:e0:b6:89:a4:c4:e7:14:c7:2b:37:5d:ef: a0:d9:71:e7:df:8d:14:e0:bf:4b:9f:df:69:98:41:01 Fingerprint (SHA-256): 8F:65:42:60:8F:DD:53:F2:D0:22:D1:BC:F2:67:1D:CD:D5:B0:5B:C0:C5:A2:4E:8D:3C:6B:F7:99:A8:90:51:28 Fingerprint (SHA1): 63:87:83:72:A0:85:9B:6B:96:4A:07:3C:EC:BF:9D:FB:A5:E7:26:1E Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4788: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4789: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4790: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4791: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043354 (0x6709c5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 09:44:43 2016 Not After : Fri Jan 08 09:44:43 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:14:0b:11:20:75:ec:21:50:fd:6a:22:71:28:c1:b4: 2c:e1:94:c9:ea:4a:5a:59:53:44:48:41:aa:dc:41:5e: 6b:bd:dd:1a:3a:15:b8:ac:97:ef:08:50:b5:67:b0:de: d7:3c:e3:92:5b:84:b5:c7:9e:2b:8b:22:bb:c6:69:02: be:63:b5:9a:86:ca:06:b2:62:63:04:00:9b:e2:e9:86: e2:cd:c1:0f:1d:1a:6a:96:6e:a1:b1:99:6e:31:09:e1: 29:ce:e2:71:ac:db:57:35:f3:56:f0:91:68:f8:0e:42: e4:07:32:0e:bf:5c:8f:fd:11:d6:03:62:82:17:4c:69: 46:aa:cd:d6:e7:ef:4b:b7:5f:50:04:bc:a1:a9:c7:b0: 3e:f1:bb:9b:5d:07:06:a3:4c:f5:24:97:0d:da:d0:fc: 2d:be:ce:78:1c:49:42:76:e5:a8:6c:5a:c8:28:09:03: 0b:26:73:ed:af:d0:54:d6:e7:21:0b:09:1d:f6:d8:75: ab:4a:1e:6e:2e:cd:94:18:d5:d1:4c:2f:d2:51:04:94: 8b:e4:16:2c:5e:a1:c0:d4:19:08:b4:f5:3f:c5:bd:44: ed:7a:95:38:ce:79:7f:cb:4d:fa:de:56:67:d9:73:95: 3f:d5:07:fc:f9:63:04:3f:73:18:f9:ca:c2:2b:b4:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:09:0b:65:b9:e3:3d:47:e1:37:79:63:c9:2e:61:6e: 20:a6:cf:71:11:bd:3b:97:70:da:37:2c:9b:71:3e:ee: ee:62:bc:ed:88:65:3e:6e:8a:87:e4:60:cd:27:c2:bc: 1f:76:e4:25:1c:0c:4e:ab:c2:1a:2a:b2:75:6a:4d:56: 71:49:f4:45:12:df:3f:ac:17:ed:da:7d:55:59:f9:14: 53:ff:e2:3a:c3:4a:74:17:82:dd:49:f0:47:5d:a4:8b: f4:e8:ef:73:90:5c:bc:58:c6:83:f8:8d:b7:e9:ba:ca: f7:ba:91:56:40:2a:d1:e5:f7:13:a9:a0:8c:d9:6c:06: 12:20:7a:90:35:f2:d1:c7:47:79:46:65:f6:33:f8:bc: 1e:4f:aa:56:05:f8:7c:54:30:45:0c:c5:82:b1:9d:28: d4:0d:e6:83:a5:42:22:b2:7e:49:7b:45:6d:cc:66:5c: 6e:00:d6:f8:d4:da:b7:0e:71:af:e4:1e:8a:89:1f:2c: 32:2a:25:79:f6:d7:24:4b:de:91:1f:63:37:89:c1:33: 96:85:03:1f:23:0f:3b:51:ea:bc:d3:f4:05:e6:1c:f9: 70:9c:52:7b:e0:b6:89:a4:c4:e7:14:c7:2b:37:5d:ef: a0:d9:71:e7:df:8d:14:e0:bf:4b:9f:df:69:98:41:01 Fingerprint (SHA-256): 8F:65:42:60:8F:DD:53:F2:D0:22:D1:BC:F2:67:1D:CD:D5:B0:5B:C0:C5:A2:4E:8D:3C:6B:F7:99:A8:90:51:28 Fingerprint (SHA1): 63:87:83:72:A0:85:9B:6B:96:4A:07:3C:EC:BF:9D:FB:A5:E7:26:1E Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4792: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043354 (0x6709c5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 09:44:43 2016 Not After : Fri Jan 08 09:44:43 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:14:0b:11:20:75:ec:21:50:fd:6a:22:71:28:c1:b4: 2c:e1:94:c9:ea:4a:5a:59:53:44:48:41:aa:dc:41:5e: 6b:bd:dd:1a:3a:15:b8:ac:97:ef:08:50:b5:67:b0:de: d7:3c:e3:92:5b:84:b5:c7:9e:2b:8b:22:bb:c6:69:02: be:63:b5:9a:86:ca:06:b2:62:63:04:00:9b:e2:e9:86: e2:cd:c1:0f:1d:1a:6a:96:6e:a1:b1:99:6e:31:09:e1: 29:ce:e2:71:ac:db:57:35:f3:56:f0:91:68:f8:0e:42: e4:07:32:0e:bf:5c:8f:fd:11:d6:03:62:82:17:4c:69: 46:aa:cd:d6:e7:ef:4b:b7:5f:50:04:bc:a1:a9:c7:b0: 3e:f1:bb:9b:5d:07:06:a3:4c:f5:24:97:0d:da:d0:fc: 2d:be:ce:78:1c:49:42:76:e5:a8:6c:5a:c8:28:09:03: 0b:26:73:ed:af:d0:54:d6:e7:21:0b:09:1d:f6:d8:75: ab:4a:1e:6e:2e:cd:94:18:d5:d1:4c:2f:d2:51:04:94: 8b:e4:16:2c:5e:a1:c0:d4:19:08:b4:f5:3f:c5:bd:44: ed:7a:95:38:ce:79:7f:cb:4d:fa:de:56:67:d9:73:95: 3f:d5:07:fc:f9:63:04:3f:73:18:f9:ca:c2:2b:b4:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:09:0b:65:b9:e3:3d:47:e1:37:79:63:c9:2e:61:6e: 20:a6:cf:71:11:bd:3b:97:70:da:37:2c:9b:71:3e:ee: ee:62:bc:ed:88:65:3e:6e:8a:87:e4:60:cd:27:c2:bc: 1f:76:e4:25:1c:0c:4e:ab:c2:1a:2a:b2:75:6a:4d:56: 71:49:f4:45:12:df:3f:ac:17:ed:da:7d:55:59:f9:14: 53:ff:e2:3a:c3:4a:74:17:82:dd:49:f0:47:5d:a4:8b: f4:e8:ef:73:90:5c:bc:58:c6:83:f8:8d:b7:e9:ba:ca: f7:ba:91:56:40:2a:d1:e5:f7:13:a9:a0:8c:d9:6c:06: 12:20:7a:90:35:f2:d1:c7:47:79:46:65:f6:33:f8:bc: 1e:4f:aa:56:05:f8:7c:54:30:45:0c:c5:82:b1:9d:28: d4:0d:e6:83:a5:42:22:b2:7e:49:7b:45:6d:cc:66:5c: 6e:00:d6:f8:d4:da:b7:0e:71:af:e4:1e:8a:89:1f:2c: 32:2a:25:79:f6:d7:24:4b:de:91:1f:63:37:89:c1:33: 96:85:03:1f:23:0f:3b:51:ea:bc:d3:f4:05:e6:1c:f9: 70:9c:52:7b:e0:b6:89:a4:c4:e7:14:c7:2b:37:5d:ef: a0:d9:71:e7:df:8d:14:e0:bf:4b:9f:df:69:98:41:01 Fingerprint (SHA-256): 8F:65:42:60:8F:DD:53:F2:D0:22:D1:BC:F2:67:1D:CD:D5:B0:5B:C0:C5:A2:4E:8D:3C:6B:F7:99:A8:90:51:28 Fingerprint (SHA1): 63:87:83:72:A0:85:9B:6B:96:4A:07:3C:EC:BF:9D:FB:A5:E7:26:1E Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4793: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4794: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043354 (0x6709c5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 09:44:43 2016 Not After : Fri Jan 08 09:44:43 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:14:0b:11:20:75:ec:21:50:fd:6a:22:71:28:c1:b4: 2c:e1:94:c9:ea:4a:5a:59:53:44:48:41:aa:dc:41:5e: 6b:bd:dd:1a:3a:15:b8:ac:97:ef:08:50:b5:67:b0:de: d7:3c:e3:92:5b:84:b5:c7:9e:2b:8b:22:bb:c6:69:02: be:63:b5:9a:86:ca:06:b2:62:63:04:00:9b:e2:e9:86: e2:cd:c1:0f:1d:1a:6a:96:6e:a1:b1:99:6e:31:09:e1: 29:ce:e2:71:ac:db:57:35:f3:56:f0:91:68:f8:0e:42: e4:07:32:0e:bf:5c:8f:fd:11:d6:03:62:82:17:4c:69: 46:aa:cd:d6:e7:ef:4b:b7:5f:50:04:bc:a1:a9:c7:b0: 3e:f1:bb:9b:5d:07:06:a3:4c:f5:24:97:0d:da:d0:fc: 2d:be:ce:78:1c:49:42:76:e5:a8:6c:5a:c8:28:09:03: 0b:26:73:ed:af:d0:54:d6:e7:21:0b:09:1d:f6:d8:75: ab:4a:1e:6e:2e:cd:94:18:d5:d1:4c:2f:d2:51:04:94: 8b:e4:16:2c:5e:a1:c0:d4:19:08:b4:f5:3f:c5:bd:44: ed:7a:95:38:ce:79:7f:cb:4d:fa:de:56:67:d9:73:95: 3f:d5:07:fc:f9:63:04:3f:73:18:f9:ca:c2:2b:b4:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:09:0b:65:b9:e3:3d:47:e1:37:79:63:c9:2e:61:6e: 20:a6:cf:71:11:bd:3b:97:70:da:37:2c:9b:71:3e:ee: ee:62:bc:ed:88:65:3e:6e:8a:87:e4:60:cd:27:c2:bc: 1f:76:e4:25:1c:0c:4e:ab:c2:1a:2a:b2:75:6a:4d:56: 71:49:f4:45:12:df:3f:ac:17:ed:da:7d:55:59:f9:14: 53:ff:e2:3a:c3:4a:74:17:82:dd:49:f0:47:5d:a4:8b: f4:e8:ef:73:90:5c:bc:58:c6:83:f8:8d:b7:e9:ba:ca: f7:ba:91:56:40:2a:d1:e5:f7:13:a9:a0:8c:d9:6c:06: 12:20:7a:90:35:f2:d1:c7:47:79:46:65:f6:33:f8:bc: 1e:4f:aa:56:05:f8:7c:54:30:45:0c:c5:82:b1:9d:28: d4:0d:e6:83:a5:42:22:b2:7e:49:7b:45:6d:cc:66:5c: 6e:00:d6:f8:d4:da:b7:0e:71:af:e4:1e:8a:89:1f:2c: 32:2a:25:79:f6:d7:24:4b:de:91:1f:63:37:89:c1:33: 96:85:03:1f:23:0f:3b:51:ea:bc:d3:f4:05:e6:1c:f9: 70:9c:52:7b:e0:b6:89:a4:c4:e7:14:c7:2b:37:5d:ef: a0:d9:71:e7:df:8d:14:e0:bf:4b:9f:df:69:98:41:01 Fingerprint (SHA-256): 8F:65:42:60:8F:DD:53:F2:D0:22:D1:BC:F2:67:1D:CD:D5:B0:5B:C0:C5:A2:4E:8D:3C:6B:F7:99:A8:90:51:28 Fingerprint (SHA1): 63:87:83:72:A0:85:9B:6B:96:4A:07:3C:EC:BF:9D:FB:A5:E7:26:1E Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4795: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4796: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4797: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4798: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043354 (0x6709c5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 09:44:43 2016 Not After : Fri Jan 08 09:44:43 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:14:0b:11:20:75:ec:21:50:fd:6a:22:71:28:c1:b4: 2c:e1:94:c9:ea:4a:5a:59:53:44:48:41:aa:dc:41:5e: 6b:bd:dd:1a:3a:15:b8:ac:97:ef:08:50:b5:67:b0:de: d7:3c:e3:92:5b:84:b5:c7:9e:2b:8b:22:bb:c6:69:02: be:63:b5:9a:86:ca:06:b2:62:63:04:00:9b:e2:e9:86: e2:cd:c1:0f:1d:1a:6a:96:6e:a1:b1:99:6e:31:09:e1: 29:ce:e2:71:ac:db:57:35:f3:56:f0:91:68:f8:0e:42: e4:07:32:0e:bf:5c:8f:fd:11:d6:03:62:82:17:4c:69: 46:aa:cd:d6:e7:ef:4b:b7:5f:50:04:bc:a1:a9:c7:b0: 3e:f1:bb:9b:5d:07:06:a3:4c:f5:24:97:0d:da:d0:fc: 2d:be:ce:78:1c:49:42:76:e5:a8:6c:5a:c8:28:09:03: 0b:26:73:ed:af:d0:54:d6:e7:21:0b:09:1d:f6:d8:75: ab:4a:1e:6e:2e:cd:94:18:d5:d1:4c:2f:d2:51:04:94: 8b:e4:16:2c:5e:a1:c0:d4:19:08:b4:f5:3f:c5:bd:44: ed:7a:95:38:ce:79:7f:cb:4d:fa:de:56:67:d9:73:95: 3f:d5:07:fc:f9:63:04:3f:73:18:f9:ca:c2:2b:b4:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:09:0b:65:b9:e3:3d:47:e1:37:79:63:c9:2e:61:6e: 20:a6:cf:71:11:bd:3b:97:70:da:37:2c:9b:71:3e:ee: ee:62:bc:ed:88:65:3e:6e:8a:87:e4:60:cd:27:c2:bc: 1f:76:e4:25:1c:0c:4e:ab:c2:1a:2a:b2:75:6a:4d:56: 71:49:f4:45:12:df:3f:ac:17:ed:da:7d:55:59:f9:14: 53:ff:e2:3a:c3:4a:74:17:82:dd:49:f0:47:5d:a4:8b: f4:e8:ef:73:90:5c:bc:58:c6:83:f8:8d:b7:e9:ba:ca: f7:ba:91:56:40:2a:d1:e5:f7:13:a9:a0:8c:d9:6c:06: 12:20:7a:90:35:f2:d1:c7:47:79:46:65:f6:33:f8:bc: 1e:4f:aa:56:05:f8:7c:54:30:45:0c:c5:82:b1:9d:28: d4:0d:e6:83:a5:42:22:b2:7e:49:7b:45:6d:cc:66:5c: 6e:00:d6:f8:d4:da:b7:0e:71:af:e4:1e:8a:89:1f:2c: 32:2a:25:79:f6:d7:24:4b:de:91:1f:63:37:89:c1:33: 96:85:03:1f:23:0f:3b:51:ea:bc:d3:f4:05:e6:1c:f9: 70:9c:52:7b:e0:b6:89:a4:c4:e7:14:c7:2b:37:5d:ef: a0:d9:71:e7:df:8d:14:e0:bf:4b:9f:df:69:98:41:01 Fingerprint (SHA-256): 8F:65:42:60:8F:DD:53:F2:D0:22:D1:BC:F2:67:1D:CD:D5:B0:5B:C0:C5:A2:4E:8D:3C:6B:F7:99:A8:90:51:28 Fingerprint (SHA1): 63:87:83:72:A0:85:9B:6B:96:4A:07:3C:EC:BF:9D:FB:A5:E7:26:1E Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4799: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043354 (0x6709c5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 09:44:43 2016 Not After : Fri Jan 08 09:44:43 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:14:0b:11:20:75:ec:21:50:fd:6a:22:71:28:c1:b4: 2c:e1:94:c9:ea:4a:5a:59:53:44:48:41:aa:dc:41:5e: 6b:bd:dd:1a:3a:15:b8:ac:97:ef:08:50:b5:67:b0:de: d7:3c:e3:92:5b:84:b5:c7:9e:2b:8b:22:bb:c6:69:02: be:63:b5:9a:86:ca:06:b2:62:63:04:00:9b:e2:e9:86: e2:cd:c1:0f:1d:1a:6a:96:6e:a1:b1:99:6e:31:09:e1: 29:ce:e2:71:ac:db:57:35:f3:56:f0:91:68:f8:0e:42: e4:07:32:0e:bf:5c:8f:fd:11:d6:03:62:82:17:4c:69: 46:aa:cd:d6:e7:ef:4b:b7:5f:50:04:bc:a1:a9:c7:b0: 3e:f1:bb:9b:5d:07:06:a3:4c:f5:24:97:0d:da:d0:fc: 2d:be:ce:78:1c:49:42:76:e5:a8:6c:5a:c8:28:09:03: 0b:26:73:ed:af:d0:54:d6:e7:21:0b:09:1d:f6:d8:75: ab:4a:1e:6e:2e:cd:94:18:d5:d1:4c:2f:d2:51:04:94: 8b:e4:16:2c:5e:a1:c0:d4:19:08:b4:f5:3f:c5:bd:44: ed:7a:95:38:ce:79:7f:cb:4d:fa:de:56:67:d9:73:95: 3f:d5:07:fc:f9:63:04:3f:73:18:f9:ca:c2:2b:b4:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:09:0b:65:b9:e3:3d:47:e1:37:79:63:c9:2e:61:6e: 20:a6:cf:71:11:bd:3b:97:70:da:37:2c:9b:71:3e:ee: ee:62:bc:ed:88:65:3e:6e:8a:87:e4:60:cd:27:c2:bc: 1f:76:e4:25:1c:0c:4e:ab:c2:1a:2a:b2:75:6a:4d:56: 71:49:f4:45:12:df:3f:ac:17:ed:da:7d:55:59:f9:14: 53:ff:e2:3a:c3:4a:74:17:82:dd:49:f0:47:5d:a4:8b: f4:e8:ef:73:90:5c:bc:58:c6:83:f8:8d:b7:e9:ba:ca: f7:ba:91:56:40:2a:d1:e5:f7:13:a9:a0:8c:d9:6c:06: 12:20:7a:90:35:f2:d1:c7:47:79:46:65:f6:33:f8:bc: 1e:4f:aa:56:05:f8:7c:54:30:45:0c:c5:82:b1:9d:28: d4:0d:e6:83:a5:42:22:b2:7e:49:7b:45:6d:cc:66:5c: 6e:00:d6:f8:d4:da:b7:0e:71:af:e4:1e:8a:89:1f:2c: 32:2a:25:79:f6:d7:24:4b:de:91:1f:63:37:89:c1:33: 96:85:03:1f:23:0f:3b:51:ea:bc:d3:f4:05:e6:1c:f9: 70:9c:52:7b:e0:b6:89:a4:c4:e7:14:c7:2b:37:5d:ef: a0:d9:71:e7:df:8d:14:e0:bf:4b:9f:df:69:98:41:01 Fingerprint (SHA-256): 8F:65:42:60:8F:DD:53:F2:D0:22:D1:BC:F2:67:1D:CD:D5:B0:5B:C0:C5:A2:4E:8D:3C:6B:F7:99:A8:90:51:28 Fingerprint (SHA1): 63:87:83:72:A0:85:9B:6B:96:4A:07:3C:EC:BF:9D:FB:A5:E7:26:1E Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4800: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043354 (0x6709c5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 09:44:43 2016 Not After : Fri Jan 08 09:44:43 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:14:0b:11:20:75:ec:21:50:fd:6a:22:71:28:c1:b4: 2c:e1:94:c9:ea:4a:5a:59:53:44:48:41:aa:dc:41:5e: 6b:bd:dd:1a:3a:15:b8:ac:97:ef:08:50:b5:67:b0:de: d7:3c:e3:92:5b:84:b5:c7:9e:2b:8b:22:bb:c6:69:02: be:63:b5:9a:86:ca:06:b2:62:63:04:00:9b:e2:e9:86: e2:cd:c1:0f:1d:1a:6a:96:6e:a1:b1:99:6e:31:09:e1: 29:ce:e2:71:ac:db:57:35:f3:56:f0:91:68:f8:0e:42: e4:07:32:0e:bf:5c:8f:fd:11:d6:03:62:82:17:4c:69: 46:aa:cd:d6:e7:ef:4b:b7:5f:50:04:bc:a1:a9:c7:b0: 3e:f1:bb:9b:5d:07:06:a3:4c:f5:24:97:0d:da:d0:fc: 2d:be:ce:78:1c:49:42:76:e5:a8:6c:5a:c8:28:09:03: 0b:26:73:ed:af:d0:54:d6:e7:21:0b:09:1d:f6:d8:75: ab:4a:1e:6e:2e:cd:94:18:d5:d1:4c:2f:d2:51:04:94: 8b:e4:16:2c:5e:a1:c0:d4:19:08:b4:f5:3f:c5:bd:44: ed:7a:95:38:ce:79:7f:cb:4d:fa:de:56:67:d9:73:95: 3f:d5:07:fc:f9:63:04:3f:73:18:f9:ca:c2:2b:b4:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:09:0b:65:b9:e3:3d:47:e1:37:79:63:c9:2e:61:6e: 20:a6:cf:71:11:bd:3b:97:70:da:37:2c:9b:71:3e:ee: ee:62:bc:ed:88:65:3e:6e:8a:87:e4:60:cd:27:c2:bc: 1f:76:e4:25:1c:0c:4e:ab:c2:1a:2a:b2:75:6a:4d:56: 71:49:f4:45:12:df:3f:ac:17:ed:da:7d:55:59:f9:14: 53:ff:e2:3a:c3:4a:74:17:82:dd:49:f0:47:5d:a4:8b: f4:e8:ef:73:90:5c:bc:58:c6:83:f8:8d:b7:e9:ba:ca: f7:ba:91:56:40:2a:d1:e5:f7:13:a9:a0:8c:d9:6c:06: 12:20:7a:90:35:f2:d1:c7:47:79:46:65:f6:33:f8:bc: 1e:4f:aa:56:05:f8:7c:54:30:45:0c:c5:82:b1:9d:28: d4:0d:e6:83:a5:42:22:b2:7e:49:7b:45:6d:cc:66:5c: 6e:00:d6:f8:d4:da:b7:0e:71:af:e4:1e:8a:89:1f:2c: 32:2a:25:79:f6:d7:24:4b:de:91:1f:63:37:89:c1:33: 96:85:03:1f:23:0f:3b:51:ea:bc:d3:f4:05:e6:1c:f9: 70:9c:52:7b:e0:b6:89:a4:c4:e7:14:c7:2b:37:5d:ef: a0:d9:71:e7:df:8d:14:e0:bf:4b:9f:df:69:98:41:01 Fingerprint (SHA-256): 8F:65:42:60:8F:DD:53:F2:D0:22:D1:BC:F2:67:1D:CD:D5:B0:5B:C0:C5:A2:4E:8D:3C:6B:F7:99:A8:90:51:28 Fingerprint (SHA1): 63:87:83:72:A0:85:9B:6B:96:4A:07:3C:EC:BF:9D:FB:A5:E7:26:1E Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4801: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043354 (0x6709c5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 09:44:43 2016 Not After : Fri Jan 08 09:44:43 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:14:0b:11:20:75:ec:21:50:fd:6a:22:71:28:c1:b4: 2c:e1:94:c9:ea:4a:5a:59:53:44:48:41:aa:dc:41:5e: 6b:bd:dd:1a:3a:15:b8:ac:97:ef:08:50:b5:67:b0:de: d7:3c:e3:92:5b:84:b5:c7:9e:2b:8b:22:bb:c6:69:02: be:63:b5:9a:86:ca:06:b2:62:63:04:00:9b:e2:e9:86: e2:cd:c1:0f:1d:1a:6a:96:6e:a1:b1:99:6e:31:09:e1: 29:ce:e2:71:ac:db:57:35:f3:56:f0:91:68:f8:0e:42: e4:07:32:0e:bf:5c:8f:fd:11:d6:03:62:82:17:4c:69: 46:aa:cd:d6:e7:ef:4b:b7:5f:50:04:bc:a1:a9:c7:b0: 3e:f1:bb:9b:5d:07:06:a3:4c:f5:24:97:0d:da:d0:fc: 2d:be:ce:78:1c:49:42:76:e5:a8:6c:5a:c8:28:09:03: 0b:26:73:ed:af:d0:54:d6:e7:21:0b:09:1d:f6:d8:75: ab:4a:1e:6e:2e:cd:94:18:d5:d1:4c:2f:d2:51:04:94: 8b:e4:16:2c:5e:a1:c0:d4:19:08:b4:f5:3f:c5:bd:44: ed:7a:95:38:ce:79:7f:cb:4d:fa:de:56:67:d9:73:95: 3f:d5:07:fc:f9:63:04:3f:73:18:f9:ca:c2:2b:b4:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:09:0b:65:b9:e3:3d:47:e1:37:79:63:c9:2e:61:6e: 20:a6:cf:71:11:bd:3b:97:70:da:37:2c:9b:71:3e:ee: ee:62:bc:ed:88:65:3e:6e:8a:87:e4:60:cd:27:c2:bc: 1f:76:e4:25:1c:0c:4e:ab:c2:1a:2a:b2:75:6a:4d:56: 71:49:f4:45:12:df:3f:ac:17:ed:da:7d:55:59:f9:14: 53:ff:e2:3a:c3:4a:74:17:82:dd:49:f0:47:5d:a4:8b: f4:e8:ef:73:90:5c:bc:58:c6:83:f8:8d:b7:e9:ba:ca: f7:ba:91:56:40:2a:d1:e5:f7:13:a9:a0:8c:d9:6c:06: 12:20:7a:90:35:f2:d1:c7:47:79:46:65:f6:33:f8:bc: 1e:4f:aa:56:05:f8:7c:54:30:45:0c:c5:82:b1:9d:28: d4:0d:e6:83:a5:42:22:b2:7e:49:7b:45:6d:cc:66:5c: 6e:00:d6:f8:d4:da:b7:0e:71:af:e4:1e:8a:89:1f:2c: 32:2a:25:79:f6:d7:24:4b:de:91:1f:63:37:89:c1:33: 96:85:03:1f:23:0f:3b:51:ea:bc:d3:f4:05:e6:1c:f9: 70:9c:52:7b:e0:b6:89:a4:c4:e7:14:c7:2b:37:5d:ef: a0:d9:71:e7:df:8d:14:e0:bf:4b:9f:df:69:98:41:01 Fingerprint (SHA-256): 8F:65:42:60:8F:DD:53:F2:D0:22:D1:BC:F2:67:1D:CD:D5:B0:5B:C0:C5:A2:4E:8D:3C:6B:F7:99:A8:90:51:28 Fingerprint (SHA1): 63:87:83:72:A0:85:9B:6B:96:4A:07:3C:EC:BF:9D:FB:A5:E7:26:1E Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4802: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043354 (0x6709c5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 09:44:43 2016 Not After : Fri Jan 08 09:44:43 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:14:0b:11:20:75:ec:21:50:fd:6a:22:71:28:c1:b4: 2c:e1:94:c9:ea:4a:5a:59:53:44:48:41:aa:dc:41:5e: 6b:bd:dd:1a:3a:15:b8:ac:97:ef:08:50:b5:67:b0:de: d7:3c:e3:92:5b:84:b5:c7:9e:2b:8b:22:bb:c6:69:02: be:63:b5:9a:86:ca:06:b2:62:63:04:00:9b:e2:e9:86: e2:cd:c1:0f:1d:1a:6a:96:6e:a1:b1:99:6e:31:09:e1: 29:ce:e2:71:ac:db:57:35:f3:56:f0:91:68:f8:0e:42: e4:07:32:0e:bf:5c:8f:fd:11:d6:03:62:82:17:4c:69: 46:aa:cd:d6:e7:ef:4b:b7:5f:50:04:bc:a1:a9:c7:b0: 3e:f1:bb:9b:5d:07:06:a3:4c:f5:24:97:0d:da:d0:fc: 2d:be:ce:78:1c:49:42:76:e5:a8:6c:5a:c8:28:09:03: 0b:26:73:ed:af:d0:54:d6:e7:21:0b:09:1d:f6:d8:75: ab:4a:1e:6e:2e:cd:94:18:d5:d1:4c:2f:d2:51:04:94: 8b:e4:16:2c:5e:a1:c0:d4:19:08:b4:f5:3f:c5:bd:44: ed:7a:95:38:ce:79:7f:cb:4d:fa:de:56:67:d9:73:95: 3f:d5:07:fc:f9:63:04:3f:73:18:f9:ca:c2:2b:b4:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:09:0b:65:b9:e3:3d:47:e1:37:79:63:c9:2e:61:6e: 20:a6:cf:71:11:bd:3b:97:70:da:37:2c:9b:71:3e:ee: ee:62:bc:ed:88:65:3e:6e:8a:87:e4:60:cd:27:c2:bc: 1f:76:e4:25:1c:0c:4e:ab:c2:1a:2a:b2:75:6a:4d:56: 71:49:f4:45:12:df:3f:ac:17:ed:da:7d:55:59:f9:14: 53:ff:e2:3a:c3:4a:74:17:82:dd:49:f0:47:5d:a4:8b: f4:e8:ef:73:90:5c:bc:58:c6:83:f8:8d:b7:e9:ba:ca: f7:ba:91:56:40:2a:d1:e5:f7:13:a9:a0:8c:d9:6c:06: 12:20:7a:90:35:f2:d1:c7:47:79:46:65:f6:33:f8:bc: 1e:4f:aa:56:05:f8:7c:54:30:45:0c:c5:82:b1:9d:28: d4:0d:e6:83:a5:42:22:b2:7e:49:7b:45:6d:cc:66:5c: 6e:00:d6:f8:d4:da:b7:0e:71:af:e4:1e:8a:89:1f:2c: 32:2a:25:79:f6:d7:24:4b:de:91:1f:63:37:89:c1:33: 96:85:03:1f:23:0f:3b:51:ea:bc:d3:f4:05:e6:1c:f9: 70:9c:52:7b:e0:b6:89:a4:c4:e7:14:c7:2b:37:5d:ef: a0:d9:71:e7:df:8d:14:e0:bf:4b:9f:df:69:98:41:01 Fingerprint (SHA-256): 8F:65:42:60:8F:DD:53:F2:D0:22:D1:BC:F2:67:1D:CD:D5:B0:5B:C0:C5:A2:4E:8D:3C:6B:F7:99:A8:90:51:28 Fingerprint (SHA1): 63:87:83:72:A0:85:9B:6B:96:4A:07:3C:EC:BF:9D:FB:A5:E7:26:1E Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4803: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043354 (0x6709c5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 09:44:43 2016 Not After : Fri Jan 08 09:44:43 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:14:0b:11:20:75:ec:21:50:fd:6a:22:71:28:c1:b4: 2c:e1:94:c9:ea:4a:5a:59:53:44:48:41:aa:dc:41:5e: 6b:bd:dd:1a:3a:15:b8:ac:97:ef:08:50:b5:67:b0:de: d7:3c:e3:92:5b:84:b5:c7:9e:2b:8b:22:bb:c6:69:02: be:63:b5:9a:86:ca:06:b2:62:63:04:00:9b:e2:e9:86: e2:cd:c1:0f:1d:1a:6a:96:6e:a1:b1:99:6e:31:09:e1: 29:ce:e2:71:ac:db:57:35:f3:56:f0:91:68:f8:0e:42: e4:07:32:0e:bf:5c:8f:fd:11:d6:03:62:82:17:4c:69: 46:aa:cd:d6:e7:ef:4b:b7:5f:50:04:bc:a1:a9:c7:b0: 3e:f1:bb:9b:5d:07:06:a3:4c:f5:24:97:0d:da:d0:fc: 2d:be:ce:78:1c:49:42:76:e5:a8:6c:5a:c8:28:09:03: 0b:26:73:ed:af:d0:54:d6:e7:21:0b:09:1d:f6:d8:75: ab:4a:1e:6e:2e:cd:94:18:d5:d1:4c:2f:d2:51:04:94: 8b:e4:16:2c:5e:a1:c0:d4:19:08:b4:f5:3f:c5:bd:44: ed:7a:95:38:ce:79:7f:cb:4d:fa:de:56:67:d9:73:95: 3f:d5:07:fc:f9:63:04:3f:73:18:f9:ca:c2:2b:b4:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:09:0b:65:b9:e3:3d:47:e1:37:79:63:c9:2e:61:6e: 20:a6:cf:71:11:bd:3b:97:70:da:37:2c:9b:71:3e:ee: ee:62:bc:ed:88:65:3e:6e:8a:87:e4:60:cd:27:c2:bc: 1f:76:e4:25:1c:0c:4e:ab:c2:1a:2a:b2:75:6a:4d:56: 71:49:f4:45:12:df:3f:ac:17:ed:da:7d:55:59:f9:14: 53:ff:e2:3a:c3:4a:74:17:82:dd:49:f0:47:5d:a4:8b: f4:e8:ef:73:90:5c:bc:58:c6:83:f8:8d:b7:e9:ba:ca: f7:ba:91:56:40:2a:d1:e5:f7:13:a9:a0:8c:d9:6c:06: 12:20:7a:90:35:f2:d1:c7:47:79:46:65:f6:33:f8:bc: 1e:4f:aa:56:05:f8:7c:54:30:45:0c:c5:82:b1:9d:28: d4:0d:e6:83:a5:42:22:b2:7e:49:7b:45:6d:cc:66:5c: 6e:00:d6:f8:d4:da:b7:0e:71:af:e4:1e:8a:89:1f:2c: 32:2a:25:79:f6:d7:24:4b:de:91:1f:63:37:89:c1:33: 96:85:03:1f:23:0f:3b:51:ea:bc:d3:f4:05:e6:1c:f9: 70:9c:52:7b:e0:b6:89:a4:c4:e7:14:c7:2b:37:5d:ef: a0:d9:71:e7:df:8d:14:e0:bf:4b:9f:df:69:98:41:01 Fingerprint (SHA-256): 8F:65:42:60:8F:DD:53:F2:D0:22:D1:BC:F2:67:1D:CD:D5:B0:5B:C0:C5:A2:4E:8D:3C:6B:F7:99:A8:90:51:28 Fingerprint (SHA1): 63:87:83:72:A0:85:9B:6B:96:4A:07:3C:EC:BF:9D:FB:A5:E7:26:1E Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4804: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4805: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4806: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043384 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4807: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4808: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #4809: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4810: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 108043385 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4811: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4812: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #4813: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4814: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 108043386 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4815: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4816: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #4817: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4818: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 108043387 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4819: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4820: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #4821: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4822: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 108043388 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4823: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4824: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #4825: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4826: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 108043389 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4827: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4828: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #4829: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4830: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 108043390 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4831: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4832: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4833: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043384 (0x6709c78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:51:31 2016 Not After : Fri Jan 08 09:51:31 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:78:dc:9b:bb:01:1e:df:c1:d2:d4:3b:60:85:8f:ed: 23:ff:5b:03:08:3e:8b:cb:f0:9d:c0:bc:9c:55:43:e8: 04:a3:ec:4f:db:87:ca:42:8d:7b:5e:28:03:19:8d:b0: 42:88:79:3a:63:89:09:f4:ed:2b:a3:29:82:40:68:64: f8:98:e8:8f:29:24:f2:15:ef:02:58:0d:08:97:77:e2: 6e:b5:c3:f2:91:d4:71:13:e3:83:3c:89:d2:c3:57:e1: 02:cb:25:de:77:25:56:7d:b0:61:12:57:20:c1:4b:8c: 9f:ed:a4:d5:4e:7d:e7:9e:40:04:63:04:e4:b9:69:e8: a9:8c:fd:2d:42:50:07:d0:c3:8e:f3:32:75:0b:2c:7e: 21:ee:9c:34:59:d3:68:45:4b:64:87:4b:47:f3:5b:91: c0:0d:83:a8:ae:38:46:80:37:a2:3f:44:80:0d:a0:6a: 97:59:08:57:f2:db:22:d8:2f:cf:20:e5:8e:93:54:9e: f8:61:4d:e1:ca:ad:c3:a1:1d:8f:55:e2:b5:0c:03:bb: 20:92:49:7e:88:2e:4f:5d:4b:9d:e4:42:a9:c9:b2:68: b2:bd:35:3a:c1:97:cc:fa:bf:f6:5a:d0:28:d6:c3:1e: f4:bf:f4:22:56:dd:69:4d:37:f8:d7:5b:5c:f2:0e:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:6f:a2:f5:13:b3:fa:1e:34:5d:2f:71:32:3e:dd:78: 3d:14:95:da:0f:cb:37:b6:95:f2:49:86:09:de:9a:70: bf:68:ad:7f:20:48:b3:67:bc:6e:11:59:88:6d:f3:f4: da:9e:9f:46:66:8c:d7:53:09:13:dc:96:d2:e4:18:6a: 68:6f:23:b4:cd:49:fb:bc:ce:c6:c9:18:83:e5:7b:2b: 1d:81:4e:19:8a:1c:41:15:98:be:70:44:22:bd:21:01: 97:5c:20:7d:6f:bf:50:00:8c:dd:ff:89:0c:aa:a3:a7: d7:41:d4:78:58:95:08:e5:72:e2:02:bc:21:95:02:78: 17:a7:23:00:58:03:d1:b6:8d:d2:b7:d5:3c:33:fc:42: ce:26:88:e0:41:9f:c4:43:33:c2:fb:a9:88:8a:f1:3e: 0f:8d:72:c0:d6:6f:59:55:76:f1:14:d6:4b:ef:f6:43: 6f:d0:8f:f0:fd:b5:e0:50:a1:44:a8:25:00:ee:4b:45: b3:f9:dd:ab:57:3c:6b:25:93:d6:ad:01:d7:25:c1:76: 3f:e2:b1:57:16:fb:79:18:51:0b:7e:b4:56:9b:eb:b0: 26:2a:de:f7:57:aa:5b:01:6f:1d:37:db:ca:95:23:77: b8:e3:f1:9a:18:6f:e0:f3:76:07:ae:b7:58:6a:0a:56 Fingerprint (SHA-256): E5:F2:7C:8C:00:53:11:1D:C3:74:20:74:33:61:49:4A:05:0A:DE:44:69:67:75:C3:8D:FB:D7:1A:39:63:0D:27 Fingerprint (SHA1): 72:87:AE:20:8B:30:80:B3:92:2E:A0:7F:D0:CF:83:A0:E6:B7:48:01 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #4834: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4835: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4836: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4837: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043384 (0x6709c78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:51:31 2016 Not After : Fri Jan 08 09:51:31 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:78:dc:9b:bb:01:1e:df:c1:d2:d4:3b:60:85:8f:ed: 23:ff:5b:03:08:3e:8b:cb:f0:9d:c0:bc:9c:55:43:e8: 04:a3:ec:4f:db:87:ca:42:8d:7b:5e:28:03:19:8d:b0: 42:88:79:3a:63:89:09:f4:ed:2b:a3:29:82:40:68:64: f8:98:e8:8f:29:24:f2:15:ef:02:58:0d:08:97:77:e2: 6e:b5:c3:f2:91:d4:71:13:e3:83:3c:89:d2:c3:57:e1: 02:cb:25:de:77:25:56:7d:b0:61:12:57:20:c1:4b:8c: 9f:ed:a4:d5:4e:7d:e7:9e:40:04:63:04:e4:b9:69:e8: a9:8c:fd:2d:42:50:07:d0:c3:8e:f3:32:75:0b:2c:7e: 21:ee:9c:34:59:d3:68:45:4b:64:87:4b:47:f3:5b:91: c0:0d:83:a8:ae:38:46:80:37:a2:3f:44:80:0d:a0:6a: 97:59:08:57:f2:db:22:d8:2f:cf:20:e5:8e:93:54:9e: f8:61:4d:e1:ca:ad:c3:a1:1d:8f:55:e2:b5:0c:03:bb: 20:92:49:7e:88:2e:4f:5d:4b:9d:e4:42:a9:c9:b2:68: b2:bd:35:3a:c1:97:cc:fa:bf:f6:5a:d0:28:d6:c3:1e: f4:bf:f4:22:56:dd:69:4d:37:f8:d7:5b:5c:f2:0e:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:6f:a2:f5:13:b3:fa:1e:34:5d:2f:71:32:3e:dd:78: 3d:14:95:da:0f:cb:37:b6:95:f2:49:86:09:de:9a:70: bf:68:ad:7f:20:48:b3:67:bc:6e:11:59:88:6d:f3:f4: da:9e:9f:46:66:8c:d7:53:09:13:dc:96:d2:e4:18:6a: 68:6f:23:b4:cd:49:fb:bc:ce:c6:c9:18:83:e5:7b:2b: 1d:81:4e:19:8a:1c:41:15:98:be:70:44:22:bd:21:01: 97:5c:20:7d:6f:bf:50:00:8c:dd:ff:89:0c:aa:a3:a7: d7:41:d4:78:58:95:08:e5:72:e2:02:bc:21:95:02:78: 17:a7:23:00:58:03:d1:b6:8d:d2:b7:d5:3c:33:fc:42: ce:26:88:e0:41:9f:c4:43:33:c2:fb:a9:88:8a:f1:3e: 0f:8d:72:c0:d6:6f:59:55:76:f1:14:d6:4b:ef:f6:43: 6f:d0:8f:f0:fd:b5:e0:50:a1:44:a8:25:00:ee:4b:45: b3:f9:dd:ab:57:3c:6b:25:93:d6:ad:01:d7:25:c1:76: 3f:e2:b1:57:16:fb:79:18:51:0b:7e:b4:56:9b:eb:b0: 26:2a:de:f7:57:aa:5b:01:6f:1d:37:db:ca:95:23:77: b8:e3:f1:9a:18:6f:e0:f3:76:07:ae:b7:58:6a:0a:56 Fingerprint (SHA-256): E5:F2:7C:8C:00:53:11:1D:C3:74:20:74:33:61:49:4A:05:0A:DE:44:69:67:75:C3:8D:FB:D7:1A:39:63:0D:27 Fingerprint (SHA1): 72:87:AE:20:8B:30:80:B3:92:2E:A0:7F:D0:CF:83:A0:E6:B7:48:01 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #4838: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4839: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4840: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4841: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043391 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4842: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4843: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4844: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4845: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108043392 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4846: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4847: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4848: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4849: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108043393 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4850: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4851: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4852: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4853: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108043394 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4854: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4855: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4856: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4857: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4858: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4859: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043391 (0x6709c7f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:52:47 2016 Not After : Fri Jan 08 09:52:47 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:51:28:0f:ab:74:08:1a:87:c4:32:09:11:27:b6:3c: 5c:1d:dd:81:aa:3e:be:24:c3:91:6a:33:16:60:d2:02: 6d:d6:01:c8:1b:1a:23:03:d2:f3:8e:6d:65:fe:a3:c6: 96:6d:dd:0d:76:dc:12:73:3d:7b:3e:78:ce:09:de:ad: 26:1e:0a:fb:eb:67:78:3e:87:2d:a5:75:f2:11:37:c4: 10:71:3c:3b:37:cf:ae:5b:95:43:71:40:23:8e:f1:ce: c9:f2:21:05:61:03:d6:f0:c3:91:9f:90:73:79:16:c7: e3:c3:05:53:8b:b8:1f:4f:ef:a7:3e:da:91:33:23:c1: 6f:24:9f:d9:79:ba:b5:0d:04:5f:a0:03:ba:4d:d0:d2: 87:08:62:66:c2:6b:6a:b0:b5:82:fd:a4:d2:ef:57:35: 8e:69:12:2d:ff:aa:33:53:48:ee:b2:5e:bb:6b:b9:29: dc:8b:2c:53:b5:3d:3c:ea:a7:28:54:b7:2b:00:1e:f1: fa:e7:bd:3e:86:8b:0a:8c:24:9e:8b:fb:23:d4:7a:45: 9d:5a:f2:f5:51:2a:6e:45:f5:78:ea:8f:79:4f:f6:cf: 1a:02:5a:ab:9f:c5:70:67:93:ce:38:86:bc:81:8d:20: 4c:23:01:5d:b8:6c:ae:c0:3b:96:ab:7b:f2:90:4b:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:df:56:9a:cd:19:22:b3:59:6d:24:09:d1:f1:96:22: e4:3f:40:db:b1:05:a5:f1:14:3a:68:35:d5:cc:37:4f: 5b:f9:ba:f2:62:03:ef:d8:52:6a:54:9e:f7:64:53:d4: 8b:3a:9a:c2:17:be:50:03:ee:b1:94:1a:8c:2f:3d:2b: 72:8e:4c:32:b7:06:4e:34:25:61:d9:81:04:9b:30:66: 55:ab:1e:95:98:f9:76:a4:b4:e8:88:fe:4d:df:ab:c9: 7f:c6:59:6e:10:fb:4d:34:9c:3c:17:b3:00:0f:ac:a6: a1:8e:fa:f2:9b:ed:88:da:b1:29:3f:7d:47:e1:82:72: 87:c4:98:2f:21:dd:12:3c:8c:a7:6d:5f:ee:f7:d9:70: 3e:6c:00:8c:67:42:04:ab:f4:37:95:f3:97:58:43:98: 62:75:c3:c3:6a:4b:e6:7b:2e:af:ab:08:98:ba:50:f6: 44:8e:ec:d8:39:dc:ba:67:05:9e:b3:a5:d8:b8:b0:23: 8a:b4:10:8b:a2:a2:7a:80:b4:99:60:c8:30:e7:a6:44: 3f:fe:f8:47:0c:48:e7:ec:01:a3:a7:7b:ae:ce:41:14: 57:ab:6b:2d:54:e6:24:72:9f:00:bf:e7:0e:e2:fd:50: 1e:13:55:2b:9e:9a:95:ed:d4:df:fd:05:15:3d:0a:e3 Fingerprint (SHA-256): 20:9F:5D:71:63:71:2D:33:86:D2:82:D1:F7:06:5E:51:B4:27:A7:8B:8A:E8:59:1B:05:3A:58:99:AB:BD:53:27 Fingerprint (SHA1): F8:30:89:64:7C:84:F5:03:17:EA:E0:40:6D:C2:36:19:14:F2:ED:40 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4860: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4861: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4862: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043392 (0x6709c80) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:53:03 2016 Not After : Fri Jan 08 09:53:03 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:8e:5e:08:cf:bb:90:54:28:d9:96:26:36:f0:4b:cd: ee:46:8e:51:2e:4f:51:30:39:8a:f4:30:e1:1d:9c:a8: c8:45:af:00:69:7c:3b:bb:01:9e:ba:75:28:3c:94:21: 73:f3:6c:4e:36:78:a8:9f:eb:1d:08:1f:0b:fe:49:f3: e8:59:29:6c:07:d9:77:81:4d:bf:47:b5:4a:2a:4c:18: 33:c1:94:a1:f4:f2:19:2d:4e:dd:f8:14:a3:4f:7c:7b: 80:7c:fd:3c:16:9a:b3:09:69:c5:9b:86:21:4b:34:e5: 84:9d:ed:c0:15:9e:da:2b:4b:a3:e1:c9:ce:0e:02:b4: 2f:30:53:74:e9:16:42:e6:46:82:af:de:03:86:9d:79: c8:79:97:6f:f0:57:aa:83:fd:d3:de:63:72:b1:56:f7: 9e:03:f6:9b:85:80:9c:b4:a6:b7:97:e9:d7:7c:1e:d6: 13:3f:40:d8:83:da:57:90:eb:2e:64:88:d6:cf:fa:f5: 60:87:f2:66:96:b0:9f:8e:2e:71:31:2a:c9:18:0d:5e: 06:4a:15:d8:b7:e7:35:e9:18:4f:9b:70:c1:69:53:3c: 18:b4:0c:ac:16:f6:85:ad:2c:e7:7e:29:c3:a5:2e:07: 78:31:c4:2a:74:ef:8b:99:dc:9e:c5:26:b0:d9:fd:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:5a:11:f7:cd:95:2a:32:22:fa:30:33:73:e9:43:f6: 41:91:9d:40:5c:f3:61:07:f4:c0:97:2c:d8:ce:53:08: b1:07:a5:6b:a3:5d:29:50:8d:d9:a3:58:78:69:94:b2: bd:5f:a9:c5:36:6d:b0:6c:72:44:b3:bf:e2:3c:0c:5d: 7a:2f:21:51:fa:31:e0:ec:1c:f6:fc:b5:38:9d:e7:6b: a7:3f:8a:fc:49:16:0b:fd:dc:23:b5:40:06:d2:11:dd: c7:61:09:a9:62:c0:5d:d6:01:6b:3e:9b:19:98:49:5f: d7:9c:26:16:c1:0e:ed:b1:70:91:35:eb:37:5e:24:25: 8b:32:ea:20:0e:8d:d4:2d:c0:2f:ea:1d:d6:e3:07:cc: c3:59:37:27:a1:fe:d8:82:2d:46:1a:49:bb:ef:28:cd: d5:0a:ef:49:fa:e3:8e:94:db:9d:d5:df:63:16:b4:66: 6d:90:25:15:9c:7f:c4:9e:8a:30:3c:5e:d1:69:9d:46: 42:69:a6:69:da:ef:49:b7:e6:25:fd:f3:6f:1b:01:eb: c1:f1:ac:93:05:7a:96:07:ab:48:39:5a:b7:d7:25:9e: 63:32:bc:32:63:f8:65:93:1c:83:72:c0:20:05:7d:5c: 37:86:82:b3:35:1f:4a:2e:16:77:b0:d9:e0:6c:d6:39 Fingerprint (SHA-256): 07:17:C0:EA:8B:AB:CA:CA:B8:A3:19:0F:55:64:AF:60:C4:A3:3D:B8:05:DB:DB:E3:17:27:10:7A:DF:BE:2F:BC Fingerprint (SHA1): BB:37:2D:FF:E7:DC:44:73:5A:DF:69:77:8C:69:03:E9:34:3B:AD:45 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4863: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4864: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043393 (0x6709c81) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 09:53:13 2016 Not After : Fri Jan 08 09:53:13 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:c3:b9:a5:9e:33:a3:f9:9d:bb:f1:fc:c1:e6:9c:cc: c2:93:d9:c2:76:52:cf:08:2a:99:80:fe:c4:87:ff:99: cc:ec:95:e5:b5:44:19:29:6f:5a:50:47:b1:e8:5a:a9: c5:cf:5b:46:e4:ae:1a:05:90:ad:ba:ad:52:0f:a3:43: 46:21:53:b9:3d:aa:a4:46:80:d3:27:7b:f4:bd:c9:c3: 0c:7b:d5:cc:e7:a9:c8:fb:f3:09:9b:ee:1d:91:20:a2: 27:e8:92:ca:f5:73:fc:0c:b6:84:0c:c7:78:1a:e9:ee: dd:5e:2c:a1:3c:f1:87:3f:ce:70:b2:4d:33:a3:9c:3b: 5e:99:95:b2:5f:89:7b:45:13:36:4a:08:4c:ab:45:28: 28:e5:7f:a9:40:c3:05:43:a6:5b:55:c5:1b:7a:1c:3e: a9:27:08:af:29:b0:c1:b3:b8:9b:5c:7a:97:d1:e3:84: 27:c7:da:20:14:6a:84:45:22:22:9e:15:f0:5d:75:f3: 76:2f:50:3d:e3:03:c5:c1:61:23:a5:00:e6:f1:22:d1: 0f:4d:47:41:32:61:96:00:0f:63:69:8f:b0:01:62:57: 87:73:f3:53:f8:38:8e:43:87:f7:e5:43:0a:c0:f6:45: 81:c5:06:76:fa:e8:f8:3c:e1:5b:a7:47:dd:30:8f:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:ff:c1:75:33:9f:fa:08:6b:4e:68:bf:3f:a7:f3:53: 87:23:40:77:1d:40:10:aa:6c:78:27:14:d2:6b:43:76: 22:ce:fd:85:b1:18:41:20:79:9c:80:72:f7:0e:a2:f0: 5b:c8:df:19:09:ef:ef:01:ca:a9:68:b9:d5:c3:3c:b0: d0:e9:bb:7a:39:5f:fc:29:75:0d:fc:99:14:bf:04:8d: 9d:b9:8e:12:da:3d:d9:a2:06:3f:df:ae:fc:a6:84:b1: e9:a6:31:2f:e6:ae:ef:b3:5f:ff:eb:db:f4:8b:63:56: 13:39:73:77:36:c1:6d:d4:ad:46:97:0f:f5:9f:dd:cf: a1:d9:61:cd:8d:ee:d6:e8:82:84:43:4c:70:bb:40:c0: bd:26:8d:1a:a7:54:9f:e3:1b:1d:06:07:ed:93:61:41: 6d:b3:89:0d:2c:b0:c4:6b:84:b8:82:71:08:f2:fa:80: cd:3b:59:d8:dc:fb:ee:8c:20:16:5e:39:93:13:fd:d0: f6:ef:8e:54:b6:09:2d:4c:df:e4:57:15:aa:fe:b5:ee: 75:ef:91:a6:bc:08:c3:37:14:3b:bc:ae:20:16:69:73: ec:11:9a:77:7e:36:6f:f9:d0:2b:bf:73:98:25:d6:40: 5e:25:fe:65:10:2a:f8:c4:1f:0d:62:2a:d3:37:ac:53 Fingerprint (SHA-256): E9:E0:A5:C6:BD:87:88:79:66:7D:F2:1B:C9:7F:29:69:60:18:1F:6C:84:A4:C2:AE:7B:0C:71:E0:F8:C0:EB:CA Fingerprint (SHA1): 62:7B:F9:E2:D0:D8:8F:2D:F6:97:48:BA:C4:F0:F2:5C:82:53:05:62 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #4865: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4866: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043395 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4867: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4868: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4869: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4870: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108043396 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4871: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4872: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4873: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4874: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108043397 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4875: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4876: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #4877: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4878: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 108043398 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4879: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4880: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4881: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4882: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 108043399 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4883: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4884: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4885: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4886: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4887: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4888: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #4889: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043395 (0x6709c83) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:54:10 2016 Not After : Fri Jan 08 09:54:10 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:c9:05:80:ea:d4:a1:4e:0b:d4:df:a0:75:c2:79:6e: 6e:c4:97:cc:5f:44:8f:c7:1a:47:8d:4e:4f:8d:c6:2e: 23:32:03:73:7d:b5:2d:a0:68:6e:2f:4d:41:4d:04:b5: 44:5c:5d:20:c9:5b:55:68:b0:63:c6:8d:36:fc:51:f6: 24:29:86:4b:c7:ee:28:7f:52:6d:af:c7:b1:e4:34:e6: 1b:80:f3:91:88:96:9a:ba:09:33:4c:62:c4:a1:b2:d7: 95:07:88:21:ea:4d:b4:e4:1b:61:b3:47:90:04:f7:f3: 11:67:2e:cb:5e:2b:ae:e3:03:35:c5:5b:22:72:be:b5: bb:5d:c8:2b:0d:e5:e2:43:f7:a5:04:4a:5b:4d:5a:dc: 52:21:39:30:ea:0d:ee:17:57:0c:59:43:8c:ee:c1:34: 0c:21:16:b6:78:d2:4b:bf:74:fa:28:f9:af:7e:7d:ca: f4:ab:fd:c4:e1:a8:b8:98:89:76:95:ed:62:60:92:cc: 66:90:0b:57:91:15:76:3a:85:25:ce:86:76:ad:56:94: 8d:c9:96:ba:73:ae:eb:2e:02:e8:8d:8e:6c:94:ee:df: 3b:12:7f:4f:5a:ab:9c:e8:f6:fb:bf:3d:82:93:d8:b8: 40:b8:bd:49:8c:21:3f:75:bb:de:79:08:66:34:b6:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:43:14:45:d9:08:c4:11:e6:ed:7d:a1:54:8d:8f:15: 56:1d:e5:c0:44:49:da:d2:bc:5f:4e:4a:a7:46:7a:7b: 96:e5:e4:00:ba:dd:14:e4:4c:42:3f:51:32:72:01:be: 8b:0e:de:bb:b3:6a:83:39:b4:fe:db:ab:8b:e5:3e:4a: 3f:29:3c:40:57:b0:54:a3:a9:a2:a5:23:63:d3:df:1c: e3:3e:3b:58:78:d9:f6:7e:16:d6:9b:aa:32:21:83:4f: 35:df:39:4f:7c:cd:10:cf:50:9a:3a:72:3c:02:cc:b1: ea:99:dc:d9:b3:d7:80:f0:b2:cd:fa:8a:52:13:38:b3: 02:bb:55:95:d7:49:0e:2b:77:2e:ff:86:16:56:7e:2e: 16:85:bb:e1:72:1b:26:d5:25:5d:e8:1d:4e:90:46:7d: 10:3a:e1:78:6b:25:61:2c:f7:27:ce:93:9d:f3:ae:0d: 65:d8:7c:86:e1:9f:88:03:79:f3:4d:45:48:6b:b4:bb: 78:48:ee:b4:19:4a:c1:87:dd:27:11:bc:11:62:93:25: 90:60:1f:3a:45:9d:6d:f3:3f:35:86:d7:22:20:5d:d0: 53:0a:7a:80:d6:7a:2d:d1:ca:b5:5e:dd:9f:df:00:60: e1:8b:08:f1:17:f7:0a:4f:03:72:8d:c5:a4:f1:2a:3b Fingerprint (SHA-256): 74:FC:A3:59:96:03:6E:05:A1:E9:A5:AC:CC:FA:DF:CE:66:CF:D3:FB:97:3F:04:A2:2D:9B:9F:D8:98:25:00:F9 Fingerprint (SHA1): 94:14:D2:96:CF:F7:74:8D:53:F6:83:EE:FE:69:3B:02:EE:81:AE:A8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4890: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4891: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043396 (0x6709c84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:54:19 2016 Not After : Fri Jan 08 09:54:19 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:e9:58:35:2d:15:cb:d2:53:01:d9:de:b0:06:f9:ae: 6d:62:3d:35:63:66:6c:77:82:bc:0d:b4:67:f8:57:8c: 42:ed:d5:98:25:fc:90:d8:77:b7:c8:36:ab:b0:03:13: 63:c8:c3:dd:87:39:08:2b:c8:79:c7:60:0d:30:b6:b5: 56:8d:5c:0b:94:5a:11:82:08:4c:c8:9a:b4:15:dd:ec: d7:6b:03:f2:6f:50:ca:77:f4:5d:53:58:17:18:39:c7: f6:28:ee:85:da:cf:de:6e:d4:41:78:3a:65:48:ef:4f: 65:64:21:de:da:8e:55:0b:e1:a3:55:fa:df:a6:4f:fc: 9b:c7:c4:de:11:f0:aa:fe:8b:84:05:4d:00:fa:96:c9: 7c:5d:2c:a8:d7:14:1d:da:3d:90:be:64:69:65:ca:a3: 11:b9:49:73:a0:32:ab:e5:43:16:ca:af:a4:bf:f0:95: 51:c2:2f:6b:3d:8d:b9:8d:04:8e:f9:46:ca:91:02:f8: 0a:39:5a:8f:96:f0:36:84:a5:3d:f6:69:03:59:30:c4: dc:9f:9e:21:15:3b:96:f8:99:0c:a1:29:d8:24:f2:fb: f3:1a:ba:70:c5:d4:05:5c:2b:d3:05:cb:dc:4a:38:b8: 33:a2:63:22:17:71:91:2e:95:27:48:e1:d3:1c:34:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:e1:14:23:6c:08:5c:8e:89:ad:3b:d9:2e:eb:10:1a: 24:0e:90:33:1c:c4:e7:09:e9:ea:b2:0c:5e:42:04:4b: c7:16:7b:05:99:86:9e:65:71:53:df:cc:25:be:93:1a: 75:e0:44:ad:71:65:17:82:42:bd:b5:83:97:63:99:16: 6f:49:34:6f:a9:a7:53:ac:08:ec:44:9a:3b:74:69:cd: b1:f6:4e:fb:d9:ec:88:77:3a:1d:dc:a3:5c:44:c0:6c: 5c:9f:23:54:bb:11:44:6e:bb:28:35:79:99:a8:8f:94: c3:7c:8a:86:05:b5:7c:59:e2:07:47:49:db:fd:83:bb: 10:cd:67:82:0e:51:2b:fb:a3:87:ed:c4:db:fc:c4:fb: bf:19:0d:ef:28:9f:8f:b8:77:ff:fa:cc:a7:9e:26:0a: 24:6d:31:a7:f7:f6:39:e0:55:a2:57:bd:9f:da:97:9f: ae:b0:39:c5:b5:69:8c:3d:2e:51:ff:11:cd:da:70:4b: 21:0e:87:65:5e:d5:d2:19:7b:89:db:6d:c0:db:29:dd: 55:23:b3:8b:01:1d:d7:84:f2:7f:27:8f:be:e1:42:b0: a3:3a:4d:0d:9f:c4:7d:9d:78:61:82:e6:7a:7a:c2:2d: 22:8b:6e:e8:ee:3d:52:31:7b:69:54:1e:39:8b:6f:6b Fingerprint (SHA-256): 9E:47:3A:2C:5A:B7:84:18:6C:45:C1:34:B1:50:3C:C0:A7:F4:25:52:79:00:27:2E:1E:E3:B1:7F:2B:CE:C1:A1 Fingerprint (SHA1): E8:FE:58:CB:93:6E:EE:67:BB:2D:BB:69:62:E1:DF:D8:6A:5A:2F:65 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4892: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4893: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4894: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043397 (0x6709c85) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 09:54:25 2016 Not After : Fri Jan 08 09:54:25 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:cf:a0:8f:96:eb:5e:cc:99:fe:7c:89:05:e8:e7:76: 10:fb:51:b7:72:5e:62:ad:e9:6a:8a:5e:43:95:8c:c6: 99:52:1f:27:91:6d:16:33:32:37:57:07:e5:9b:4f:ff: c0:2b:0b:c8:14:f9:28:63:e5:14:b9:c5:16:06:9d:67: 47:b7:b7:93:bb:0c:1c:b8:65:18:0d:cb:70:40:b3:70: 16:53:22:15:39:2e:16:60:50:a2:94:76:54:af:99:b0: c0:50:46:6b:33:cb:ba:56:df:ef:8b:22:f1:7d:77:bd: 98:8f:fc:3a:25:5e:74:af:10:78:d6:e3:55:67:3a:1b: 40:d6:97:50:7c:15:03:fd:cb:12:20:b0:6d:23:04:e4: 31:39:b3:c6:be:a2:b9:96:8c:37:50:3a:28:b4:d5:9f: 38:b0:17:61:c2:23:ed:ae:c9:3c:60:53:d3:d6:ec:bd: bd:f5:07:f2:1d:e2:f8:e8:7d:8d:46:d4:5b:e6:4d:c4: cf:44:6c:bc:a2:8b:c6:c0:6b:24:66:78:30:f5:55:a6: af:6b:45:69:4d:1d:c5:d6:d1:8d:b2:19:ce:7e:f5:b1: 06:1a:d8:51:8e:0d:2e:75:e5:f5:d4:27:8e:19:59:23: f5:a3:9a:dc:77:ef:11:47:d9:23:56:fb:fe:d0:d8:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:79:0a:95:9c:3a:0a:d2:58:b7:2e:21:62:c9:7e:fb: 26:9a:e5:4e:4a:a0:a3:e2:47:f3:37:e5:3b:78:2e:06: 28:72:bd:cd:ee:6c:49:2e:31:d2:03:2d:ba:6f:3e:a1: 3c:19:d0:83:ec:14:48:1b:2b:83:4e:69:51:bb:3c:41: d8:27:d5:e9:8b:a2:29:15:c2:6f:9d:91:fc:57:1b:bb: 08:7e:aa:4b:aa:1d:59:a7:34:ee:01:83:17:a7:de:06: 25:0f:a1:d7:c4:26:ea:53:b1:50:f5:1b:57:ba:d9:8e: 35:70:b8:54:9d:36:6c:b9:76:c4:4f:f3:00:60:8c:a9: 9e:40:7a:10:df:eb:03:a0:ce:bb:3d:53:2f:06:d4:ae: 2d:42:10:b3:5a:77:48:1d:4a:ab:20:45:2d:96:da:45: 69:b7:ad:43:8d:89:97:5a:38:bc:a9:dc:98:00:da:a1: d5:68:ee:80:e3:1f:63:cc:7a:4b:7d:d7:a6:7c:04:ec: 42:14:6f:10:b6:f4:86:5e:a8:97:3d:ec:4f:67:0c:0c: 98:04:c9:28:99:24:7d:9e:8c:e1:cb:59:e9:8b:cf:6a: d0:92:a3:a9:d2:11:43:cf:0e:56:25:2c:56:cc:f3:f5: 56:60:f3:3f:7c:48:33:be:c2:d7:41:d1:77:20:e1:2a Fingerprint (SHA-256): CA:C3:98:F3:CD:56:BD:A1:90:B4:12:10:9C:4C:A1:EA:17:0F:F7:85:D0:92:DF:A9:85:5F:D2:B0:4B:BA:CF:1D Fingerprint (SHA1): B4:14:32:78:FA:4A:B8:74:0D:3F:2D:91:2D:55:9C:06:65:4E:CC:BF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #4895: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4896: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043400 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4897: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4898: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4899: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4900: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108043401 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4901: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4902: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4903: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4904: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108043402 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA1Root-108043309.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4905: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4906: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4907: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4908: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108043403 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4909: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4910: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #4911: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043400 (0x6709c88) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 09:54:55 2016 Not After : Fri Jan 08 09:54:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:c6:51:36:da:ed:5f:dd:fd:c9:57:5b:07:3c:9d:3f: 75:ab:24:5a:87:30:63:fb:65:c4:40:34:4d:fc:90:71: 2d:66:bb:ae:20:17:89:2d:f9:4f:14:c4:f2:06:83:17: c4:4b:ec:e6:a7:70:c2:6c:76:ea:f2:0d:35:e3:78:e8: 50:c0:bf:e3:b5:90:67:9f:2c:a4:0d:a0:bf:3e:b8:80: c9:a3:5b:05:97:18:10:f7:d9:f0:fd:09:95:05:e6:7c: b9:93:f6:b7:d0:19:ec:e2:74:eb:be:9b:76:51:b1:8a: d7:c3:d7:a0:42:30:e1:9e:55:fa:08:4c:3d:36:7a:52: b8:9c:f7:05:1d:fb:a3:f6:ce:e1:63:03:0d:79:ff:42: 56:ab:07:6d:19:69:a9:cb:b9:9b:49:af:99:5d:3d:59: 8c:a2:4e:7f:aa:50:2d:28:ef:79:bc:6d:75:46:9d:e9: 79:28:6b:9c:4a:2f:6d:24:27:09:d4:a1:ce:58:91:db: 77:32:cd:eb:41:14:09:30:ae:4a:0f:a0:33:ca:e2:86: 86:9e:61:90:77:0b:ec:d9:27:bc:bc:30:e0:de:a2:72: f7:3b:d6:db:07:2e:cf:77:f8:96:c1:1f:d3:9e:f2:a0: 38:8c:17:c6:37:36:ba:b7:54:c6:8b:4a:29:76:ca:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:54:22:d3:1e:13:62:da:b8:57:fd:af:ff:0a:39:a2: 07:f5:c7:e6:d4:d0:f7:fe:17:e9:8f:46:7f:3c:04:33: 73:6f:ad:4b:7a:ac:00:e6:2a:ef:20:7d:50:92:8e:2f: 43:31:cc:4a:09:ec:f4:c9:74:ee:1d:b3:97:3b:30:dd: e7:86:fa:79:53:17:42:b5:af:f7:1d:73:82:f7:6b:c1: 9e:f1:72:cf:9e:ad:ff:69:e5:4d:4c:d2:e3:66:8d:79: e1:20:c9:7b:a3:1f:bb:9b:a3:8d:0a:ce:29:c8:08:43: 6a:4d:83:a9:ac:eb:47:4d:e5:44:f0:c8:b3:b5:33:9a: c0:74:c5:65:a8:ee:a8:22:98:f2:6e:6c:c9:d4:0b:7f: 71:f7:3f:88:6c:4f:30:cb:ab:cf:0a:56:2d:23:56:ef: 73:a4:23:7d:eb:43:15:5c:cd:7d:14:77:2e:84:e6:22: 67:d4:f4:64:f5:3b:10:b5:1a:86:2c:92:79:ed:42:27: e1:d7:f0:15:25:c2:35:fa:84:7f:12:f7:d8:a6:8e:d6: fe:ac:9f:da:ed:74:b4:b7:4f:4d:9d:8e:10:95:fe:85: 5b:51:a8:67:fa:7a:d3:ac:65:dc:ea:92:ce:90:6b:ed: 4b:d9:ab:b7:6a:4e:82:4c:ab:8d:3d:7d:12:ba:07:ca Fingerprint (SHA-256): 72:C0:A9:8C:75:6F:47:A5:44:AF:F7:C3:F9:B7:F4:57:1B:D5:CA:14:41:A1:93:23:43:B4:C1:ED:7C:B0:8D:FE Fingerprint (SHA1): FE:14:C7:CC:FC:DC:27:52:BF:DB:BE:40:E3:7D:0B:7E:BE:1D:2F:92 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4912: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4913: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043404 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4914: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4915: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4916: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043405 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4917: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4918: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4919: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4920: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108043406 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4921: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4922: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108043407 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4923: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4924: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #4925: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4926: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4927: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108043408 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-Bridge-108043310.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4928: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4929: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4930: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4931: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108043409 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4932: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4933: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4934: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4935: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043405 (0x6709c8d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 09:56:14 2016 Not After : Fri Jan 08 09:56:14 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:3c:5e:5f:70:35:fb:84:31:55:28:db:29:2d:c0:fb: 4d:68:b0:af:bc:bb:d3:db:d8:dc:9b:3d:f3:0e:02:27: 1c:c9:0a:41:f5:d0:5a:fd:d0:e8:1e:f5:20:41:70:04: 2b:4c:25:9f:cb:5d:dc:9b:f6:df:c6:39:4c:e9:ef:e9: 1c:19:c4:68:2f:ec:20:2a:e7:1e:2f:3e:fb:23:1d:e5: 16:be:5b:fa:8a:d9:c7:11:7f:e8:fc:a2:0a:6c:13:4d: ef:2c:3e:4c:bb:38:d0:0a:68:95:dc:6d:67:fc:80:e3: 18:cc:30:e6:3f:16:42:a7:5f:9d:ce:be:2d:58:08:62: 0b:07:b0:b9:dd:33:30:db:ca:cf:8c:af:d4:6e:10:41: bb:d4:4d:22:fc:39:da:77:8f:ef:3b:f0:29:06:e9:78: 94:e3:9f:dd:34:28:4d:8d:36:94:02:10:3a:35:79:1a: 78:93:75:d8:29:bd:18:da:69:c6:18:86:83:e2:7c:6c: 77:f0:36:83:54:de:a1:17:69:ae:0c:0a:fc:67:21:ce: df:6d:b8:8a:9f:bb:67:50:ee:5d:53:c5:40:d3:71:54: dc:a5:5c:c1:f7:2c:32:c1:90:ab:f5:5b:8d:23:27:75: 6d:e3:97:50:94:e0:f4:2e:3c:10:f6:bc:c6:81:11:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: db:49:c2:65:09:10:36:bb:03:75:03:7e:f7:43:ac:46: 79:17:42:0b:8d:87:fb:c7:54:ae:10:1c:57:39:28:72: 26:5a:cf:16:b5:c0:dc:39:b9:a4:16:d8:07:28:bc:0c: 5c:d4:d0:88:6c:5d:7e:f1:e4:a0:16:b7:a7:30:05:55: 03:94:f2:52:1a:f7:2c:62:0b:24:1a:cf:bf:78:58:bb: cc:9b:f9:e4:35:78:6a:d5:b3:60:5d:13:ef:32:1d:06: 15:31:2c:1e:1a:15:87:24:22:ce:86:be:b5:82:d0:c3: 50:0d:11:a4:1a:1d:43:ea:ba:d4:39:9d:4b:c2:93:a9: 22:2e:05:a4:62:ac:28:1f:77:cd:ae:85:f9:2c:31:e2: ac:6c:89:ca:a2:07:6c:01:bf:8d:d7:21:77:82:45:16: 3d:5c:b6:c0:b8:39:97:a7:fb:e1:f1:1b:48:f9:bb:48: 07:33:cb:17:d9:cc:ca:14:79:c0:29:86:07:c3:f7:8a: 59:cc:64:2f:7d:ca:67:07:c8:2d:5d:1b:54:24:47:21: 1d:ca:81:8c:b4:c8:9b:61:47:99:65:c7:ba:dd:14:a4: f9:12:3d:af:2f:56:6d:b4:46:c7:2d:4d:64:8f:fa:b9: 11:f7:70:b8:9d:e9:4b:38:ad:1e:79:7d:53:bc:86:30 Fingerprint (SHA-256): 1E:42:F9:4A:1A:B9:37:B3:15:C2:A2:26:BB:3E:84:A6:FA:58:C3:B4:99:91:A0:84:8C:A5:39:D8:04:3F:C7:78 Fingerprint (SHA1): C5:2D:B3:69:6F:43:E9:93:CC:EF:DB:AC:11:24:28:DE:5A:38:C3:F2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4936: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043405 (0x6709c8d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 09:56:14 2016 Not After : Fri Jan 08 09:56:14 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:3c:5e:5f:70:35:fb:84:31:55:28:db:29:2d:c0:fb: 4d:68:b0:af:bc:bb:d3:db:d8:dc:9b:3d:f3:0e:02:27: 1c:c9:0a:41:f5:d0:5a:fd:d0:e8:1e:f5:20:41:70:04: 2b:4c:25:9f:cb:5d:dc:9b:f6:df:c6:39:4c:e9:ef:e9: 1c:19:c4:68:2f:ec:20:2a:e7:1e:2f:3e:fb:23:1d:e5: 16:be:5b:fa:8a:d9:c7:11:7f:e8:fc:a2:0a:6c:13:4d: ef:2c:3e:4c:bb:38:d0:0a:68:95:dc:6d:67:fc:80:e3: 18:cc:30:e6:3f:16:42:a7:5f:9d:ce:be:2d:58:08:62: 0b:07:b0:b9:dd:33:30:db:ca:cf:8c:af:d4:6e:10:41: bb:d4:4d:22:fc:39:da:77:8f:ef:3b:f0:29:06:e9:78: 94:e3:9f:dd:34:28:4d:8d:36:94:02:10:3a:35:79:1a: 78:93:75:d8:29:bd:18:da:69:c6:18:86:83:e2:7c:6c: 77:f0:36:83:54:de:a1:17:69:ae:0c:0a:fc:67:21:ce: df:6d:b8:8a:9f:bb:67:50:ee:5d:53:c5:40:d3:71:54: dc:a5:5c:c1:f7:2c:32:c1:90:ab:f5:5b:8d:23:27:75: 6d:e3:97:50:94:e0:f4:2e:3c:10:f6:bc:c6:81:11:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: db:49:c2:65:09:10:36:bb:03:75:03:7e:f7:43:ac:46: 79:17:42:0b:8d:87:fb:c7:54:ae:10:1c:57:39:28:72: 26:5a:cf:16:b5:c0:dc:39:b9:a4:16:d8:07:28:bc:0c: 5c:d4:d0:88:6c:5d:7e:f1:e4:a0:16:b7:a7:30:05:55: 03:94:f2:52:1a:f7:2c:62:0b:24:1a:cf:bf:78:58:bb: cc:9b:f9:e4:35:78:6a:d5:b3:60:5d:13:ef:32:1d:06: 15:31:2c:1e:1a:15:87:24:22:ce:86:be:b5:82:d0:c3: 50:0d:11:a4:1a:1d:43:ea:ba:d4:39:9d:4b:c2:93:a9: 22:2e:05:a4:62:ac:28:1f:77:cd:ae:85:f9:2c:31:e2: ac:6c:89:ca:a2:07:6c:01:bf:8d:d7:21:77:82:45:16: 3d:5c:b6:c0:b8:39:97:a7:fb:e1:f1:1b:48:f9:bb:48: 07:33:cb:17:d9:cc:ca:14:79:c0:29:86:07:c3:f7:8a: 59:cc:64:2f:7d:ca:67:07:c8:2d:5d:1b:54:24:47:21: 1d:ca:81:8c:b4:c8:9b:61:47:99:65:c7:ba:dd:14:a4: f9:12:3d:af:2f:56:6d:b4:46:c7:2d:4d:64:8f:fa:b9: 11:f7:70:b8:9d:e9:4b:38:ad:1e:79:7d:53:bc:86:30 Fingerprint (SHA-256): 1E:42:F9:4A:1A:B9:37:B3:15:C2:A2:26:BB:3E:84:A6:FA:58:C3:B4:99:91:A0:84:8C:A5:39:D8:04:3F:C7:78 Fingerprint (SHA1): C5:2D:B3:69:6F:43:E9:93:CC:EF:DB:AC:11:24:28:DE:5A:38:C3:F2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4937: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4938: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043410 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4939: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4940: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4941: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043411 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4942: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4943: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4944: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4945: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108043412 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4946: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4947: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108043413 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4948: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4949: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #4950: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4951: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4952: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108043414 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-Bridge-108043311.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4953: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4954: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4955: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4956: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108043415 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4957: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4958: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4959: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4960: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108043416 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-BridgeNavy-108043312.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4961: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4962: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4963: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4964: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108043417 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4965: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4966: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4967: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4968: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043411 (0x6709c93) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 09:57:46 2016 Not After : Fri Jan 08 09:57:46 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:f4:d1:ec:cf:98:6a:74:94:a8:34:29:e5:00:27:27: 7d:5d:0a:23:36:97:83:e0:34:40:ea:c3:d5:14:72:79: f8:a7:d0:b6:06:a4:38:1c:b9:f0:1b:c5:07:ac:57:ea: e8:5d:89:18:7e:10:d2:a1:a4:54:5a:fc:43:71:d6:fe: fa:21:7d:34:ff:02:1d:97:6a:4d:19:bd:c5:dc:7c:b9: ae:cc:4a:ba:eb:8a:6f:d0:1a:d0:49:19:ec:12:d2:bb: 26:6b:15:64:4b:93:28:e4:cc:12:91:01:6e:78:cc:12: 5a:39:f2:fc:10:2c:6d:73:cc:3c:8a:69:7d:01:1c:91: 42:dd:bd:16:bf:05:5c:7c:ba:d3:73:4f:17:e6:34:9f: a7:0b:de:97:e3:f9:8f:dc:50:50:f9:20:54:82:7d:25: 29:14:c7:fd:0b:3e:f9:9e:eb:24:21:cc:df:ce:b9:1c: 24:83:e6:15:0d:6a:e4:eb:92:0d:62:42:a9:ca:42:78: 4e:05:3e:49:c1:19:e8:44:90:d3:f8:c3:45:c8:2f:8d: 1d:ee:6c:37:e7:17:a6:cc:3c:32:03:53:fc:e1:9f:f2: 55:65:9f:73:c7:f0:c4:1a:68:26:d2:6c:e7:a6:4a:74: f5:d4:39:1e:f4:32:fe:9f:67:16:e9:a4:59:d0:94:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:a2:76:99:ce:69:db:ea:b4:6f:e9:5f:06:2c:2d:fd: 1a:ee:23:e1:67:b9:ab:9f:aa:fc:de:e2:2b:0b:da:d6: c3:c7:60:f9:bb:85:ea:c8:02:0d:43:dc:69:e1:fb:10: c9:ed:78:5c:bc:61:91:74:80:f4:28:1e:73:5b:df:c9: e6:1f:d5:e3:79:14:5f:b3:b0:5d:52:34:b7:f0:79:83: 55:cc:05:70:28:63:2c:1c:86:64:e5:ad:aa:b1:cc:9a: 90:8d:69:1c:9c:82:5a:6d:8b:40:ba:4f:72:cb:a5:31: e8:c1:c3:62:7a:b7:5a:b1:7c:c5:92:2f:ee:47:be:8c: b5:0e:3e:f0:c6:71:63:c0:72:12:ed:20:f2:60:bf:f2: 1e:ce:ec:c1:b3:08:ee:c3:0f:74:ca:98:1a:89:e7:22: de:b8:e3:82:0d:78:5a:fd:c2:91:d7:cd:b7:6c:97:53: a0:73:0b:6e:2b:36:64:d4:0f:74:10:db:16:07:62:e8: 38:23:c2:7e:3b:7c:be:5e:00:97:59:c4:c3:8a:38:69: c9:2f:f0:a5:b6:56:1c:9b:79:6e:41:5a:cb:f0:6d:18: 2d:55:97:00:ab:f8:ea:c4:6c:85:ae:d2:8a:f2:ba:56: 6c:1f:48:95:3a:72:70:b1:68:f6:a3:32:72:3f:35:4e Fingerprint (SHA-256): 2E:76:A7:57:59:66:4F:26:83:F7:D1:00:39:3E:7A:2A:2C:5A:1F:0A:42:60:55:FF:15:F3:65:78:C8:ED:00:B2 Fingerprint (SHA1): 3B:09:51:A1:C2:1A:D8:CE:94:AD:AA:B9:6B:FD:3B:5D:C1:ED:E8:AB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4969: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043411 (0x6709c93) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 09:57:46 2016 Not After : Fri Jan 08 09:57:46 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:f4:d1:ec:cf:98:6a:74:94:a8:34:29:e5:00:27:27: 7d:5d:0a:23:36:97:83:e0:34:40:ea:c3:d5:14:72:79: f8:a7:d0:b6:06:a4:38:1c:b9:f0:1b:c5:07:ac:57:ea: e8:5d:89:18:7e:10:d2:a1:a4:54:5a:fc:43:71:d6:fe: fa:21:7d:34:ff:02:1d:97:6a:4d:19:bd:c5:dc:7c:b9: ae:cc:4a:ba:eb:8a:6f:d0:1a:d0:49:19:ec:12:d2:bb: 26:6b:15:64:4b:93:28:e4:cc:12:91:01:6e:78:cc:12: 5a:39:f2:fc:10:2c:6d:73:cc:3c:8a:69:7d:01:1c:91: 42:dd:bd:16:bf:05:5c:7c:ba:d3:73:4f:17:e6:34:9f: a7:0b:de:97:e3:f9:8f:dc:50:50:f9:20:54:82:7d:25: 29:14:c7:fd:0b:3e:f9:9e:eb:24:21:cc:df:ce:b9:1c: 24:83:e6:15:0d:6a:e4:eb:92:0d:62:42:a9:ca:42:78: 4e:05:3e:49:c1:19:e8:44:90:d3:f8:c3:45:c8:2f:8d: 1d:ee:6c:37:e7:17:a6:cc:3c:32:03:53:fc:e1:9f:f2: 55:65:9f:73:c7:f0:c4:1a:68:26:d2:6c:e7:a6:4a:74: f5:d4:39:1e:f4:32:fe:9f:67:16:e9:a4:59:d0:94:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:a2:76:99:ce:69:db:ea:b4:6f:e9:5f:06:2c:2d:fd: 1a:ee:23:e1:67:b9:ab:9f:aa:fc:de:e2:2b:0b:da:d6: c3:c7:60:f9:bb:85:ea:c8:02:0d:43:dc:69:e1:fb:10: c9:ed:78:5c:bc:61:91:74:80:f4:28:1e:73:5b:df:c9: e6:1f:d5:e3:79:14:5f:b3:b0:5d:52:34:b7:f0:79:83: 55:cc:05:70:28:63:2c:1c:86:64:e5:ad:aa:b1:cc:9a: 90:8d:69:1c:9c:82:5a:6d:8b:40:ba:4f:72:cb:a5:31: e8:c1:c3:62:7a:b7:5a:b1:7c:c5:92:2f:ee:47:be:8c: b5:0e:3e:f0:c6:71:63:c0:72:12:ed:20:f2:60:bf:f2: 1e:ce:ec:c1:b3:08:ee:c3:0f:74:ca:98:1a:89:e7:22: de:b8:e3:82:0d:78:5a:fd:c2:91:d7:cd:b7:6c:97:53: a0:73:0b:6e:2b:36:64:d4:0f:74:10:db:16:07:62:e8: 38:23:c2:7e:3b:7c:be:5e:00:97:59:c4:c3:8a:38:69: c9:2f:f0:a5:b6:56:1c:9b:79:6e:41:5a:cb:f0:6d:18: 2d:55:97:00:ab:f8:ea:c4:6c:85:ae:d2:8a:f2:ba:56: 6c:1f:48:95:3a:72:70:b1:68:f6:a3:32:72:3f:35:4e Fingerprint (SHA-256): 2E:76:A7:57:59:66:4F:26:83:F7:D1:00:39:3E:7A:2A:2C:5A:1F:0A:42:60:55:FF:15:F3:65:78:C8:ED:00:B2 Fingerprint (SHA1): 3B:09:51:A1:C2:1A:D8:CE:94:AD:AA:B9:6B:FD:3B:5D:C1:ED:E8:AB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4970: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #4971: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043410 (0x6709c92) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 09:57:34 2016 Not After : Fri Jan 08 09:57:34 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:e2:62:b0:71:5c:6d:4f:fb:33:91:07:39:41:4f:1d: 82:9c:af:af:72:d7:2f:2f:7f:c5:5a:42:b4:75:f4:50: c5:1a:03:db:c7:6f:5b:ba:bd:5c:20:08:6c:38:56:73: f1:72:7c:38:a8:6f:e1:ad:12:de:18:4a:22:e6:ca:50: 2c:a4:e7:e7:22:ae:c8:45:01:59:b3:6a:36:1c:8f:cc: 60:ab:77:26:ca:9d:c0:a3:fe:97:80:3a:25:70:37:f7: 5f:f6:c1:10:12:96:84:dd:b2:56:0c:da:9e:c5:2d:4d: 4c:20:1c:2a:80:c7:74:a6:87:f0:e9:8a:bf:9f:3a:d7: 5d:33:16:28:b1:22:78:0c:e8:a9:fd:ed:c3:e1:9d:36: 0f:2c:08:c5:a2:ed:d6:fc:9c:87:d1:db:84:5a:76:d8: 4d:d6:26:5e:3b:26:0f:82:e0:fd:4b:19:0f:bf:2f:ee: 8d:db:95:15:f4:91:6e:7d:d7:44:e8:0b:02:e9:08:26: ef:31:c8:e1:c7:0c:cc:40:b8:bc:7c:36:ad:67:77:7f: 16:96:69:dd:ba:dd:c6:79:6c:aa:32:e4:22:ca:75:31: 20:67:58:f5:fa:19:d3:aa:03:99:3c:4c:9b:1f:2e:06: fe:9e:73:d3:81:f3:38:49:b3:85:7f:27:06:43:b1:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:53:92:eb:e0:84:a3:03:8e:e3:37:45:af:dd:1e:74: f5:fa:5e:ff:6c:22:bd:bc:98:0e:aa:46:97:e2:9b:55: a9:cb:32:52:39:a6:37:fe:c4:bf:4d:23:44:c5:2c:3d: e5:0c:80:2f:a9:2f:a6:f2:fb:65:d4:54:9a:d2:c8:43: cf:4c:fd:45:af:b8:b1:ee:01:50:4d:c7:31:40:20:52: 21:c6:26:27:1d:32:9f:92:61:33:b4:ce:83:92:e7:33: c7:75:f8:77:5b:c1:f1:c4:aa:4a:c1:f1:3c:3b:d4:78: 94:d3:29:dc:55:47:9e:3e:84:e1:12:de:b3:da:c7:43: 24:39:39:d7:d3:4c:99:e3:98:c7:aa:f8:8b:cc:70:a9: 51:81:3b:47:a1:b2:eb:d3:9d:56:ba:63:2c:2c:47:c5: 5f:e8:32:a5:f8:3c:74:be:3e:fc:90:1c:b9:d9:6f:9d: 12:9e:a9:f5:42:43:72:60:b3:db:26:33:f5:d6:57:d4: 1c:0e:9f:c2:8d:f9:fb:2d:e9:61:c8:0d:23:cd:d2:fd: ff:90:d9:88:f8:13:72:ac:e3:cf:2c:e2:45:bc:dd:36: 48:4b:db:7a:fc:c4:9f:e2:5d:c4:95:aa:cb:20:0f:f2: b4:5b:58:c2:73:be:69:6b:ea:fb:6e:42:78:3e:87:24 Fingerprint (SHA-256): 1C:7C:BF:80:D9:EE:F9:AE:9B:6A:38:C5:D0:AC:18:91:11:2B:FE:93:2B:8B:75:53:8E:42:6B:2B:F9:81:49:85 Fingerprint (SHA1): AE:A8:0B:C5:37:D4:83:BE:71:80:DD:90:84:1A:41:17:FE:E8:9B:3C Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4972: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043411 (0x6709c93) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 09:57:46 2016 Not After : Fri Jan 08 09:57:46 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:f4:d1:ec:cf:98:6a:74:94:a8:34:29:e5:00:27:27: 7d:5d:0a:23:36:97:83:e0:34:40:ea:c3:d5:14:72:79: f8:a7:d0:b6:06:a4:38:1c:b9:f0:1b:c5:07:ac:57:ea: e8:5d:89:18:7e:10:d2:a1:a4:54:5a:fc:43:71:d6:fe: fa:21:7d:34:ff:02:1d:97:6a:4d:19:bd:c5:dc:7c:b9: ae:cc:4a:ba:eb:8a:6f:d0:1a:d0:49:19:ec:12:d2:bb: 26:6b:15:64:4b:93:28:e4:cc:12:91:01:6e:78:cc:12: 5a:39:f2:fc:10:2c:6d:73:cc:3c:8a:69:7d:01:1c:91: 42:dd:bd:16:bf:05:5c:7c:ba:d3:73:4f:17:e6:34:9f: a7:0b:de:97:e3:f9:8f:dc:50:50:f9:20:54:82:7d:25: 29:14:c7:fd:0b:3e:f9:9e:eb:24:21:cc:df:ce:b9:1c: 24:83:e6:15:0d:6a:e4:eb:92:0d:62:42:a9:ca:42:78: 4e:05:3e:49:c1:19:e8:44:90:d3:f8:c3:45:c8:2f:8d: 1d:ee:6c:37:e7:17:a6:cc:3c:32:03:53:fc:e1:9f:f2: 55:65:9f:73:c7:f0:c4:1a:68:26:d2:6c:e7:a6:4a:74: f5:d4:39:1e:f4:32:fe:9f:67:16:e9:a4:59:d0:94:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:a2:76:99:ce:69:db:ea:b4:6f:e9:5f:06:2c:2d:fd: 1a:ee:23:e1:67:b9:ab:9f:aa:fc:de:e2:2b:0b:da:d6: c3:c7:60:f9:bb:85:ea:c8:02:0d:43:dc:69:e1:fb:10: c9:ed:78:5c:bc:61:91:74:80:f4:28:1e:73:5b:df:c9: e6:1f:d5:e3:79:14:5f:b3:b0:5d:52:34:b7:f0:79:83: 55:cc:05:70:28:63:2c:1c:86:64:e5:ad:aa:b1:cc:9a: 90:8d:69:1c:9c:82:5a:6d:8b:40:ba:4f:72:cb:a5:31: e8:c1:c3:62:7a:b7:5a:b1:7c:c5:92:2f:ee:47:be:8c: b5:0e:3e:f0:c6:71:63:c0:72:12:ed:20:f2:60:bf:f2: 1e:ce:ec:c1:b3:08:ee:c3:0f:74:ca:98:1a:89:e7:22: de:b8:e3:82:0d:78:5a:fd:c2:91:d7:cd:b7:6c:97:53: a0:73:0b:6e:2b:36:64:d4:0f:74:10:db:16:07:62:e8: 38:23:c2:7e:3b:7c:be:5e:00:97:59:c4:c3:8a:38:69: c9:2f:f0:a5:b6:56:1c:9b:79:6e:41:5a:cb:f0:6d:18: 2d:55:97:00:ab:f8:ea:c4:6c:85:ae:d2:8a:f2:ba:56: 6c:1f:48:95:3a:72:70:b1:68:f6:a3:32:72:3f:35:4e Fingerprint (SHA-256): 2E:76:A7:57:59:66:4F:26:83:F7:D1:00:39:3E:7A:2A:2C:5A:1F:0A:42:60:55:FF:15:F3:65:78:C8:ED:00:B2 Fingerprint (SHA1): 3B:09:51:A1:C2:1A:D8:CE:94:AD:AA:B9:6B:FD:3B:5D:C1:ED:E8:AB Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4973: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043411 (0x6709c93) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 09:57:46 2016 Not After : Fri Jan 08 09:57:46 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:f4:d1:ec:cf:98:6a:74:94:a8:34:29:e5:00:27:27: 7d:5d:0a:23:36:97:83:e0:34:40:ea:c3:d5:14:72:79: f8:a7:d0:b6:06:a4:38:1c:b9:f0:1b:c5:07:ac:57:ea: e8:5d:89:18:7e:10:d2:a1:a4:54:5a:fc:43:71:d6:fe: fa:21:7d:34:ff:02:1d:97:6a:4d:19:bd:c5:dc:7c:b9: ae:cc:4a:ba:eb:8a:6f:d0:1a:d0:49:19:ec:12:d2:bb: 26:6b:15:64:4b:93:28:e4:cc:12:91:01:6e:78:cc:12: 5a:39:f2:fc:10:2c:6d:73:cc:3c:8a:69:7d:01:1c:91: 42:dd:bd:16:bf:05:5c:7c:ba:d3:73:4f:17:e6:34:9f: a7:0b:de:97:e3:f9:8f:dc:50:50:f9:20:54:82:7d:25: 29:14:c7:fd:0b:3e:f9:9e:eb:24:21:cc:df:ce:b9:1c: 24:83:e6:15:0d:6a:e4:eb:92:0d:62:42:a9:ca:42:78: 4e:05:3e:49:c1:19:e8:44:90:d3:f8:c3:45:c8:2f:8d: 1d:ee:6c:37:e7:17:a6:cc:3c:32:03:53:fc:e1:9f:f2: 55:65:9f:73:c7:f0:c4:1a:68:26:d2:6c:e7:a6:4a:74: f5:d4:39:1e:f4:32:fe:9f:67:16:e9:a4:59:d0:94:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:a2:76:99:ce:69:db:ea:b4:6f:e9:5f:06:2c:2d:fd: 1a:ee:23:e1:67:b9:ab:9f:aa:fc:de:e2:2b:0b:da:d6: c3:c7:60:f9:bb:85:ea:c8:02:0d:43:dc:69:e1:fb:10: c9:ed:78:5c:bc:61:91:74:80:f4:28:1e:73:5b:df:c9: e6:1f:d5:e3:79:14:5f:b3:b0:5d:52:34:b7:f0:79:83: 55:cc:05:70:28:63:2c:1c:86:64:e5:ad:aa:b1:cc:9a: 90:8d:69:1c:9c:82:5a:6d:8b:40:ba:4f:72:cb:a5:31: e8:c1:c3:62:7a:b7:5a:b1:7c:c5:92:2f:ee:47:be:8c: b5:0e:3e:f0:c6:71:63:c0:72:12:ed:20:f2:60:bf:f2: 1e:ce:ec:c1:b3:08:ee:c3:0f:74:ca:98:1a:89:e7:22: de:b8:e3:82:0d:78:5a:fd:c2:91:d7:cd:b7:6c:97:53: a0:73:0b:6e:2b:36:64:d4:0f:74:10:db:16:07:62:e8: 38:23:c2:7e:3b:7c:be:5e:00:97:59:c4:c3:8a:38:69: c9:2f:f0:a5:b6:56:1c:9b:79:6e:41:5a:cb:f0:6d:18: 2d:55:97:00:ab:f8:ea:c4:6c:85:ae:d2:8a:f2:ba:56: 6c:1f:48:95:3a:72:70:b1:68:f6:a3:32:72:3f:35:4e Fingerprint (SHA-256): 2E:76:A7:57:59:66:4F:26:83:F7:D1:00:39:3E:7A:2A:2C:5A:1F:0A:42:60:55:FF:15:F3:65:78:C8:ED:00:B2 Fingerprint (SHA1): 3B:09:51:A1:C2:1A:D8:CE:94:AD:AA:B9:6B:FD:3B:5D:C1:ED:E8:AB Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4974: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4975: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043418 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4976: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4977: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4978: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043419 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4979: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4980: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #4981: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4982: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 108043420 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4983: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4984: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #4985: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4986: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 108043421 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4987: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4988: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4989: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4990: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 108043422 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4991: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4992: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 108043423 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4993: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4994: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #4995: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4996: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4997: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108043424 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4998: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4999: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5000: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5001: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108043425 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5002: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5003: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5004: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5005: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108043426 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5006: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5007: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5008: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5009: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108043427 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5010: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5011: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5012: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043418 (0x6709c9a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 09:59:20 2016 Not After : Fri Jan 08 09:59:20 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:25:61:be:3b:c7:07:24:80:a8:04:0f:ec:cd:70:02: 21:4c:97:48:26:ca:cc:4e:f3:b6:1a:41:76:27:31:9c: 17:65:2b:ee:96:2c:de:79:01:79:c5:30:7b:c0:d4:7b: ec:9d:92:a9:33:4f:12:5d:57:41:8e:c2:47:e2:e7:92: 81:0b:59:65:8e:48:32:c3:b8:65:b4:a4:06:6d:52:bb: e1:0b:24:38:52:a1:32:a9:3a:b3:ba:54:55:85:a5:fb: 98:17:97:d9:09:f6:3f:b3:55:6b:d0:79:00:8a:64:a5: ac:23:64:b6:cd:46:5c:3b:cd:03:90:66:75:0c:98:8d: f8:2d:c6:33:9b:47:64:23:ce:e1:3d:a0:a0:71:f3:fb: 44:c5:f2:4d:c5:aa:07:40:a7:45:43:ca:de:87:01:2a: 14:f8:f8:37:04:aa:38:17:a0:cc:89:99:c1:f9:c6:d4: 73:30:65:5d:a1:32:82:34:e4:af:f5:e1:cf:08:b5:26: 8a:45:7c:c2:90:4d:9a:31:31:1c:fe:43:e0:02:52:7f: 86:5f:5b:50:82:e8:ba:c7:6c:b8:3e:d4:bb:47:ee:6a: 32:e5:ad:a3:7c:17:14:12:ea:62:af:5e:9a:a0:73:c9: 97:31:3b:a5:d9:9d:34:e1:ec:9a:b0:03:61:23:c9:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:97:32:d9:61:a9:79:81:60:a7:90:64:ed:5b:8e:9c: 41:d1:40:64:c9:38:4e:18:5d:3a:c1:33:03:84:ae:10: 01:97:41:82:03:c1:2f:4c:fa:62:ba:da:bd:a8:94:9f: 1a:9f:98:3a:a9:6e:46:e3:fb:9d:4d:65:f2:39:8f:e2: d3:35:19:2a:b3:ad:76:75:18:16:fc:1c:d7:b1:2b:48: bc:14:db:3d:f6:b1:69:ab:b5:8e:bc:2f:10:d7:04:c9: 8f:f7:f0:1d:03:33:36:39:ad:94:6f:f3:aa:63:4b:93: a8:76:eb:7d:95:af:d0:d1:c9:bc:12:a7:34:29:c0:9b: 23:38:79:97:dc:6d:47:c7:d9:d1:f4:78:9d:78:91:90: b5:c2:a0:92:82:9d:fa:de:bd:b9:91:05:1f:0f:de:6d: f0:80:0c:d9:4a:84:70:ad:e3:62:d6:3d:c5:0c:56:52: b8:d2:08:7a:36:7a:44:db:40:9a:66:cd:e1:d3:1a:b6: 8a:d5:c6:b0:8f:11:38:d2:6d:01:e8:38:e7:8b:f9:0f: 0c:f2:2b:75:36:55:03:a7:b8:9b:09:6e:76:71:1f:88: 40:2e:e4:4a:62:2b:bf:60:28:0b:0d:1d:0c:4f:04:bf: 06:5a:fe:6f:1a:30:68:64:1b:09:3f:cd:84:0e:9a:9a Fingerprint (SHA-256): 64:0E:A1:E7:F3:C5:6C:53:80:85:0F:DF:91:68:D6:61:FB:8E:8D:75:5D:C4:64:96:E4:84:79:50:E1:FD:C7:02 Fingerprint (SHA1): 31:53:AE:05:F9:6C:16:20:6D:78:E6:CD:A2:13:67:ED:B1:89:D2:5B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #5013: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5014: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5015: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5016: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5017: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5018: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5019: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5020: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5021: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043419 (0x6709c9b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 09:59:28 2016 Not After : Fri Jan 08 09:59:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:8e:50:6f:b2:62:bf:fc:97:cc:a3:18:dc:2c:3f:91: 16:a4:16:f1:54:31:32:7d:d0:38:46:1d:4a:0f:b5:ca: 31:50:14:7a:e1:15:27:0f:20:20:24:0c:bc:47:a3:c8: a7:32:bf:00:b7:81:f3:05:59:8f:2e:2f:8e:b1:1a:09: ae:82:d4:12:83:74:56:c3:12:98:4c:a6:ab:86:a9:d0: ab:32:15:86:88:08:6d:c7:d8:2c:e3:84:cd:47:cf:8c: 1a:93:ba:3d:e3:df:98:df:39:45:c8:85:cc:76:1c:e8: bc:05:23:91:71:0e:33:9a:49:39:df:3c:68:76:9c:a2: 53:63:36:62:a7:e6:49:61:ea:72:b0:aa:4c:44:28:54: fb:35:1e:2e:83:d1:5f:b1:a8:56:e2:66:d1:7c:e3:e9: 02:89:3a:11:55:4c:1a:24:e7:ed:53:39:fd:94:3a:8e: 5d:bb:00:aa:5d:28:b3:8e:31:46:aa:fc:20:b2:d6:f8: a4:a5:5a:55:b9:72:4b:65:ac:99:b1:5a:c5:d8:fe:c5: 94:d4:79:c8:a8:38:7e:79:e0:12:de:ec:4e:2c:f9:42: 88:dd:41:a8:7a:60:cd:64:a6:75:43:ac:89:fe:c7:5b: 71:34:3f:c6:fe:19:c4:76:fb:a3:01:91:e0:b1:1a:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:35:28:52:81:a9:e8:5b:95:37:dd:7d:f7:54:c9:8b: 74:b3:c0:99:c6:a9:14:ec:74:3b:de:6b:1b:62:1f:5a: a9:af:de:e6:8d:55:c0:de:54:e5:39:7e:5d:84:79:b0: fa:fe:af:f1:46:e7:d0:36:8c:02:af:85:a7:bd:a0:51: 10:8e:d1:ae:dc:ec:ba:60:d1:3e:40:85:70:66:f6:29: 21:33:16:16:f1:67:e0:59:4b:b2:c4:92:6c:49:f7:7e: 34:bf:b2:37:45:bf:69:37:8f:46:0f:e5:ed:ce:a2:02: a2:dc:0f:1c:28:ea:74:3a:24:ec:ec:6b:29:e9:6a:65: 43:26:9b:d2:5d:da:b0:b5:57:06:f9:78:fd:ae:b5:fe: fd:55:a7:9d:37:b7:8c:53:50:4d:10:91:d2:df:99:4c: 8f:16:bf:6b:d9:2c:e2:d3:7a:bc:96:f0:85:ac:f9:a6: 0a:65:12:68:3c:b0:bd:44:62:a0:85:68:12:df:27:7e: 57:b9:e2:0c:ca:d7:9c:17:a2:6d:bc:d5:d9:31:4c:ef: c0:0c:bf:45:7b:c7:40:2f:67:8a:7a:a1:d7:95:ca:89: 11:ae:46:20:ae:11:82:33:51:6b:7b:cf:b5:5a:04:8e: 50:d9:5b:09:c1:0c:b1:fd:5d:12:ee:41:d8:6e:4c:b5 Fingerprint (SHA-256): D7:15:26:85:71:A5:65:2D:62:6E:3F:54:77:53:FE:94:7D:01:7F:62:BC:85:61:16:39:2D:90:FD:00:BF:B1:32 Fingerprint (SHA1): 8F:84:EC:D3:CB:05:7E:A1:6C:AE:29:C5:78:EF:91:19:26:81:6C:B6 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #5022: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5023: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5024: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5025: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5026: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5027: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5028: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #5029: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #5030: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #5031: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #5032: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #5033: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #5034: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #5035: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #5036: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #5037: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #5038: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #5039: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5040: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043428 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5041: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5042: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5043: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5044: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108043429 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5045: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5046: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5047: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5048: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108043430 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5049: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5050: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5051: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5052: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 108043431 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5053: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5054: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5055: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5056: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108043432 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5057: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5058: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5059: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5060: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 108043433 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5061: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5062: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #5063: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5064: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 108043434 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5065: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5066: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #5067: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5068: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 108043435 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5069: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5070: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #5071: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5072: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 108043436 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5073: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5074: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5075: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043428 (0x6709ca4) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:00:55 2016 Not After : Fri Jan 08 10:00:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 15:36:4a:09:28:87:58:85:59:ac:e9:b3:ee:92:be:04: 7f:ce:59:a1:46:7a:79:be:f1:2a:b6:5c:4b:45:4a:be: 5d:b4:52:16:50:14:03:00:14:39:a9:13:2b:04:6d:50: cb:a1:65:fd:3a:4f:2b:d8:12:27:85:59:10:b1:58:25: ee:1c:cd:1d:84:31:72:49:a6:bc:6c:43:29:a3:6f:0b: 08:bd:3a:9b:e2:b3:17:cd:93:3b:34:48:1b:a7:c3:39: f3:75:22:63:88:5c:e2:1f:8b:d6:4b:a2:d5:75:cf:97: 52:9f:61:ab:76:2c:d8:73:de:d1:76:4c:37:14:59:6d: 03:d3:4f:67:84:64:1a:c8:60:35:6a:bd:79:e8:55:65: 42:df:b0:32:d2:bc:38:0e:84:3f:84:55:0e:ba:60:21: 7f:c4:ff:1a:62:a4:d1:dc:18:9d:a5:d5:3e:59:dc:7a: b6:b7:34:2c:3e:d7:3c:f8:4b:fd:a0:d7:5d:59:9b:4c: 70:d8:c1:8e:bd:6b:b2:4e:86:11:24:86:1e:d6:f5:7b: 65:30:1e:f1:2e:10:ba:05:35:99:9f:ce:85:11:74:7b: 66:a6:bc:b8:1a:e0:92:18:19:b9:bc:e5:ac:f9:3f:88: 10:49:06:14:79:9f:16:55:74:9d:1a:c2:0f:1c:f5:2c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:8d:e6:5c:66:73:6d:90:cd:ef:48:33: 5a:a4:4b:b4:67:c9:d0:97:85:d7:a4:02:4e:39:e4:84: 5d:02:1c:23:aa:18:0b:dc:7b:c6:14:2a:50:ab:63:88: 7c:16:06:31:c1:7d:f7:54:eb:a8:26:35:e8:42:bb Fingerprint (SHA-256): 9A:F3:A1:34:D8:44:E6:36:F8:BD:9F:46:D0:07:39:E7:9B:B2:51:5B:F6:62:1F:5F:53:D3:1A:CE:94:33:FD:B3 Fingerprint (SHA1): C7:9B:54:94:8D:D3:15:FB:C9:59:8C:26:B7:77:16:AF:C5:7E:93:4F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5076: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043428 (0x6709ca4) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:00:55 2016 Not After : Fri Jan 08 10:00:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 15:36:4a:09:28:87:58:85:59:ac:e9:b3:ee:92:be:04: 7f:ce:59:a1:46:7a:79:be:f1:2a:b6:5c:4b:45:4a:be: 5d:b4:52:16:50:14:03:00:14:39:a9:13:2b:04:6d:50: cb:a1:65:fd:3a:4f:2b:d8:12:27:85:59:10:b1:58:25: ee:1c:cd:1d:84:31:72:49:a6:bc:6c:43:29:a3:6f:0b: 08:bd:3a:9b:e2:b3:17:cd:93:3b:34:48:1b:a7:c3:39: f3:75:22:63:88:5c:e2:1f:8b:d6:4b:a2:d5:75:cf:97: 52:9f:61:ab:76:2c:d8:73:de:d1:76:4c:37:14:59:6d: 03:d3:4f:67:84:64:1a:c8:60:35:6a:bd:79:e8:55:65: 42:df:b0:32:d2:bc:38:0e:84:3f:84:55:0e:ba:60:21: 7f:c4:ff:1a:62:a4:d1:dc:18:9d:a5:d5:3e:59:dc:7a: b6:b7:34:2c:3e:d7:3c:f8:4b:fd:a0:d7:5d:59:9b:4c: 70:d8:c1:8e:bd:6b:b2:4e:86:11:24:86:1e:d6:f5:7b: 65:30:1e:f1:2e:10:ba:05:35:99:9f:ce:85:11:74:7b: 66:a6:bc:b8:1a:e0:92:18:19:b9:bc:e5:ac:f9:3f:88: 10:49:06:14:79:9f:16:55:74:9d:1a:c2:0f:1c:f5:2c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:8d:e6:5c:66:73:6d:90:cd:ef:48:33: 5a:a4:4b:b4:67:c9:d0:97:85:d7:a4:02:4e:39:e4:84: 5d:02:1c:23:aa:18:0b:dc:7b:c6:14:2a:50:ab:63:88: 7c:16:06:31:c1:7d:f7:54:eb:a8:26:35:e8:42:bb Fingerprint (SHA-256): 9A:F3:A1:34:D8:44:E6:36:F8:BD:9F:46:D0:07:39:E7:9B:B2:51:5B:F6:62:1F:5F:53:D3:1A:CE:94:33:FD:B3 Fingerprint (SHA1): C7:9B:54:94:8D:D3:15:FB:C9:59:8C:26:B7:77:16:AF:C5:7E:93:4F Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5077: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043428 (0x6709ca4) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:00:55 2016 Not After : Fri Jan 08 10:00:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 15:36:4a:09:28:87:58:85:59:ac:e9:b3:ee:92:be:04: 7f:ce:59:a1:46:7a:79:be:f1:2a:b6:5c:4b:45:4a:be: 5d:b4:52:16:50:14:03:00:14:39:a9:13:2b:04:6d:50: cb:a1:65:fd:3a:4f:2b:d8:12:27:85:59:10:b1:58:25: ee:1c:cd:1d:84:31:72:49:a6:bc:6c:43:29:a3:6f:0b: 08:bd:3a:9b:e2:b3:17:cd:93:3b:34:48:1b:a7:c3:39: f3:75:22:63:88:5c:e2:1f:8b:d6:4b:a2:d5:75:cf:97: 52:9f:61:ab:76:2c:d8:73:de:d1:76:4c:37:14:59:6d: 03:d3:4f:67:84:64:1a:c8:60:35:6a:bd:79:e8:55:65: 42:df:b0:32:d2:bc:38:0e:84:3f:84:55:0e:ba:60:21: 7f:c4:ff:1a:62:a4:d1:dc:18:9d:a5:d5:3e:59:dc:7a: b6:b7:34:2c:3e:d7:3c:f8:4b:fd:a0:d7:5d:59:9b:4c: 70:d8:c1:8e:bd:6b:b2:4e:86:11:24:86:1e:d6:f5:7b: 65:30:1e:f1:2e:10:ba:05:35:99:9f:ce:85:11:74:7b: 66:a6:bc:b8:1a:e0:92:18:19:b9:bc:e5:ac:f9:3f:88: 10:49:06:14:79:9f:16:55:74:9d:1a:c2:0f:1c:f5:2c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:8d:e6:5c:66:73:6d:90:cd:ef:48:33: 5a:a4:4b:b4:67:c9:d0:97:85:d7:a4:02:4e:39:e4:84: 5d:02:1c:23:aa:18:0b:dc:7b:c6:14:2a:50:ab:63:88: 7c:16:06:31:c1:7d:f7:54:eb:a8:26:35:e8:42:bb Fingerprint (SHA-256): 9A:F3:A1:34:D8:44:E6:36:F8:BD:9F:46:D0:07:39:E7:9B:B2:51:5B:F6:62:1F:5F:53:D3:1A:CE:94:33:FD:B3 Fingerprint (SHA1): C7:9B:54:94:8D:D3:15:FB:C9:59:8C:26:B7:77:16:AF:C5:7E:93:4F Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #5078: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043428 (0x6709ca4) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:00:55 2016 Not After : Fri Jan 08 10:00:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 15:36:4a:09:28:87:58:85:59:ac:e9:b3:ee:92:be:04: 7f:ce:59:a1:46:7a:79:be:f1:2a:b6:5c:4b:45:4a:be: 5d:b4:52:16:50:14:03:00:14:39:a9:13:2b:04:6d:50: cb:a1:65:fd:3a:4f:2b:d8:12:27:85:59:10:b1:58:25: ee:1c:cd:1d:84:31:72:49:a6:bc:6c:43:29:a3:6f:0b: 08:bd:3a:9b:e2:b3:17:cd:93:3b:34:48:1b:a7:c3:39: f3:75:22:63:88:5c:e2:1f:8b:d6:4b:a2:d5:75:cf:97: 52:9f:61:ab:76:2c:d8:73:de:d1:76:4c:37:14:59:6d: 03:d3:4f:67:84:64:1a:c8:60:35:6a:bd:79:e8:55:65: 42:df:b0:32:d2:bc:38:0e:84:3f:84:55:0e:ba:60:21: 7f:c4:ff:1a:62:a4:d1:dc:18:9d:a5:d5:3e:59:dc:7a: b6:b7:34:2c:3e:d7:3c:f8:4b:fd:a0:d7:5d:59:9b:4c: 70:d8:c1:8e:bd:6b:b2:4e:86:11:24:86:1e:d6:f5:7b: 65:30:1e:f1:2e:10:ba:05:35:99:9f:ce:85:11:74:7b: 66:a6:bc:b8:1a:e0:92:18:19:b9:bc:e5:ac:f9:3f:88: 10:49:06:14:79:9f:16:55:74:9d:1a:c2:0f:1c:f5:2c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:8d:e6:5c:66:73:6d:90:cd:ef:48:33: 5a:a4:4b:b4:67:c9:d0:97:85:d7:a4:02:4e:39:e4:84: 5d:02:1c:23:aa:18:0b:dc:7b:c6:14:2a:50:ab:63:88: 7c:16:06:31:c1:7d:f7:54:eb:a8:26:35:e8:42:bb Fingerprint (SHA-256): 9A:F3:A1:34:D8:44:E6:36:F8:BD:9F:46:D0:07:39:E7:9B:B2:51:5B:F6:62:1F:5F:53:D3:1A:CE:94:33:FD:B3 Fingerprint (SHA1): C7:9B:54:94:8D:D3:15:FB:C9:59:8C:26:B7:77:16:AF:C5:7E:93:4F Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #5079: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5080: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5081: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5082: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5083: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5084: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5085: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5086: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5087: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5088: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5089: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5090: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5091: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5092: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5093: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5094: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #5095: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5096: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5097: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5098: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5099: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5100: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5101: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5102: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5103: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5104: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5105: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5106: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108100327Z nextupdate=20170108100327Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 10:03:27 2016 Next Update: Sun Jan 08 10:03:27 2017 CRL Extensions: chains.sh: #5107: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108100328Z nextupdate=20170108100328Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 10:03:28 2016 Next Update: Sun Jan 08 10:03:28 2017 CRL Extensions: chains.sh: #5108: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108100329Z nextupdate=20170108100329Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 10:03:29 2016 Next Update: Sun Jan 08 10:03:29 2017 CRL Extensions: chains.sh: #5109: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108100329Z nextupdate=20170108100329Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 10:03:29 2016 Next Update: Sun Jan 08 10:03:29 2017 CRL Extensions: chains.sh: #5110: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108100330Z addcert 14 20160108100330Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 10:03:30 2016 Next Update: Sun Jan 08 10:03:29 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Jan 08 10:03:30 2016 CRL Extensions: chains.sh: #5111: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108100331Z addcert 15 20160108100331Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 10:03:31 2016 Next Update: Sun Jan 08 10:03:28 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Jan 08 10:03:31 2016 CRL Extensions: chains.sh: #5112: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5113: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5114: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5115: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #5116: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #5117: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #5118: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #5119: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #5120: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #5121: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:01:59 2016 Not After : Fri Jan 08 10:01:59 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:56:4a:61:2a:66:9c:ce:04:e8:b4:e4:b2:86:b3:0e: ee:7a:94:7a:27:56:fe:f8:53:cf:47:cb:53:14:88:cc: b4:5d:35:aa:c9:bf:43:7a:88:fc:23:60:0c:bf:3b:c8: 57:d9:e2:48:9a:82:39:65:ad:b4:63:26:6c:5c:ce:d2: a8:96:0b:9f:0b:f9:20:6e:f6:7a:3a:88:a6:68:55:af: 2c:06:eb:bd:ee:5d:3e:93:6f:13:0e:5e:6c:1f:48:08: cf:c9:33:00:ed:37:88:09:85:ef:23:6c:c9:c4:c1:4b: e1:3a:01:9e:39:ab:c9:56:07:94:0f:e2:09:54:e3:ba: dc:c1:a6:fc:34:04:9e:c8:1e:45:0c:12:10:25:06:9c: 24:c8:8a:f0:51:47:52:6a:56:1c:a6:38:86:25:6a:0f: ca:a3:82:c1:51:9c:91:74:46:52:2f:0e:4f:bf:45:e1: 6a:98:17:e8:5c:f9:49:f5:e4:c8:db:e6:a7:5d:cc:ba: 33:0e:f5:f7:41:73:f6:a7:11:e7:b1:26:10:ad:4b:ad: 48:7c:2b:97:34:68:9a:54:01:fd:05:d7:50:dc:29:3a: 54:9b:05:97:14:34:60:fd:76:ae:38:d7:03:67:1d:8c: d9:34:31:07:ce:e5:bf:b5:4d:53:39:59:c8:e9:a1:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:0a:c7:ef:f3:68:5d:ae:d0:c7:ac:88:48:d0:e6:e9: 5a:a0:99:3a:9d:70:4d:5c:3d:91:60:42:d6:20:9d:54: e7:9b:36:7e:3e:df:45:4e:21:93:e0:bc:c6:d1:0e:61: f6:c8:6e:2d:5e:6c:b7:f5:8b:bc:07:84:29:69:b1:31: 75:86:f4:99:21:ed:27:cf:92:15:f1:ae:12:2c:03:08: 88:5c:e8:9e:9d:c4:43:18:c1:e2:d9:c2:75:2c:69:26: 80:a2:6d:eb:e6:ef:92:39:b0:13:40:df:52:7e:68:5b: 74:6d:3c:b1:6f:ee:1c:64:22:57:71:e7:8b:6f:4c:81: 32:f3:24:76:96:1a:cc:80:e2:bd:cf:a4:01:3e:25:42: 99:ad:be:87:20:cb:53:3e:2c:d4:f3:cb:41:a5:cd:11: d7:10:04:14:e1:f1:30:d1:f6:ae:31:b9:c1:46:17:9f: d7:e3:c9:75:12:ec:65:4e:c4:52:cc:5c:20:97:49:51: 2b:92:68:49:ac:ed:ac:55:1b:8d:11:8b:83:5a:84:17: c9:1e:73:05:d1:6b:cd:cf:8b:2e:45:61:c2:9a:ff:dd: be:ad:be:1c:c0:4b:d2:f9:36:df:24:a7:22:04:0e:86: f5:28:f6:f9:b8:08:74:cf:7d:7c:44:31:85:ed:aa:0e Fingerprint (SHA-256): 5B:12:FC:C3:A2:2A:A2:86:B0:19:29:83:D9:B7:EF:36:F1:77:C5:8B:BE:5C:CB:8A:29:28:CA:87:8D:D1:B1:E8 Fingerprint (SHA1): 15:5C:A3:B3:27:BF:8C:17:3B:81:E6:5D:AB:82:0D:B7:08:E2:90:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5122: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5123: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:01:59 2016 Not After : Fri Jan 08 10:01:59 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:56:4a:61:2a:66:9c:ce:04:e8:b4:e4:b2:86:b3:0e: ee:7a:94:7a:27:56:fe:f8:53:cf:47:cb:53:14:88:cc: b4:5d:35:aa:c9:bf:43:7a:88:fc:23:60:0c:bf:3b:c8: 57:d9:e2:48:9a:82:39:65:ad:b4:63:26:6c:5c:ce:d2: a8:96:0b:9f:0b:f9:20:6e:f6:7a:3a:88:a6:68:55:af: 2c:06:eb:bd:ee:5d:3e:93:6f:13:0e:5e:6c:1f:48:08: cf:c9:33:00:ed:37:88:09:85:ef:23:6c:c9:c4:c1:4b: e1:3a:01:9e:39:ab:c9:56:07:94:0f:e2:09:54:e3:ba: dc:c1:a6:fc:34:04:9e:c8:1e:45:0c:12:10:25:06:9c: 24:c8:8a:f0:51:47:52:6a:56:1c:a6:38:86:25:6a:0f: ca:a3:82:c1:51:9c:91:74:46:52:2f:0e:4f:bf:45:e1: 6a:98:17:e8:5c:f9:49:f5:e4:c8:db:e6:a7:5d:cc:ba: 33:0e:f5:f7:41:73:f6:a7:11:e7:b1:26:10:ad:4b:ad: 48:7c:2b:97:34:68:9a:54:01:fd:05:d7:50:dc:29:3a: 54:9b:05:97:14:34:60:fd:76:ae:38:d7:03:67:1d:8c: d9:34:31:07:ce:e5:bf:b5:4d:53:39:59:c8:e9:a1:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:0a:c7:ef:f3:68:5d:ae:d0:c7:ac:88:48:d0:e6:e9: 5a:a0:99:3a:9d:70:4d:5c:3d:91:60:42:d6:20:9d:54: e7:9b:36:7e:3e:df:45:4e:21:93:e0:bc:c6:d1:0e:61: f6:c8:6e:2d:5e:6c:b7:f5:8b:bc:07:84:29:69:b1:31: 75:86:f4:99:21:ed:27:cf:92:15:f1:ae:12:2c:03:08: 88:5c:e8:9e:9d:c4:43:18:c1:e2:d9:c2:75:2c:69:26: 80:a2:6d:eb:e6:ef:92:39:b0:13:40:df:52:7e:68:5b: 74:6d:3c:b1:6f:ee:1c:64:22:57:71:e7:8b:6f:4c:81: 32:f3:24:76:96:1a:cc:80:e2:bd:cf:a4:01:3e:25:42: 99:ad:be:87:20:cb:53:3e:2c:d4:f3:cb:41:a5:cd:11: d7:10:04:14:e1:f1:30:d1:f6:ae:31:b9:c1:46:17:9f: d7:e3:c9:75:12:ec:65:4e:c4:52:cc:5c:20:97:49:51: 2b:92:68:49:ac:ed:ac:55:1b:8d:11:8b:83:5a:84:17: c9:1e:73:05:d1:6b:cd:cf:8b:2e:45:61:c2:9a:ff:dd: be:ad:be:1c:c0:4b:d2:f9:36:df:24:a7:22:04:0e:86: f5:28:f6:f9:b8:08:74:cf:7d:7c:44:31:85:ed:aa:0e Fingerprint (SHA-256): 5B:12:FC:C3:A2:2A:A2:86:B0:19:29:83:D9:B7:EF:36:F1:77:C5:8B:BE:5C:CB:8A:29:28:CA:87:8D:D1:B1:E8 Fingerprint (SHA1): 15:5C:A3:B3:27:BF:8C:17:3B:81:E6:5D:AB:82:0D:B7:08:E2:90:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5124: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5125: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5126: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043437 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5127: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5128: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5129: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5130: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 108043438 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5131: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5132: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5133: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108043328.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5134: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108043313.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5135: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5136: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5137: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108043328.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5138: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 108043439 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5139: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5140: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5141: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108043328.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5142: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108043314.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5143: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5144: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5145: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5146: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 108043440 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5147: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5148: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5149: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108043328.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5150: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108043315.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5151: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5152: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5153: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108043328.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5154: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108043316.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5155: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5156: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108100510Z nextupdate=20170108100510Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 10:05:10 2016 Next Update: Sun Jan 08 10:05:10 2017 CRL Extensions: chains.sh: #5157: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108100510Z nextupdate=20170108100510Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 10:05:10 2016 Next Update: Sun Jan 08 10:05:10 2017 CRL Extensions: chains.sh: #5158: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108100511Z nextupdate=20170108100511Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 10:05:11 2016 Next Update: Sun Jan 08 10:05:11 2017 CRL Extensions: chains.sh: #5159: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108100512Z nextupdate=20170108100512Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 10:05:12 2016 Next Update: Sun Jan 08 10:05:12 2017 CRL Extensions: chains.sh: #5160: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108100513Z addcert 20 20160108100513Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 10:05:13 2016 Next Update: Sun Jan 08 10:05:10 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 10:05:13 2016 CRL Extensions: chains.sh: #5161: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108100514Z addcert 40 20160108100514Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 10:05:14 2016 Next Update: Sun Jan 08 10:05:10 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 10:05:13 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 10:05:14 2016 CRL Extensions: chains.sh: #5162: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5163: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5164: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5165: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043437 (0x6709cad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:03:42 2016 Not After : Fri Jan 08 10:03:42 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:7e:de:0c:3a:37:fa:7a:44:b4:eb:95:86:cd:c2:9a: 08:a9:39:d5:48:bb:99:af:52:e5:35:59:73:fa:9a:07: 8e:b4:82:87:72:00:95:60:9c:34:bd:21:aa:13:63:45: 7d:b2:94:ad:3d:14:e0:7d:63:91:d8:97:17:b7:8d:31: f8:6e:69:c5:f9:4f:65:2e:87:82:9d:9f:ca:ec:af:ba: a7:fc:e0:b3:14:fa:ff:b0:8c:c1:a0:a9:68:8e:50:cc: 58:73:c5:b1:0c:ed:40:96:8f:0a:a2:db:2d:13:0c:99: c1:c0:b6:d4:97:24:a8:28:2f:f8:7c:69:e4:df:45:b5: c8:83:ea:20:23:3b:1d:4b:6c:48:6c:b6:6c:dc:0b:d2: 50:c9:6c:1f:de:48:2e:7f:f5:d8:a0:e0:67:20:43:e2: df:ff:55:d7:23:b8:74:d2:47:77:11:73:3f:3a:7a:79: 92:b6:92:ec:53:52:d2:8f:1d:be:8f:55:56:37:c9:62: 93:d6:e0:87:22:e8:8a:27:27:ec:3a:9a:30:b0:7a:1a: 33:14:f3:e8:57:b1:63:b9:39:e4:4d:93:bb:49:f4:63: 2f:be:3a:9d:d2:62:fa:3a:dc:0e:8c:ee:58:a1:10:b5: f2:44:a1:27:4f:d4:91:d2:b6:39:f3:e0:97:3f:28:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:d3:3f:5f:43:34:ea:cf:cf:1c:fa:57:20:76:78:ac: 46:88:15:01:d8:ef:ba:f6:4f:ad:d0:59:fb:86:78:49: ba:34:6b:99:2e:c7:1d:29:af:0e:d7:6e:79:da:88:40: c9:43:7a:d5:ee:dd:a0:f1:95:29:7f:16:88:b9:d9:64: 64:78:9a:95:5e:fc:4f:4d:e0:c0:c2:a5:ac:d7:0b:50: db:b2:bd:48:90:1d:6f:c0:29:4e:73:f0:6d:78:0b:76: 8d:7b:4b:79:b4:a0:65:73:17:aa:c2:e1:8c:c2:77:a9: fc:47:3e:04:49:41:f8:00:13:c5:8c:5e:66:8b:4c:09: e2:04:d8:2b:8b:74:fa:5c:2f:8e:ce:c0:ed:66:35:86: eb:f2:e5:78:37:9a:88:43:83:39:90:96:2f:d6:a5:f4: 27:c3:a1:39:92:cd:7c:be:27:05:43:30:32:33:45:c1: 9b:46:36:df:d2:9e:71:9c:ad:06:e8:8f:de:a2:8c:64: 7e:69:a6:03:0d:b3:f9:47:1f:10:d7:7f:01:a2:ca:c5: e4:f2:79:92:8b:9f:15:4c:be:e2:75:4f:61:ba:ab:27: b4:5e:7a:e9:64:41:6b:43:6d:42:b3:dd:17:34:8d:30: 4c:76:6d:63:57:ca:a0:7d:98:fb:e4:16:2b:04:3d:0e Fingerprint (SHA-256): B1:D9:1F:DF:24:B8:8F:50:DD:DA:19:1A:C7:31:E1:5D:C3:19:29:86:19:E9:A9:D1:24:B2:9D:54:7D:40:04:DE Fingerprint (SHA1): AF:AC:1B:85:1B:08:F6:18:BD:57:8C:28:63:7F:C9:CB:F7:65:F1:58 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5166: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5167: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043437 (0x6709cad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:03:42 2016 Not After : Fri Jan 08 10:03:42 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:7e:de:0c:3a:37:fa:7a:44:b4:eb:95:86:cd:c2:9a: 08:a9:39:d5:48:bb:99:af:52:e5:35:59:73:fa:9a:07: 8e:b4:82:87:72:00:95:60:9c:34:bd:21:aa:13:63:45: 7d:b2:94:ad:3d:14:e0:7d:63:91:d8:97:17:b7:8d:31: f8:6e:69:c5:f9:4f:65:2e:87:82:9d:9f:ca:ec:af:ba: a7:fc:e0:b3:14:fa:ff:b0:8c:c1:a0:a9:68:8e:50:cc: 58:73:c5:b1:0c:ed:40:96:8f:0a:a2:db:2d:13:0c:99: c1:c0:b6:d4:97:24:a8:28:2f:f8:7c:69:e4:df:45:b5: c8:83:ea:20:23:3b:1d:4b:6c:48:6c:b6:6c:dc:0b:d2: 50:c9:6c:1f:de:48:2e:7f:f5:d8:a0:e0:67:20:43:e2: df:ff:55:d7:23:b8:74:d2:47:77:11:73:3f:3a:7a:79: 92:b6:92:ec:53:52:d2:8f:1d:be:8f:55:56:37:c9:62: 93:d6:e0:87:22:e8:8a:27:27:ec:3a:9a:30:b0:7a:1a: 33:14:f3:e8:57:b1:63:b9:39:e4:4d:93:bb:49:f4:63: 2f:be:3a:9d:d2:62:fa:3a:dc:0e:8c:ee:58:a1:10:b5: f2:44:a1:27:4f:d4:91:d2:b6:39:f3:e0:97:3f:28:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:d3:3f:5f:43:34:ea:cf:cf:1c:fa:57:20:76:78:ac: 46:88:15:01:d8:ef:ba:f6:4f:ad:d0:59:fb:86:78:49: ba:34:6b:99:2e:c7:1d:29:af:0e:d7:6e:79:da:88:40: c9:43:7a:d5:ee:dd:a0:f1:95:29:7f:16:88:b9:d9:64: 64:78:9a:95:5e:fc:4f:4d:e0:c0:c2:a5:ac:d7:0b:50: db:b2:bd:48:90:1d:6f:c0:29:4e:73:f0:6d:78:0b:76: 8d:7b:4b:79:b4:a0:65:73:17:aa:c2:e1:8c:c2:77:a9: fc:47:3e:04:49:41:f8:00:13:c5:8c:5e:66:8b:4c:09: e2:04:d8:2b:8b:74:fa:5c:2f:8e:ce:c0:ed:66:35:86: eb:f2:e5:78:37:9a:88:43:83:39:90:96:2f:d6:a5:f4: 27:c3:a1:39:92:cd:7c:be:27:05:43:30:32:33:45:c1: 9b:46:36:df:d2:9e:71:9c:ad:06:e8:8f:de:a2:8c:64: 7e:69:a6:03:0d:b3:f9:47:1f:10:d7:7f:01:a2:ca:c5: e4:f2:79:92:8b:9f:15:4c:be:e2:75:4f:61:ba:ab:27: b4:5e:7a:e9:64:41:6b:43:6d:42:b3:dd:17:34:8d:30: 4c:76:6d:63:57:ca:a0:7d:98:fb:e4:16:2b:04:3d:0e Fingerprint (SHA-256): B1:D9:1F:DF:24:B8:8F:50:DD:DA:19:1A:C7:31:E1:5D:C3:19:29:86:19:E9:A9:D1:24:B2:9D:54:7D:40:04:DE Fingerprint (SHA1): AF:AC:1B:85:1B:08:F6:18:BD:57:8C:28:63:7F:C9:CB:F7:65:F1:58 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5168: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5169: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5170: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043441 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5171: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5172: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5173: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5174: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108043442 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5175: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5176: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5177: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5178: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108043443 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5179: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5180: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5181: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5182: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 108043444 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5183: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5184: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #5185: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043445 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5186: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #5187: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #5188: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5189: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 108043446 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5190: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5191: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5192: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5193: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 108043447 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5194: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5195: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #5196: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #5197: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #5198: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043441 (0x6709cb1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:05:22 2016 Not After : Fri Jan 08 10:05:22 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:b6:c5:34:6e:a6:f8:4a:d6:6b:de:f2:29:29:44:bb: d4:c4:68:92:26:39:46:78:24:86:57:9b:1e:1d:d5:30: 99:2a:6e:e7:78:26:99:1d:e4:87:5d:21:98:fa:2c:fa: c2:87:f6:5b:db:5d:28:20:17:e2:ed:a7:bf:ec:91:52: 8b:3c:a1:5b:7c:48:53:31:ff:77:d8:c2:19:b0:44:8e: bb:3e:87:bb:6f:c2:02:df:59:7e:3e:89:d5:c2:40:4a: 78:7a:db:94:f8:8f:8a:9c:88:6b:37:2f:86:44:69:13: 4d:80:94:e9:1c:d6:63:b8:8f:de:a1:af:37:a2:ae:32: 48:93:39:a6:9a:54:a6:25:b7:f7:de:e5:56:a5:0f:32: 9e:9d:a9:cb:f2:2d:f2:ca:35:46:f7:a9:db:3b:63:18: ce:1e:33:d0:b2:74:44:fa:ad:32:20:86:dc:87:f9:ae: fd:06:4d:09:79:53:66:b8:e8:10:86:63:99:63:ad:8e: 7e:bb:44:32:e3:3d:12:93:f8:9a:a4:19:63:f1:50:c9: 68:8d:d4:9a:fe:1f:f1:32:00:5d:ec:64:36:ad:4a:6e: 99:51:88:2b:5f:61:97:1d:2f:f0:4d:ed:69:10:5c:0e: 88:fa:58:89:68:db:17:9a:6b:fc:87:30:2b:8d:0c:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:2a:51:32:27:08:78:4a:bc:85:8c:08:86:fa:b2:8a: 08:5e:c1:30:af:b3:80:7e:c8:5d:69:a7:fe:38:d2:fb: 10:27:22:5b:36:f5:91:79:c7:e6:2d:c7:13:0d:fb:a7: 0a:88:7c:b2:11:fb:e0:91:b9:8f:26:d2:7a:27:72:ab: 79:8d:42:16:06:9c:c2:e1:26:8c:4d:0e:04:18:14:1e: fc:5c:76:dc:4d:fd:e6:c9:f3:ff:ac:58:2a:2d:bb:b9: c2:ea:cd:b3:fd:bf:c1:1f:15:62:2e:fb:03:af:d4:9b: 14:d6:5b:f0:f6:be:80:09:ee:fd:c0:09:4b:e5:70:b3: a3:ab:48:6c:3e:78:3a:3e:e0:5f:28:ea:be:8a:59:58: 5e:f4:21:67:fb:d2:64:0a:bd:c1:99:19:60:4f:0a:ce: 3d:dc:5f:04:0e:e6:d7:cd:06:85:3b:14:dc:8c:69:ab: 1d:82:01:08:2b:31:8d:e8:37:13:7e:b8:09:08:26:5e: d1:d6:a4:4b:47:fd:38:22:39:c0:60:97:58:7c:d3:fc: 26:26:e8:70:b1:fd:d5:ad:58:33:e4:c0:70:9c:90:13: 83:1a:79:ad:af:22:8e:df:1c:c3:bb:d0:61:02:61:e4: 8a:93:03:32:df:ba:51:c5:d5:56:9f:18:f2:90:f4:be Fingerprint (SHA-256): A4:4D:A9:DC:17:E4:07:8E:92:40:0D:1D:90:2A:9A:4C:F5:35:89:A4:5C:2D:1E:E3:88:6D:E6:3E:8F:98:8D:C5 Fingerprint (SHA1): C4:AA:C9:B8:34:AF:FE:93:AA:58:C7:C6:5F:15:25:8C:A2:AD:6D:C3 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5199: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043443 (0x6709cb3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 10:05:50 2016 Not After : Fri Jan 08 10:05:50 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c1:08:ab:1a:51:57:4d:96:38:eb:a3:36:57:d9:7d: 08:53:19:d5:6a:29:02:b3:2e:ea:43:68:97:9c:bf:ea: 95:1c:cc:cd:9b:c5:82:3b:ba:c6:5a:7f:4d:70:93:b1: 06:b9:61:97:4e:cb:94:1c:cb:98:49:49:9d:99:49:19: bd:36:f7:9f:21:60:0a:27:41:d9:51:8f:90:e7:07:5e: aa:8f:7a:7c:35:f9:f2:53:36:9c:6f:42:65:9d:49:0b: 4d:a4:83:2d:32:cf:2a:f4:b6:fa:b6:b9:bc:95:7c:a7: d6:da:7d:48:96:92:60:69:44:27:17:b7:6d:18:dd:b3: 71:3e:4b:c3:4d:10:4f:cb:0f:3d:e5:8d:af:2d:12:53: 61:8b:61:b4:99:a2:d8:18:68:9a:51:29:d9:fa:88:7c: 95:9b:07:8a:52:de:f9:4d:1f:24:0f:43:b4:60:1d:eb: e9:a5:f4:25:d1:b9:60:40:e3:8a:fd:d4:c9:e1:a4:57: f5:36:6f:43:57:76:f4:71:b2:f2:24:16:3c:6b:a8:31: 1f:86:7e:cd:f4:d7:df:e1:d4:8e:82:90:a5:1d:6c:76: 5c:1d:aa:b8:e9:30:1a:c6:d7:6c:0b:63:c4:9e:52:c6: 8d:99:65:4d:31:32:bb:4e:9e:45:db:ce:71:22:9c:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:4e:89:5b:7a:da:d5:a8:72:01:14:03:03:ec:a9:29: ba:8b:59:80:f5:a1:16:99:5c:b5:8f:b9:72:4b:14:c9: ca:10:5a:e3:4a:f9:d6:22:6d:6f:a2:77:bc:d5:e6:88: 4b:bf:d4:44:05:32:26:7f:44:36:80:f7:dc:61:76:89: ba:dc:2e:27:9e:c8:1b:a9:fc:08:bd:dc:bc:b8:27:bf: 82:c7:27:e1:28:42:65:af:7c:51:9d:54:a0:0d:41:df: fc:b3:4e:75:98:47:de:08:71:ed:26:4d:d3:e0:95:36: 44:a5:01:68:6c:39:87:f8:ef:99:ac:50:88:8b:10:eb: 68:44:d5:2f:42:a5:49:be:bb:66:7d:55:5a:60:22:16: d7:6e:5d:3f:d1:f1:0b:fb:d4:df:ee:d8:44:d5:58:6e: 22:43:55:c6:3a:6b:10:c1:cc:65:21:09:87:2d:ce:69: 42:fc:1a:41:85:64:47:cf:85:dc:8e:cc:cf:c8:6c:2d: 88:e2:cd:54:e2:59:68:44:26:7a:a1:d3:c9:95:ae:91: ad:25:76:6c:b9:1b:24:57:1a:a7:2c:0b:21:79:79:30: 62:75:bd:48:6b:d9:ca:83:11:2e:94:c2:d9:cb:79:ab: df:fc:78:5a:57:1b:d6:20:e1:19:8d:cc:15:ec:92:d4 Fingerprint (SHA-256): C5:91:D1:B4:91:8B:75:A2:C7:05:8A:40:F3:FB:80:60:99:3E:A0:FA:AE:3F:F8:FB:1D:91:35:E4:54:6B:94:FD Fingerprint (SHA1): 1C:9E:F8:0A:0C:16:8D:C7:D2:2E:57:76:F6:C0:41:5E:F6:61:42:95 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #5200: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043441 (0x6709cb1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:05:22 2016 Not After : Fri Jan 08 10:05:22 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:b6:c5:34:6e:a6:f8:4a:d6:6b:de:f2:29:29:44:bb: d4:c4:68:92:26:39:46:78:24:86:57:9b:1e:1d:d5:30: 99:2a:6e:e7:78:26:99:1d:e4:87:5d:21:98:fa:2c:fa: c2:87:f6:5b:db:5d:28:20:17:e2:ed:a7:bf:ec:91:52: 8b:3c:a1:5b:7c:48:53:31:ff:77:d8:c2:19:b0:44:8e: bb:3e:87:bb:6f:c2:02:df:59:7e:3e:89:d5:c2:40:4a: 78:7a:db:94:f8:8f:8a:9c:88:6b:37:2f:86:44:69:13: 4d:80:94:e9:1c:d6:63:b8:8f:de:a1:af:37:a2:ae:32: 48:93:39:a6:9a:54:a6:25:b7:f7:de:e5:56:a5:0f:32: 9e:9d:a9:cb:f2:2d:f2:ca:35:46:f7:a9:db:3b:63:18: ce:1e:33:d0:b2:74:44:fa:ad:32:20:86:dc:87:f9:ae: fd:06:4d:09:79:53:66:b8:e8:10:86:63:99:63:ad:8e: 7e:bb:44:32:e3:3d:12:93:f8:9a:a4:19:63:f1:50:c9: 68:8d:d4:9a:fe:1f:f1:32:00:5d:ec:64:36:ad:4a:6e: 99:51:88:2b:5f:61:97:1d:2f:f0:4d:ed:69:10:5c:0e: 88:fa:58:89:68:db:17:9a:6b:fc:87:30:2b:8d:0c:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:2a:51:32:27:08:78:4a:bc:85:8c:08:86:fa:b2:8a: 08:5e:c1:30:af:b3:80:7e:c8:5d:69:a7:fe:38:d2:fb: 10:27:22:5b:36:f5:91:79:c7:e6:2d:c7:13:0d:fb:a7: 0a:88:7c:b2:11:fb:e0:91:b9:8f:26:d2:7a:27:72:ab: 79:8d:42:16:06:9c:c2:e1:26:8c:4d:0e:04:18:14:1e: fc:5c:76:dc:4d:fd:e6:c9:f3:ff:ac:58:2a:2d:bb:b9: c2:ea:cd:b3:fd:bf:c1:1f:15:62:2e:fb:03:af:d4:9b: 14:d6:5b:f0:f6:be:80:09:ee:fd:c0:09:4b:e5:70:b3: a3:ab:48:6c:3e:78:3a:3e:e0:5f:28:ea:be:8a:59:58: 5e:f4:21:67:fb:d2:64:0a:bd:c1:99:19:60:4f:0a:ce: 3d:dc:5f:04:0e:e6:d7:cd:06:85:3b:14:dc:8c:69:ab: 1d:82:01:08:2b:31:8d:e8:37:13:7e:b8:09:08:26:5e: d1:d6:a4:4b:47:fd:38:22:39:c0:60:97:58:7c:d3:fc: 26:26:e8:70:b1:fd:d5:ad:58:33:e4:c0:70:9c:90:13: 83:1a:79:ad:af:22:8e:df:1c:c3:bb:d0:61:02:61:e4: 8a:93:03:32:df:ba:51:c5:d5:56:9f:18:f2:90:f4:be Fingerprint (SHA-256): A4:4D:A9:DC:17:E4:07:8E:92:40:0D:1D:90:2A:9A:4C:F5:35:89:A4:5C:2D:1E:E3:88:6D:E6:3E:8F:98:8D:C5 Fingerprint (SHA1): C4:AA:C9:B8:34:AF:FE:93:AA:58:C7:C6:5F:15:25:8C:A2:AD:6D:C3 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5201: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #5202: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043441 (0x6709cb1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:05:22 2016 Not After : Fri Jan 08 10:05:22 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:b6:c5:34:6e:a6:f8:4a:d6:6b:de:f2:29:29:44:bb: d4:c4:68:92:26:39:46:78:24:86:57:9b:1e:1d:d5:30: 99:2a:6e:e7:78:26:99:1d:e4:87:5d:21:98:fa:2c:fa: c2:87:f6:5b:db:5d:28:20:17:e2:ed:a7:bf:ec:91:52: 8b:3c:a1:5b:7c:48:53:31:ff:77:d8:c2:19:b0:44:8e: bb:3e:87:bb:6f:c2:02:df:59:7e:3e:89:d5:c2:40:4a: 78:7a:db:94:f8:8f:8a:9c:88:6b:37:2f:86:44:69:13: 4d:80:94:e9:1c:d6:63:b8:8f:de:a1:af:37:a2:ae:32: 48:93:39:a6:9a:54:a6:25:b7:f7:de:e5:56:a5:0f:32: 9e:9d:a9:cb:f2:2d:f2:ca:35:46:f7:a9:db:3b:63:18: ce:1e:33:d0:b2:74:44:fa:ad:32:20:86:dc:87:f9:ae: fd:06:4d:09:79:53:66:b8:e8:10:86:63:99:63:ad:8e: 7e:bb:44:32:e3:3d:12:93:f8:9a:a4:19:63:f1:50:c9: 68:8d:d4:9a:fe:1f:f1:32:00:5d:ec:64:36:ad:4a:6e: 99:51:88:2b:5f:61:97:1d:2f:f0:4d:ed:69:10:5c:0e: 88:fa:58:89:68:db:17:9a:6b:fc:87:30:2b:8d:0c:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:2a:51:32:27:08:78:4a:bc:85:8c:08:86:fa:b2:8a: 08:5e:c1:30:af:b3:80:7e:c8:5d:69:a7:fe:38:d2:fb: 10:27:22:5b:36:f5:91:79:c7:e6:2d:c7:13:0d:fb:a7: 0a:88:7c:b2:11:fb:e0:91:b9:8f:26:d2:7a:27:72:ab: 79:8d:42:16:06:9c:c2:e1:26:8c:4d:0e:04:18:14:1e: fc:5c:76:dc:4d:fd:e6:c9:f3:ff:ac:58:2a:2d:bb:b9: c2:ea:cd:b3:fd:bf:c1:1f:15:62:2e:fb:03:af:d4:9b: 14:d6:5b:f0:f6:be:80:09:ee:fd:c0:09:4b:e5:70:b3: a3:ab:48:6c:3e:78:3a:3e:e0:5f:28:ea:be:8a:59:58: 5e:f4:21:67:fb:d2:64:0a:bd:c1:99:19:60:4f:0a:ce: 3d:dc:5f:04:0e:e6:d7:cd:06:85:3b:14:dc:8c:69:ab: 1d:82:01:08:2b:31:8d:e8:37:13:7e:b8:09:08:26:5e: d1:d6:a4:4b:47:fd:38:22:39:c0:60:97:58:7c:d3:fc: 26:26:e8:70:b1:fd:d5:ad:58:33:e4:c0:70:9c:90:13: 83:1a:79:ad:af:22:8e:df:1c:c3:bb:d0:61:02:61:e4: 8a:93:03:32:df:ba:51:c5:d5:56:9f:18:f2:90:f4:be Fingerprint (SHA-256): A4:4D:A9:DC:17:E4:07:8E:92:40:0D:1D:90:2A:9A:4C:F5:35:89:A4:5C:2D:1E:E3:88:6D:E6:3E:8F:98:8D:C5 Fingerprint (SHA1): C4:AA:C9:B8:34:AF:FE:93:AA:58:C7:C6:5F:15:25:8C:A2:AD:6D:C3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5203: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043443 (0x6709cb3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 10:05:50 2016 Not After : Fri Jan 08 10:05:50 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c1:08:ab:1a:51:57:4d:96:38:eb:a3:36:57:d9:7d: 08:53:19:d5:6a:29:02:b3:2e:ea:43:68:97:9c:bf:ea: 95:1c:cc:cd:9b:c5:82:3b:ba:c6:5a:7f:4d:70:93:b1: 06:b9:61:97:4e:cb:94:1c:cb:98:49:49:9d:99:49:19: bd:36:f7:9f:21:60:0a:27:41:d9:51:8f:90:e7:07:5e: aa:8f:7a:7c:35:f9:f2:53:36:9c:6f:42:65:9d:49:0b: 4d:a4:83:2d:32:cf:2a:f4:b6:fa:b6:b9:bc:95:7c:a7: d6:da:7d:48:96:92:60:69:44:27:17:b7:6d:18:dd:b3: 71:3e:4b:c3:4d:10:4f:cb:0f:3d:e5:8d:af:2d:12:53: 61:8b:61:b4:99:a2:d8:18:68:9a:51:29:d9:fa:88:7c: 95:9b:07:8a:52:de:f9:4d:1f:24:0f:43:b4:60:1d:eb: e9:a5:f4:25:d1:b9:60:40:e3:8a:fd:d4:c9:e1:a4:57: f5:36:6f:43:57:76:f4:71:b2:f2:24:16:3c:6b:a8:31: 1f:86:7e:cd:f4:d7:df:e1:d4:8e:82:90:a5:1d:6c:76: 5c:1d:aa:b8:e9:30:1a:c6:d7:6c:0b:63:c4:9e:52:c6: 8d:99:65:4d:31:32:bb:4e:9e:45:db:ce:71:22:9c:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:4e:89:5b:7a:da:d5:a8:72:01:14:03:03:ec:a9:29: ba:8b:59:80:f5:a1:16:99:5c:b5:8f:b9:72:4b:14:c9: ca:10:5a:e3:4a:f9:d6:22:6d:6f:a2:77:bc:d5:e6:88: 4b:bf:d4:44:05:32:26:7f:44:36:80:f7:dc:61:76:89: ba:dc:2e:27:9e:c8:1b:a9:fc:08:bd:dc:bc:b8:27:bf: 82:c7:27:e1:28:42:65:af:7c:51:9d:54:a0:0d:41:df: fc:b3:4e:75:98:47:de:08:71:ed:26:4d:d3:e0:95:36: 44:a5:01:68:6c:39:87:f8:ef:99:ac:50:88:8b:10:eb: 68:44:d5:2f:42:a5:49:be:bb:66:7d:55:5a:60:22:16: d7:6e:5d:3f:d1:f1:0b:fb:d4:df:ee:d8:44:d5:58:6e: 22:43:55:c6:3a:6b:10:c1:cc:65:21:09:87:2d:ce:69: 42:fc:1a:41:85:64:47:cf:85:dc:8e:cc:cf:c8:6c:2d: 88:e2:cd:54:e2:59:68:44:26:7a:a1:d3:c9:95:ae:91: ad:25:76:6c:b9:1b:24:57:1a:a7:2c:0b:21:79:79:30: 62:75:bd:48:6b:d9:ca:83:11:2e:94:c2:d9:cb:79:ab: df:fc:78:5a:57:1b:d6:20:e1:19:8d:cc:15:ec:92:d4 Fingerprint (SHA-256): C5:91:D1:B4:91:8B:75:A2:C7:05:8A:40:F3:FB:80:60:99:3E:A0:FA:AE:3F:F8:FB:1D:91:35:E4:54:6B:94:FD Fingerprint (SHA1): 1C:9E:F8:0A:0C:16:8D:C7:D2:2E:57:76:F6:C0:41:5E:F6:61:42:95 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #5204: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #5205: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #5206: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #5207: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043441 (0x6709cb1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:05:22 2016 Not After : Fri Jan 08 10:05:22 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:b6:c5:34:6e:a6:f8:4a:d6:6b:de:f2:29:29:44:bb: d4:c4:68:92:26:39:46:78:24:86:57:9b:1e:1d:d5:30: 99:2a:6e:e7:78:26:99:1d:e4:87:5d:21:98:fa:2c:fa: c2:87:f6:5b:db:5d:28:20:17:e2:ed:a7:bf:ec:91:52: 8b:3c:a1:5b:7c:48:53:31:ff:77:d8:c2:19:b0:44:8e: bb:3e:87:bb:6f:c2:02:df:59:7e:3e:89:d5:c2:40:4a: 78:7a:db:94:f8:8f:8a:9c:88:6b:37:2f:86:44:69:13: 4d:80:94:e9:1c:d6:63:b8:8f:de:a1:af:37:a2:ae:32: 48:93:39:a6:9a:54:a6:25:b7:f7:de:e5:56:a5:0f:32: 9e:9d:a9:cb:f2:2d:f2:ca:35:46:f7:a9:db:3b:63:18: ce:1e:33:d0:b2:74:44:fa:ad:32:20:86:dc:87:f9:ae: fd:06:4d:09:79:53:66:b8:e8:10:86:63:99:63:ad:8e: 7e:bb:44:32:e3:3d:12:93:f8:9a:a4:19:63:f1:50:c9: 68:8d:d4:9a:fe:1f:f1:32:00:5d:ec:64:36:ad:4a:6e: 99:51:88:2b:5f:61:97:1d:2f:f0:4d:ed:69:10:5c:0e: 88:fa:58:89:68:db:17:9a:6b:fc:87:30:2b:8d:0c:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:2a:51:32:27:08:78:4a:bc:85:8c:08:86:fa:b2:8a: 08:5e:c1:30:af:b3:80:7e:c8:5d:69:a7:fe:38:d2:fb: 10:27:22:5b:36:f5:91:79:c7:e6:2d:c7:13:0d:fb:a7: 0a:88:7c:b2:11:fb:e0:91:b9:8f:26:d2:7a:27:72:ab: 79:8d:42:16:06:9c:c2:e1:26:8c:4d:0e:04:18:14:1e: fc:5c:76:dc:4d:fd:e6:c9:f3:ff:ac:58:2a:2d:bb:b9: c2:ea:cd:b3:fd:bf:c1:1f:15:62:2e:fb:03:af:d4:9b: 14:d6:5b:f0:f6:be:80:09:ee:fd:c0:09:4b:e5:70:b3: a3:ab:48:6c:3e:78:3a:3e:e0:5f:28:ea:be:8a:59:58: 5e:f4:21:67:fb:d2:64:0a:bd:c1:99:19:60:4f:0a:ce: 3d:dc:5f:04:0e:e6:d7:cd:06:85:3b:14:dc:8c:69:ab: 1d:82:01:08:2b:31:8d:e8:37:13:7e:b8:09:08:26:5e: d1:d6:a4:4b:47:fd:38:22:39:c0:60:97:58:7c:d3:fc: 26:26:e8:70:b1:fd:d5:ad:58:33:e4:c0:70:9c:90:13: 83:1a:79:ad:af:22:8e:df:1c:c3:bb:d0:61:02:61:e4: 8a:93:03:32:df:ba:51:c5:d5:56:9f:18:f2:90:f4:be Fingerprint (SHA-256): A4:4D:A9:DC:17:E4:07:8E:92:40:0D:1D:90:2A:9A:4C:F5:35:89:A4:5C:2D:1E:E3:88:6D:E6:3E:8F:98:8D:C5 Fingerprint (SHA1): C4:AA:C9:B8:34:AF:FE:93:AA:58:C7:C6:5F:15:25:8C:A2:AD:6D:C3 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5208: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043445 (0x6709cb5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 10:06:14 2016 Not After : Fri Jan 08 10:06:14 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:60:47:b2:d9:2d:75:4a:4c:52:ff:86:a5:2d:09:ac: 59:e1:de:16:ed:6b:dc:d3:a1:8f:f2:72:2f:0f:08:c3: 6d:a1:24:22:9e:96:d7:aa:1d:4b:f2:af:68:57:df:6b: 65:e3:8f:e8:a0:c3:32:f3:53:f2:21:16:90:fc:25:0e: 17:86:45:bc:85:7f:03:dd:f4:86:c5:69:70:04:2f:ac: fb:5e:1c:6a:cc:53:cd:dd:3e:a5:a7:f9:77:d2:9a:69: 0d:74:3f:cc:dc:a5:67:05:20:8d:51:17:99:41:d6:92: 9f:d0:a4:79:b7:db:34:a9:d5:4e:86:cf:63:99:c7:af: 29:57:c5:55:eb:4f:f2:0f:39:f9:59:ed:4b:2e:68:92: 33:7c:43:0b:01:86:69:4a:e8:89:53:75:81:40:28:8f: 91:d2:4f:37:dd:2a:a7:a5:94:ca:71:fe:15:3a:f5:b0: 37:04:07:65:a8:ac:22:bd:ce:97:31:77:ea:03:a8:4d: 0d:e7:ad:bb:c3:bb:1f:44:4a:72:c9:1b:86:26:8a:b9: c0:1d:e2:d7:aa:56:15:69:00:8f:34:43:2a:b2:a2:ca: 29:88:90:5a:e0:f4:05:84:26:3c:dd:d5:ca:dd:54:80: db:d5:8e:f6:e2:7f:00:c8:40:72:8a:23:ea:6c:46:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:d8:41:24:ef:d6:65:78:e5:7b:43:d8:e7:60:f1:8f: f9:d5:fa:20:86:8a:5d:d1:ec:15:e3:49:b9:fb:53:04: 00:60:dc:b0:24:76:1b:53:b5:c6:c0:6b:93:71:2f:8b: df:6b:1f:80:50:21:f8:51:9a:09:54:26:01:76:9a:53: b0:6e:87:30:83:87:1b:2d:17:e3:0b:65:0f:4f:37:b2: a0:39:67:e5:59:29:c6:b8:29:f8:b8:05:fe:de:ed:c0: 15:90:ed:78:58:7c:2f:58:84:d4:86:41:f9:fd:2d:b3: c3:d7:c3:20:b9:b4:72:d9:7e:9f:0c:2e:1a:c6:1d:04: 1e:2d:10:18:61:25:06:3d:9e:b0:7c:a8:41:49:43:49: 55:b3:a2:60:59:28:13:ec:f4:8e:f5:2d:90:7c:a2:1f: 4f:59:dd:72:bf:dc:fa:e3:16:6b:f8:3c:4b:9f:6c:15: 78:17:fe:26:d5:d4:05:a8:ad:df:17:c3:b4:80:7e:8c: 74:3d:8c:f8:fa:01:0d:a4:9f:7c:d9:19:7a:0f:6b:2b: 82:dd:2c:6b:27:66:af:e8:ba:76:9e:8e:e0:7f:69:e7: d1:89:ca:56:67:30:b8:65:b8:e9:c7:e2:c7:fa:1e:f7: 20:03:28:86:eb:ff:bc:11:57:42:33:9c:cb:56:9b:22 Fingerprint (SHA-256): E6:43:CF:57:6A:F3:A7:9C:9B:08:D4:A5:22:6C:D6:C8:6A:AA:E1:8C:94:0A:27:F7:F1:70:CF:4F:D3:25:59:80 Fingerprint (SHA1): 70:35:DD:BD:17:32:D8:C8:6B:CE:34:20:99:62:A1:43:B2:CF:CB:A8 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #5209: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043441 (0x6709cb1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:05:22 2016 Not After : Fri Jan 08 10:05:22 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:b6:c5:34:6e:a6:f8:4a:d6:6b:de:f2:29:29:44:bb: d4:c4:68:92:26:39:46:78:24:86:57:9b:1e:1d:d5:30: 99:2a:6e:e7:78:26:99:1d:e4:87:5d:21:98:fa:2c:fa: c2:87:f6:5b:db:5d:28:20:17:e2:ed:a7:bf:ec:91:52: 8b:3c:a1:5b:7c:48:53:31:ff:77:d8:c2:19:b0:44:8e: bb:3e:87:bb:6f:c2:02:df:59:7e:3e:89:d5:c2:40:4a: 78:7a:db:94:f8:8f:8a:9c:88:6b:37:2f:86:44:69:13: 4d:80:94:e9:1c:d6:63:b8:8f:de:a1:af:37:a2:ae:32: 48:93:39:a6:9a:54:a6:25:b7:f7:de:e5:56:a5:0f:32: 9e:9d:a9:cb:f2:2d:f2:ca:35:46:f7:a9:db:3b:63:18: ce:1e:33:d0:b2:74:44:fa:ad:32:20:86:dc:87:f9:ae: fd:06:4d:09:79:53:66:b8:e8:10:86:63:99:63:ad:8e: 7e:bb:44:32:e3:3d:12:93:f8:9a:a4:19:63:f1:50:c9: 68:8d:d4:9a:fe:1f:f1:32:00:5d:ec:64:36:ad:4a:6e: 99:51:88:2b:5f:61:97:1d:2f:f0:4d:ed:69:10:5c:0e: 88:fa:58:89:68:db:17:9a:6b:fc:87:30:2b:8d:0c:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:2a:51:32:27:08:78:4a:bc:85:8c:08:86:fa:b2:8a: 08:5e:c1:30:af:b3:80:7e:c8:5d:69:a7:fe:38:d2:fb: 10:27:22:5b:36:f5:91:79:c7:e6:2d:c7:13:0d:fb:a7: 0a:88:7c:b2:11:fb:e0:91:b9:8f:26:d2:7a:27:72:ab: 79:8d:42:16:06:9c:c2:e1:26:8c:4d:0e:04:18:14:1e: fc:5c:76:dc:4d:fd:e6:c9:f3:ff:ac:58:2a:2d:bb:b9: c2:ea:cd:b3:fd:bf:c1:1f:15:62:2e:fb:03:af:d4:9b: 14:d6:5b:f0:f6:be:80:09:ee:fd:c0:09:4b:e5:70:b3: a3:ab:48:6c:3e:78:3a:3e:e0:5f:28:ea:be:8a:59:58: 5e:f4:21:67:fb:d2:64:0a:bd:c1:99:19:60:4f:0a:ce: 3d:dc:5f:04:0e:e6:d7:cd:06:85:3b:14:dc:8c:69:ab: 1d:82:01:08:2b:31:8d:e8:37:13:7e:b8:09:08:26:5e: d1:d6:a4:4b:47:fd:38:22:39:c0:60:97:58:7c:d3:fc: 26:26:e8:70:b1:fd:d5:ad:58:33:e4:c0:70:9c:90:13: 83:1a:79:ad:af:22:8e:df:1c:c3:bb:d0:61:02:61:e4: 8a:93:03:32:df:ba:51:c5:d5:56:9f:18:f2:90:f4:be Fingerprint (SHA-256): A4:4D:A9:DC:17:E4:07:8E:92:40:0D:1D:90:2A:9A:4C:F5:35:89:A4:5C:2D:1E:E3:88:6D:E6:3E:8F:98:8D:C5 Fingerprint (SHA1): C4:AA:C9:B8:34:AF:FE:93:AA:58:C7:C6:5F:15:25:8C:A2:AD:6D:C3 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5210: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #5211: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #5212: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #5213: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #5214: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #5215: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043446 (0x6709cb6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 10:06:27 2016 Not After : Fri Jan 08 10:06:27 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:44:e2:8a:ed:c5:14:84:e1:0c:1c:05:01:87:2c:ae: 13:ef:94:dc:d2:7e:c4:35:86:20:29:e7:84:b4:e5:47: a9:88:58:1e:91:da:9f:c0:b8:7a:d5:9c:50:8f:85:2e: 31:d1:05:4c:41:86:1b:05:c0:ba:ab:5f:4f:2d:d8:28: 5c:06:7c:4c:76:80:33:74:5e:90:3f:43:76:45:f5:fb: de:03:91:ba:13:78:af:d8:32:ba:21:f5:89:e4:4c:d0: fb:44:42:06:7c:e3:8f:8e:c8:fd:77:ec:18:c9:22:d9: f8:57:e0:6b:c4:05:12:1a:b0:aa:88:9e:20:71:99:d3: 99:ad:22:e8:29:bd:5c:16:f4:9c:a5:6e:1d:76:b1:95: 65:8a:56:26:60:87:dd:b4:d6:5c:ea:30:89:02:6b:3f: e2:55:73:56:02:ef:35:aa:41:d4:da:f6:ba:0a:25:bd: ac:3b:44:fa:f7:d8:9d:af:8d:1a:76:a7:bc:ec:cf:41: 86:ad:8f:b1:c5:fb:03:4a:cd:ab:f2:83:50:46:c1:94: 8f:04:3d:0b:c0:16:29:41:0d:f0:45:c8:09:cc:77:bf: 76:c3:d4:2c:6a:b3:bf:bc:eb:63:ba:fc:3d:5f:f4:ff: dc:08:34:2a:ff:43:e3:22:14:29:d7:c1:9f:ec:23:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:04:b0:9c:c4:d5:59:4c:37:87:0f:9e:f8:37:a9:da: 4d:c0:be:06:28:bf:3d:c8:6d:c4:10:0b:9e:51:1e:94: da:a8:10:f2:91:ac:6c:96:7c:20:70:71:ef:33:f2:be: 50:a5:ec:cc:60:81:ec:4e:43:80:c4:44:4b:a8:5b:14: 81:28:36:f3:f8:dc:31:c3:1f:67:41:56:b9:1f:5b:20: 12:91:74:b5:6d:84:6a:e8:f0:7a:a1:65:60:d0:bd:1c: bd:86:a2:63:8c:b2:a2:10:e2:d9:49:d4:7c:46:8c:fb: 6d:aa:02:fd:49:50:eb:90:87:80:95:e6:dc:b5:d9:da: 9d:f4:15:a2:9b:a1:e7:f3:3a:cc:d1:bc:c9:0e:c6:9b: f6:44:17:d1:1c:ce:6f:16:43:f2:76:05:fb:eb:24:ef: 71:ef:31:c2:81:64:ea:e4:02:17:a2:6f:92:55:39:01: 40:7b:b4:28:b4:3a:a4:4d:0f:47:74:9d:5e:9e:e6:3b: 95:54:2f:24:5b:62:b7:70:8b:6c:81:35:eb:14:6a:35: b4:4c:ed:b0:79:56:eb:89:80:ef:87:37:7a:75:54:2c: 5e:c9:79:2f:bb:28:3b:f9:55:dc:85:0a:89:aa:d2:0a: 94:40:8a:f1:58:a6:8e:1b:f4:98:30:77:04:65:7a:49 Fingerprint (SHA-256): 5E:6F:A9:13:39:BA:12:2E:5F:23:0B:5C:07:C5:D1:D5:00:30:08:CD:1B:83:EB:7E:66:D5:F8:86:29:6A:E2:7E Fingerprint (SHA1): 5F:A6:B2:44:A5:66:12:C7:1A:89:D5:3E:3E:48:EE:9A:6F:B1:EF:93 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #5216: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #5217: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #5218: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #5219: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #5220: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #5221: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5222: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #5223: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #5224: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5225: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #5226: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #5227: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #5228: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #5229: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5230: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #5231: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5232: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #5233: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5234: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #5235: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5236: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #5237: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5238: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #5239: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 18626 at Fri Jan 8 05:07:13 EST 2016 kill -USR1 18626 httpserv: normal termination httpserv -b -p 9601 2>/dev/null; httpserv with PID 18626 killed at Fri Jan 8 05:07:14 EST 2016 httpserv starting at Fri Jan 8 05:07:14 EST 2016 httpserv -D -p 9601 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/aiahttp/http_pid.18586 & trying to connect to httpserv at Fri Jan 8 05:07:14 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 05:07:19 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #5240: Waiting for Server - FAILED kill -0 1695 >/dev/null 2>/dev/null httpserv with PID 1695 found at Fri Jan 8 05:07:20 EST 2016 httpserv with PID 1695 started at Fri Jan 8 05:07:20 EST 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5241: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043448 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5242: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5243: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5244: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043449 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5245: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5246: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5247: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5248: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108043450 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5249: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5250: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108043451 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5251: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5252: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5253: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5254: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5255: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 108043452 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5256: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5257: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5258: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #5259: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #5260: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043449 (0x6709cb9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 10:07:32 2016 Not After : Fri Jan 08 10:07:32 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:9f:48:eb:fc:cf:a6:3b:a5:93:5f:f2:3b:ca:74:20: 44:a6:32:7e:07:a4:a4:18:29:22:db:71:dc:df:99:2a: 5b:26:2f:80:72:00:17:21:cc:9c:03:10:fd:c8:14:45: 6f:27:4c:22:d4:1b:20:6c:69:7f:de:d9:d8:07:2a:d2: 55:79:72:dd:07:f1:a9:8a:53:16:1f:b4:e5:d0:c4:dc: 90:e8:c1:e9:1f:e8:85:3d:0b:d4:e5:b9:46:39:09:08: 1f:77:20:25:7c:9d:72:c0:5b:f2:6d:9c:e1:cd:e8:06: d0:4d:48:42:5c:f9:ce:fa:9a:23:df:10:8c:c4:d1:98: a9:49:a2:9d:a5:99:d3:2b:17:4d:80:01:cc:b8:85:92: b4:3f:1c:fb:3d:36:cb:c7:5e:5f:6c:05:de:49:39:e3: ed:84:81:b9:97:fa:03:b1:8b:ef:c2:75:cd:8c:4b:2a: d3:9d:c2:7b:d0:73:6f:c1:d4:9a:dc:19:72:1b:8e:b6: 45:d6:fd:60:19:07:ef:a2:64:7c:7f:c4:17:fc:30:7c: 27:ff:f1:f6:91:91:6a:3c:8e:ac:83:5b:9b:99:ae:3b: 7e:47:17:af:e1:5c:69:85:19:fe:fe:9a:21:c2:21:34: 85:a7:a1:c2:f6:f1:ac:70:99:e9:7b:cd:0e:19:76:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:23:c2:69:40:2b:d4:74:d2:a5:c0:67:9e:27:71:ef: 04:12:0c:7f:07:15:cb:4c:e4:a1:9c:be:5c:bc:fb:56: 9c:4e:ba:c5:14:19:6f:b0:b3:19:a4:9a:d9:06:8f:be: f2:cb:97:f2:45:f8:43:a3:5c:d1:5c:52:be:5d:1d:16: 62:0b:f0:25:a1:46:ba:6d:b6:c5:28:db:17:9e:81:0b: 46:39:d2:05:58:c8:fb:ae:53:22:c0:56:8c:17:60:f4: fe:c3:b3:f8:a9:72:1e:d0:66:e0:1e:22:0f:31:5f:33: de:8d:fd:0a:70:bd:c2:1a:dd:02:3b:71:18:06:a9:9c: 58:3e:48:ae:09:f2:1b:2e:0f:56:0b:b3:2f:85:9e:f9: 55:fe:2c:eb:58:55:13:a2:bc:d4:d7:32:18:b2:c0:49: fb:79:46:92:40:2a:3a:69:64:74:61:a6:f5:21:62:72: ee:53:c3:e7:7a:8f:73:85:5e:b7:09:a2:08:ed:25:a7: 76:2d:1c:e5:6a:16:26:1b:3a:d2:a7:7e:bb:21:92:79: 5b:af:58:bf:ec:12:8f:ca:0a:c1:2c:9b:3a:e4:d8:4b: 31:64:93:c0:fd:06:38:5e:08:be:44:1c:0a:63:82:7d: 39:38:86:6b:86:2b:ce:d1:b6:e1:de:76:78:9e:ba:c1 Fingerprint (SHA-256): F3:68:B4:80:4C:EB:6E:AC:C5:55:19:23:FB:8A:9A:09:EC:22:95:8E:37:7E:33:29:48:39:74:0E:F9:66:47:7F Fingerprint (SHA1): 0F:CB:5C:9D:F8:17:63:C3:97:BA:16:F5:D8:57:12:D2:D0:22:F9:74 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5261: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043448 (0x6709cb8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 10:07:29 2016 Not After : Fri Jan 08 10:07:29 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:b1:34:9c:4a:04:1d:4c:41:5a:33:03:c0:db:33:4a: 7f:6f:14:9e:59:44:69:48:12:b2:1c:27:ab:9e:93:e2: b4:fd:07:8e:e4:4d:d0:f0:81:dd:33:43:eb:c9:49:29: 56:bb:df:b6:4e:8d:3d:0f:cc:09:0d:7c:f4:2c:08:54: 58:e3:c4:77:24:2f:3b:da:f9:3d:24:1b:b4:24:f8:8c: ec:ce:cd:5c:d4:25:45:29:a1:48:27:55:25:68:55:82: 6a:99:3e:4e:3b:5f:ac:54:c8:cf:49:5a:6e:cd:a5:7c: 24:05:6c:d0:e1:5b:04:54:d3:a7:03:52:be:1c:1d:fc: b8:27:13:b4:d0:1d:b0:cc:48:3e:04:72:14:1e:bb:ca: 10:0a:87:5f:70:3e:23:09:53:15:cc:31:60:a3:06:8e: 31:a3:1e:8c:95:1c:91:fc:5a:5b:a1:26:64:3f:15:3c: 65:da:ff:1e:ea:ed:4b:47:04:2b:85:b2:d5:68:d7:a8: ce:31:62:aa:35:4a:91:b9:ac:04:02:cb:c7:27:7a:3d: 49:5a:72:37:43:38:e9:37:06:5a:d3:9e:15:90:43:8b: fe:6b:8e:c4:16:69:f1:44:3b:26:65:95:63:e9:1d:b6: 06:b6:ab:71:61:56:fc:dc:29:aa:c0:5f:88:00:a4:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:77:9a:2c:34:6f:c9:cb:9a:2f:ea:a7:a7:b3:79:ef: b3:25:a1:53:3a:b4:c7:9e:50:d6:b1:9c:a2:55:20:5c: 44:b4:e4:c3:2f:e8:67:4b:c0:d0:d0:81:d8:f7:09:10: 34:30:e7:7d:14:76:20:f5:ed:53:41:2c:35:56:4e:49: 51:5d:ee:a4:d6:a7:8c:fb:d4:0b:4a:34:97:6b:94:42: 13:cc:19:3b:74:65:0f:20:b1:27:b4:31:9c:a8:b7:1a: c2:1b:89:9a:91:cf:90:56:b0:f5:d1:6d:20:cc:7e:cb: c6:78:f1:63:c6:59:c8:6f:5e:2b:91:1c:1c:fd:27:48: 14:71:05:d7:f8:f6:3e:16:c9:4c:2b:c0:ed:dd:97:b8: d2:66:06:ec:d6:58:5f:2c:6a:43:b7:09:b4:82:ae:4d: 2d:cc:57:6d:d6:88:f4:a7:8a:43:da:3d:27:23:64:cd: 1e:03:14:4b:02:5a:72:6a:18:27:5b:9a:e2:42:ca:8f: c9:cd:0a:3e:f8:5d:3d:5b:3d:91:5e:54:22:ce:5d:fb: b7:f4:d5:4c:ff:e6:02:52:7d:a6:84:fc:12:e9:22:26: 8b:3e:14:b9:b4:de:4d:e8:e2:b8:46:01:ff:ac:54:9e: e5:ea:bf:3d:44:f9:1c:66:5e:2a:e9:dc:d1:f1:06:03 Fingerprint (SHA-256): 31:62:4C:F4:39:7B:62:0A:4A:72:99:08:61:77:E7:55:11:EF:D2:4E:B6:84:88:51:94:A1:E7:B8:63:E5:FA:E8 Fingerprint (SHA1): 26:85:7D:B2:01:E4:02:25:54:AF:DA:B3:A6:98:DE:B4:04:CF:56:8C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5262: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5263: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #5264: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #5265: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043448 (0x6709cb8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 10:07:29 2016 Not After : Fri Jan 08 10:07:29 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:b1:34:9c:4a:04:1d:4c:41:5a:33:03:c0:db:33:4a: 7f:6f:14:9e:59:44:69:48:12:b2:1c:27:ab:9e:93:e2: b4:fd:07:8e:e4:4d:d0:f0:81:dd:33:43:eb:c9:49:29: 56:bb:df:b6:4e:8d:3d:0f:cc:09:0d:7c:f4:2c:08:54: 58:e3:c4:77:24:2f:3b:da:f9:3d:24:1b:b4:24:f8:8c: ec:ce:cd:5c:d4:25:45:29:a1:48:27:55:25:68:55:82: 6a:99:3e:4e:3b:5f:ac:54:c8:cf:49:5a:6e:cd:a5:7c: 24:05:6c:d0:e1:5b:04:54:d3:a7:03:52:be:1c:1d:fc: b8:27:13:b4:d0:1d:b0:cc:48:3e:04:72:14:1e:bb:ca: 10:0a:87:5f:70:3e:23:09:53:15:cc:31:60:a3:06:8e: 31:a3:1e:8c:95:1c:91:fc:5a:5b:a1:26:64:3f:15:3c: 65:da:ff:1e:ea:ed:4b:47:04:2b:85:b2:d5:68:d7:a8: ce:31:62:aa:35:4a:91:b9:ac:04:02:cb:c7:27:7a:3d: 49:5a:72:37:43:38:e9:37:06:5a:d3:9e:15:90:43:8b: fe:6b:8e:c4:16:69:f1:44:3b:26:65:95:63:e9:1d:b6: 06:b6:ab:71:61:56:fc:dc:29:aa:c0:5f:88:00:a4:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:77:9a:2c:34:6f:c9:cb:9a:2f:ea:a7:a7:b3:79:ef: b3:25:a1:53:3a:b4:c7:9e:50:d6:b1:9c:a2:55:20:5c: 44:b4:e4:c3:2f:e8:67:4b:c0:d0:d0:81:d8:f7:09:10: 34:30:e7:7d:14:76:20:f5:ed:53:41:2c:35:56:4e:49: 51:5d:ee:a4:d6:a7:8c:fb:d4:0b:4a:34:97:6b:94:42: 13:cc:19:3b:74:65:0f:20:b1:27:b4:31:9c:a8:b7:1a: c2:1b:89:9a:91:cf:90:56:b0:f5:d1:6d:20:cc:7e:cb: c6:78:f1:63:c6:59:c8:6f:5e:2b:91:1c:1c:fd:27:48: 14:71:05:d7:f8:f6:3e:16:c9:4c:2b:c0:ed:dd:97:b8: d2:66:06:ec:d6:58:5f:2c:6a:43:b7:09:b4:82:ae:4d: 2d:cc:57:6d:d6:88:f4:a7:8a:43:da:3d:27:23:64:cd: 1e:03:14:4b:02:5a:72:6a:18:27:5b:9a:e2:42:ca:8f: c9:cd:0a:3e:f8:5d:3d:5b:3d:91:5e:54:22:ce:5d:fb: b7:f4:d5:4c:ff:e6:02:52:7d:a6:84:fc:12:e9:22:26: 8b:3e:14:b9:b4:de:4d:e8:e2:b8:46:01:ff:ac:54:9e: e5:ea:bf:3d:44:f9:1c:66:5e:2a:e9:dc:d1:f1:06:03 Fingerprint (SHA-256): 31:62:4C:F4:39:7B:62:0A:4A:72:99:08:61:77:E7:55:11:EF:D2:4E:B6:84:88:51:94:A1:E7:B8:63:E5:FA:E8 Fingerprint (SHA1): 26:85:7D:B2:01:E4:02:25:54:AF:DA:B3:A6:98:DE:B4:04:CF:56:8C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5266: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043449 (0x6709cb9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 10:07:32 2016 Not After : Fri Jan 08 10:07:32 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:9f:48:eb:fc:cf:a6:3b:a5:93:5f:f2:3b:ca:74:20: 44:a6:32:7e:07:a4:a4:18:29:22:db:71:dc:df:99:2a: 5b:26:2f:80:72:00:17:21:cc:9c:03:10:fd:c8:14:45: 6f:27:4c:22:d4:1b:20:6c:69:7f:de:d9:d8:07:2a:d2: 55:79:72:dd:07:f1:a9:8a:53:16:1f:b4:e5:d0:c4:dc: 90:e8:c1:e9:1f:e8:85:3d:0b:d4:e5:b9:46:39:09:08: 1f:77:20:25:7c:9d:72:c0:5b:f2:6d:9c:e1:cd:e8:06: d0:4d:48:42:5c:f9:ce:fa:9a:23:df:10:8c:c4:d1:98: a9:49:a2:9d:a5:99:d3:2b:17:4d:80:01:cc:b8:85:92: b4:3f:1c:fb:3d:36:cb:c7:5e:5f:6c:05:de:49:39:e3: ed:84:81:b9:97:fa:03:b1:8b:ef:c2:75:cd:8c:4b:2a: d3:9d:c2:7b:d0:73:6f:c1:d4:9a:dc:19:72:1b:8e:b6: 45:d6:fd:60:19:07:ef:a2:64:7c:7f:c4:17:fc:30:7c: 27:ff:f1:f6:91:91:6a:3c:8e:ac:83:5b:9b:99:ae:3b: 7e:47:17:af:e1:5c:69:85:19:fe:fe:9a:21:c2:21:34: 85:a7:a1:c2:f6:f1:ac:70:99:e9:7b:cd:0e:19:76:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:23:c2:69:40:2b:d4:74:d2:a5:c0:67:9e:27:71:ef: 04:12:0c:7f:07:15:cb:4c:e4:a1:9c:be:5c:bc:fb:56: 9c:4e:ba:c5:14:19:6f:b0:b3:19:a4:9a:d9:06:8f:be: f2:cb:97:f2:45:f8:43:a3:5c:d1:5c:52:be:5d:1d:16: 62:0b:f0:25:a1:46:ba:6d:b6:c5:28:db:17:9e:81:0b: 46:39:d2:05:58:c8:fb:ae:53:22:c0:56:8c:17:60:f4: fe:c3:b3:f8:a9:72:1e:d0:66:e0:1e:22:0f:31:5f:33: de:8d:fd:0a:70:bd:c2:1a:dd:02:3b:71:18:06:a9:9c: 58:3e:48:ae:09:f2:1b:2e:0f:56:0b:b3:2f:85:9e:f9: 55:fe:2c:eb:58:55:13:a2:bc:d4:d7:32:18:b2:c0:49: fb:79:46:92:40:2a:3a:69:64:74:61:a6:f5:21:62:72: ee:53:c3:e7:7a:8f:73:85:5e:b7:09:a2:08:ed:25:a7: 76:2d:1c:e5:6a:16:26:1b:3a:d2:a7:7e:bb:21:92:79: 5b:af:58:bf:ec:12:8f:ca:0a:c1:2c:9b:3a:e4:d8:4b: 31:64:93:c0:fd:06:38:5e:08:be:44:1c:0a:63:82:7d: 39:38:86:6b:86:2b:ce:d1:b6:e1:de:76:78:9e:ba:c1 Fingerprint (SHA-256): F3:68:B4:80:4C:EB:6E:AC:C5:55:19:23:FB:8A:9A:09:EC:22:95:8E:37:7E:33:29:48:39:74:0E:F9:66:47:7F Fingerprint (SHA1): 0F:CB:5C:9D:F8:17:63:C3:97:BA:16:F5:D8:57:12:D2:D0:22:F9:74 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5267: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #5268: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #5269: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5270: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5271: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5272: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043449 (0x6709cb9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 10:07:32 2016 Not After : Fri Jan 08 10:07:32 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:9f:48:eb:fc:cf:a6:3b:a5:93:5f:f2:3b:ca:74:20: 44:a6:32:7e:07:a4:a4:18:29:22:db:71:dc:df:99:2a: 5b:26:2f:80:72:00:17:21:cc:9c:03:10:fd:c8:14:45: 6f:27:4c:22:d4:1b:20:6c:69:7f:de:d9:d8:07:2a:d2: 55:79:72:dd:07:f1:a9:8a:53:16:1f:b4:e5:d0:c4:dc: 90:e8:c1:e9:1f:e8:85:3d:0b:d4:e5:b9:46:39:09:08: 1f:77:20:25:7c:9d:72:c0:5b:f2:6d:9c:e1:cd:e8:06: d0:4d:48:42:5c:f9:ce:fa:9a:23:df:10:8c:c4:d1:98: a9:49:a2:9d:a5:99:d3:2b:17:4d:80:01:cc:b8:85:92: b4:3f:1c:fb:3d:36:cb:c7:5e:5f:6c:05:de:49:39:e3: ed:84:81:b9:97:fa:03:b1:8b:ef:c2:75:cd:8c:4b:2a: d3:9d:c2:7b:d0:73:6f:c1:d4:9a:dc:19:72:1b:8e:b6: 45:d6:fd:60:19:07:ef:a2:64:7c:7f:c4:17:fc:30:7c: 27:ff:f1:f6:91:91:6a:3c:8e:ac:83:5b:9b:99:ae:3b: 7e:47:17:af:e1:5c:69:85:19:fe:fe:9a:21:c2:21:34: 85:a7:a1:c2:f6:f1:ac:70:99:e9:7b:cd:0e:19:76:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:23:c2:69:40:2b:d4:74:d2:a5:c0:67:9e:27:71:ef: 04:12:0c:7f:07:15:cb:4c:e4:a1:9c:be:5c:bc:fb:56: 9c:4e:ba:c5:14:19:6f:b0:b3:19:a4:9a:d9:06:8f:be: f2:cb:97:f2:45:f8:43:a3:5c:d1:5c:52:be:5d:1d:16: 62:0b:f0:25:a1:46:ba:6d:b6:c5:28:db:17:9e:81:0b: 46:39:d2:05:58:c8:fb:ae:53:22:c0:56:8c:17:60:f4: fe:c3:b3:f8:a9:72:1e:d0:66:e0:1e:22:0f:31:5f:33: de:8d:fd:0a:70:bd:c2:1a:dd:02:3b:71:18:06:a9:9c: 58:3e:48:ae:09:f2:1b:2e:0f:56:0b:b3:2f:85:9e:f9: 55:fe:2c:eb:58:55:13:a2:bc:d4:d7:32:18:b2:c0:49: fb:79:46:92:40:2a:3a:69:64:74:61:a6:f5:21:62:72: ee:53:c3:e7:7a:8f:73:85:5e:b7:09:a2:08:ed:25:a7: 76:2d:1c:e5:6a:16:26:1b:3a:d2:a7:7e:bb:21:92:79: 5b:af:58:bf:ec:12:8f:ca:0a:c1:2c:9b:3a:e4:d8:4b: 31:64:93:c0:fd:06:38:5e:08:be:44:1c:0a:63:82:7d: 39:38:86:6b:86:2b:ce:d1:b6:e1:de:76:78:9e:ba:c1 Fingerprint (SHA-256): F3:68:B4:80:4C:EB:6E:AC:C5:55:19:23:FB:8A:9A:09:EC:22:95:8E:37:7E:33:29:48:39:74:0E:F9:66:47:7F Fingerprint (SHA1): 0F:CB:5C:9D:F8:17:63:C3:97:BA:16:F5:D8:57:12:D2:D0:22:F9:74 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5273: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043449 (0x6709cb9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 10:07:32 2016 Not After : Fri Jan 08 10:07:32 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:9f:48:eb:fc:cf:a6:3b:a5:93:5f:f2:3b:ca:74:20: 44:a6:32:7e:07:a4:a4:18:29:22:db:71:dc:df:99:2a: 5b:26:2f:80:72:00:17:21:cc:9c:03:10:fd:c8:14:45: 6f:27:4c:22:d4:1b:20:6c:69:7f:de:d9:d8:07:2a:d2: 55:79:72:dd:07:f1:a9:8a:53:16:1f:b4:e5:d0:c4:dc: 90:e8:c1:e9:1f:e8:85:3d:0b:d4:e5:b9:46:39:09:08: 1f:77:20:25:7c:9d:72:c0:5b:f2:6d:9c:e1:cd:e8:06: d0:4d:48:42:5c:f9:ce:fa:9a:23:df:10:8c:c4:d1:98: a9:49:a2:9d:a5:99:d3:2b:17:4d:80:01:cc:b8:85:92: b4:3f:1c:fb:3d:36:cb:c7:5e:5f:6c:05:de:49:39:e3: ed:84:81:b9:97:fa:03:b1:8b:ef:c2:75:cd:8c:4b:2a: d3:9d:c2:7b:d0:73:6f:c1:d4:9a:dc:19:72:1b:8e:b6: 45:d6:fd:60:19:07:ef:a2:64:7c:7f:c4:17:fc:30:7c: 27:ff:f1:f6:91:91:6a:3c:8e:ac:83:5b:9b:99:ae:3b: 7e:47:17:af:e1:5c:69:85:19:fe:fe:9a:21:c2:21:34: 85:a7:a1:c2:f6:f1:ac:70:99:e9:7b:cd:0e:19:76:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:23:c2:69:40:2b:d4:74:d2:a5:c0:67:9e:27:71:ef: 04:12:0c:7f:07:15:cb:4c:e4:a1:9c:be:5c:bc:fb:56: 9c:4e:ba:c5:14:19:6f:b0:b3:19:a4:9a:d9:06:8f:be: f2:cb:97:f2:45:f8:43:a3:5c:d1:5c:52:be:5d:1d:16: 62:0b:f0:25:a1:46:ba:6d:b6:c5:28:db:17:9e:81:0b: 46:39:d2:05:58:c8:fb:ae:53:22:c0:56:8c:17:60:f4: fe:c3:b3:f8:a9:72:1e:d0:66:e0:1e:22:0f:31:5f:33: de:8d:fd:0a:70:bd:c2:1a:dd:02:3b:71:18:06:a9:9c: 58:3e:48:ae:09:f2:1b:2e:0f:56:0b:b3:2f:85:9e:f9: 55:fe:2c:eb:58:55:13:a2:bc:d4:d7:32:18:b2:c0:49: fb:79:46:92:40:2a:3a:69:64:74:61:a6:f5:21:62:72: ee:53:c3:e7:7a:8f:73:85:5e:b7:09:a2:08:ed:25:a7: 76:2d:1c:e5:6a:16:26:1b:3a:d2:a7:7e:bb:21:92:79: 5b:af:58:bf:ec:12:8f:ca:0a:c1:2c:9b:3a:e4:d8:4b: 31:64:93:c0:fd:06:38:5e:08:be:44:1c:0a:63:82:7d: 39:38:86:6b:86:2b:ce:d1:b6:e1:de:76:78:9e:ba:c1 Fingerprint (SHA-256): F3:68:B4:80:4C:EB:6E:AC:C5:55:19:23:FB:8A:9A:09:EC:22:95:8E:37:7E:33:29:48:39:74:0E:F9:66:47:7F Fingerprint (SHA1): 0F:CB:5C:9D:F8:17:63:C3:97:BA:16:F5:D8:57:12:D2:D0:22:F9:74 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5274: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #5275: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #5276: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5277: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #5278: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #5279: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043448 (0x6709cb8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 10:07:29 2016 Not After : Fri Jan 08 10:07:29 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:b1:34:9c:4a:04:1d:4c:41:5a:33:03:c0:db:33:4a: 7f:6f:14:9e:59:44:69:48:12:b2:1c:27:ab:9e:93:e2: b4:fd:07:8e:e4:4d:d0:f0:81:dd:33:43:eb:c9:49:29: 56:bb:df:b6:4e:8d:3d:0f:cc:09:0d:7c:f4:2c:08:54: 58:e3:c4:77:24:2f:3b:da:f9:3d:24:1b:b4:24:f8:8c: ec:ce:cd:5c:d4:25:45:29:a1:48:27:55:25:68:55:82: 6a:99:3e:4e:3b:5f:ac:54:c8:cf:49:5a:6e:cd:a5:7c: 24:05:6c:d0:e1:5b:04:54:d3:a7:03:52:be:1c:1d:fc: b8:27:13:b4:d0:1d:b0:cc:48:3e:04:72:14:1e:bb:ca: 10:0a:87:5f:70:3e:23:09:53:15:cc:31:60:a3:06:8e: 31:a3:1e:8c:95:1c:91:fc:5a:5b:a1:26:64:3f:15:3c: 65:da:ff:1e:ea:ed:4b:47:04:2b:85:b2:d5:68:d7:a8: ce:31:62:aa:35:4a:91:b9:ac:04:02:cb:c7:27:7a:3d: 49:5a:72:37:43:38:e9:37:06:5a:d3:9e:15:90:43:8b: fe:6b:8e:c4:16:69:f1:44:3b:26:65:95:63:e9:1d:b6: 06:b6:ab:71:61:56:fc:dc:29:aa:c0:5f:88:00:a4:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:77:9a:2c:34:6f:c9:cb:9a:2f:ea:a7:a7:b3:79:ef: b3:25:a1:53:3a:b4:c7:9e:50:d6:b1:9c:a2:55:20:5c: 44:b4:e4:c3:2f:e8:67:4b:c0:d0:d0:81:d8:f7:09:10: 34:30:e7:7d:14:76:20:f5:ed:53:41:2c:35:56:4e:49: 51:5d:ee:a4:d6:a7:8c:fb:d4:0b:4a:34:97:6b:94:42: 13:cc:19:3b:74:65:0f:20:b1:27:b4:31:9c:a8:b7:1a: c2:1b:89:9a:91:cf:90:56:b0:f5:d1:6d:20:cc:7e:cb: c6:78:f1:63:c6:59:c8:6f:5e:2b:91:1c:1c:fd:27:48: 14:71:05:d7:f8:f6:3e:16:c9:4c:2b:c0:ed:dd:97:b8: d2:66:06:ec:d6:58:5f:2c:6a:43:b7:09:b4:82:ae:4d: 2d:cc:57:6d:d6:88:f4:a7:8a:43:da:3d:27:23:64:cd: 1e:03:14:4b:02:5a:72:6a:18:27:5b:9a:e2:42:ca:8f: c9:cd:0a:3e:f8:5d:3d:5b:3d:91:5e:54:22:ce:5d:fb: b7:f4:d5:4c:ff:e6:02:52:7d:a6:84:fc:12:e9:22:26: 8b:3e:14:b9:b4:de:4d:e8:e2:b8:46:01:ff:ac:54:9e: e5:ea:bf:3d:44:f9:1c:66:5e:2a:e9:dc:d1:f1:06:03 Fingerprint (SHA-256): 31:62:4C:F4:39:7B:62:0A:4A:72:99:08:61:77:E7:55:11:EF:D2:4E:B6:84:88:51:94:A1:E7:B8:63:E5:FA:E8 Fingerprint (SHA1): 26:85:7D:B2:01:E4:02:25:54:AF:DA:B3:A6:98:DE:B4:04:CF:56:8C Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5280: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043448 (0x6709cb8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 10:07:29 2016 Not After : Fri Jan 08 10:07:29 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:b1:34:9c:4a:04:1d:4c:41:5a:33:03:c0:db:33:4a: 7f:6f:14:9e:59:44:69:48:12:b2:1c:27:ab:9e:93:e2: b4:fd:07:8e:e4:4d:d0:f0:81:dd:33:43:eb:c9:49:29: 56:bb:df:b6:4e:8d:3d:0f:cc:09:0d:7c:f4:2c:08:54: 58:e3:c4:77:24:2f:3b:da:f9:3d:24:1b:b4:24:f8:8c: ec:ce:cd:5c:d4:25:45:29:a1:48:27:55:25:68:55:82: 6a:99:3e:4e:3b:5f:ac:54:c8:cf:49:5a:6e:cd:a5:7c: 24:05:6c:d0:e1:5b:04:54:d3:a7:03:52:be:1c:1d:fc: b8:27:13:b4:d0:1d:b0:cc:48:3e:04:72:14:1e:bb:ca: 10:0a:87:5f:70:3e:23:09:53:15:cc:31:60:a3:06:8e: 31:a3:1e:8c:95:1c:91:fc:5a:5b:a1:26:64:3f:15:3c: 65:da:ff:1e:ea:ed:4b:47:04:2b:85:b2:d5:68:d7:a8: ce:31:62:aa:35:4a:91:b9:ac:04:02:cb:c7:27:7a:3d: 49:5a:72:37:43:38:e9:37:06:5a:d3:9e:15:90:43:8b: fe:6b:8e:c4:16:69:f1:44:3b:26:65:95:63:e9:1d:b6: 06:b6:ab:71:61:56:fc:dc:29:aa:c0:5f:88:00:a4:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:77:9a:2c:34:6f:c9:cb:9a:2f:ea:a7:a7:b3:79:ef: b3:25:a1:53:3a:b4:c7:9e:50:d6:b1:9c:a2:55:20:5c: 44:b4:e4:c3:2f:e8:67:4b:c0:d0:d0:81:d8:f7:09:10: 34:30:e7:7d:14:76:20:f5:ed:53:41:2c:35:56:4e:49: 51:5d:ee:a4:d6:a7:8c:fb:d4:0b:4a:34:97:6b:94:42: 13:cc:19:3b:74:65:0f:20:b1:27:b4:31:9c:a8:b7:1a: c2:1b:89:9a:91:cf:90:56:b0:f5:d1:6d:20:cc:7e:cb: c6:78:f1:63:c6:59:c8:6f:5e:2b:91:1c:1c:fd:27:48: 14:71:05:d7:f8:f6:3e:16:c9:4c:2b:c0:ed:dd:97:b8: d2:66:06:ec:d6:58:5f:2c:6a:43:b7:09:b4:82:ae:4d: 2d:cc:57:6d:d6:88:f4:a7:8a:43:da:3d:27:23:64:cd: 1e:03:14:4b:02:5a:72:6a:18:27:5b:9a:e2:42:ca:8f: c9:cd:0a:3e:f8:5d:3d:5b:3d:91:5e:54:22:ce:5d:fb: b7:f4:d5:4c:ff:e6:02:52:7d:a6:84:fc:12:e9:22:26: 8b:3e:14:b9:b4:de:4d:e8:e2:b8:46:01:ff:ac:54:9e: e5:ea:bf:3d:44:f9:1c:66:5e:2a:e9:dc:d1:f1:06:03 Fingerprint (SHA-256): 31:62:4C:F4:39:7B:62:0A:4A:72:99:08:61:77:E7:55:11:EF:D2:4E:B6:84:88:51:94:A1:E7:B8:63:E5:FA:E8 Fingerprint (SHA1): 26:85:7D:B2:01:E4:02:25:54:AF:DA:B3:A6:98:DE:B4:04:CF:56:8C Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5281: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #5282: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043453 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5283: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #5284: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #5285: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043454 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5286: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #5287: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #5288: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043455 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5289: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #5290: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #5291: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043456 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5292: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #5293: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #5294: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043457 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5295: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #5296: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #5297: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043458 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5298: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #5299: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #5300: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043459 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5301: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #5302: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #5303: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043460 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5304: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #5305: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #5306: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043461 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5307: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #5308: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #5309: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5310: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 108043462 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5311: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5312: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 108043463 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5313: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5314: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 108043464 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5315: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5316: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #5317: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #5318: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5319: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 108043465 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5320: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5321: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 108043466 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5322: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5323: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 108043467 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5324: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5325: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #5326: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #5327: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5328: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 108043468 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5329: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5330: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 108043469 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5331: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5332: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 108043470 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5333: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5334: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #5335: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #5336: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5337: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 108043471 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5338: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5339: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 108043472 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5340: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5341: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 108043473 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5342: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5343: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #5344: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5345: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5346: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 108043474 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5347: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5348: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5349: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5350: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108043475 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5351: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5352: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043453 (0x6709cbd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Jan 08 10:08:20 2016 Not After : Fri Jan 08 10:08:20 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:1f:01:49:2e:4e:35:41:73:f8:09:cd:3b:d5:c2:ee: b6:b0:47:9f:61:e8:68:87:ba:8e:14:a9:2c:cb:6a:18: b3:4a:98:b6:fe:c2:73:92:4a:ca:b1:ed:6c:d4:be:d1: af:83:9e:71:94:40:a6:cd:7d:31:26:8f:c6:05:38:7f: 41:f7:0f:3a:01:75:05:d1:27:40:db:46:60:a9:d1:e9: c2:5f:9b:bc:26:26:98:93:a6:de:76:44:ea:84:0f:e8: a4:a5:e0:99:10:dd:ff:54:08:21:fd:6f:7b:a8:6e:2b: a5:e4:37:5e:c6:a6:22:67:45:7f:ab:cd:f2:63:44:da: ab:3a:c2:14:0f:7d:e6:67:53:94:8d:0d:81:8d:fe:bc: 39:db:cd:b7:0e:54:66:cb:5f:5c:29:e8:5d:68:39:b5: 8e:6a:34:ec:e2:aa:41:09:50:88:1f:b1:49:38:22:2a: f7:09:3b:8d:4e:64:b7:ab:30:ac:1a:34:22:07:92:8e: 80:38:6e:a5:64:81:1b:5c:5e:05:38:58:71:d3:0e:47: d4:51:f0:c6:1d:aa:1e:81:e5:99:c1:18:e8:d0:08:44: b4:82:12:80:d9:99:de:e4:7f:cd:ca:c2:70:eb:74:06: c8:ad:0a:ea:08:7e:56:9c:f8:9f:f1:84:52:77:6f:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:6c:db:8e:c1:a7:98:2b:a0:04:62:f3:74:d8:d7:72: bb:05:fa:29:5e:4f:2f:69:cd:db:3f:b5:5e:89:80:3b: 0b:fe:39:0f:8b:30:bc:c0:2e:0e:62:cb:a3:b1:38:0d: 36:ec:ba:7e:bd:58:35:5a:cc:60:b2:49:9f:89:13:45: 6f:f4:67:77:be:13:e5:56:b7:c7:dc:10:c2:4e:e5:85: bd:b3:ef:a7:65:a9:4a:a8:0d:ba:8e:cd:ab:58:fc:42: c1:02:59:56:29:e6:01:a5:39:0a:e6:95:74:c1:01:cf: ec:da:57:e6:2b:4e:b2:1d:f0:95:ee:3f:7e:f3:2f:b7: cb:66:ec:05:ea:e6:fd:21:09:9a:3a:c4:ae:ce:ba:e1: 04:8f:05:08:c2:ab:d5:0f:22:51:e7:14:5f:cd:e4:be: 0a:3c:98:14:5d:78:4e:d1:6e:33:c8:8e:d0:72:00:e5: d3:16:f0:b6:e6:3b:ff:8d:f3:ab:8c:45:68:41:7b:51: 3c:70:02:69:18:b4:53:01:d9:f5:81:07:f5:11:a5:f5: 5b:17:fd:87:e9:29:25:7e:bf:17:95:4f:6b:87:98:f4: f1:99:6f:01:5d:7e:b1:41:3d:88:af:a9:f5:47:00:63: 53:96:93:4e:36:ba:3e:e5:8a:d8:ba:90:1e:f4:e4:49 Fingerprint (SHA-256): 96:D4:01:B0:BB:C0:EA:24:E5:88:46:50:6A:D5:58:A3:B9:B6:F5:DB:7E:1F:2D:A1:15:B7:A8:AA:D3:06:E2:3C Fingerprint (SHA1): 33:0C:AF:A6:81:E7:9B:EC:E1:EA:32:5B:AB:B6:98:46:C3:2E:0F:F7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5353: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043454 (0x6709cbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Jan 08 10:08:29 2016 Not After : Fri Jan 08 10:08:29 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:7e:83:58:c9:a3:c9:2e:01:f1:15:5a:20:d8:f4:54: 0b:de:ac:53:df:7e:60:b5:66:f1:33:95:c6:b2:c5:e7: d4:48:89:82:0f:bb:f4:ff:b9:2c:c0:15:c1:4c:99:f7: ed:b0:ab:ef:ee:1e:db:cc:ec:a3:3d:1d:1c:6b:93:c1: f6:6d:31:c4:da:2b:70:eb:ea:30:c3:d4:1b:57:b9:de: 42:eb:db:13:c6:eb:43:7a:3c:8e:04:9e:19:5d:ad:58: 62:a5:34:4a:af:90:3a:48:19:17:25:ea:a8:83:04:09: 37:40:a9:f9:69:f2:61:3b:2e:17:13:f2:30:a1:96:d4: f3:ee:ea:fd:aa:d5:be:5d:a7:9b:41:f1:43:d0:e6:7c: aa:32:94:0d:3a:dc:3e:73:22:e0:8b:1e:e3:4a:88:28: 31:1c:8e:93:d5:cb:73:c4:77:74:c7:e6:ff:0b:4c:d3: 3c:cb:51:63:48:3e:f1:a5:b6:c1:4e:c2:9b:a0:81:0e: 31:3a:66:cb:45:c6:be:cb:d4:38:9f:39:dc:5e:e3:d3: 19:c5:e2:2b:20:c4:d6:42:3d:47:57:bf:30:de:fb:bb: 95:95:a8:40:6c:5b:99:5d:65:34:a1:52:aa:ca:c7:20: c8:ef:ac:2e:1c:3d:7a:f2:1b:ab:8b:93:22:f8:7f:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:d4:5b:19:13:ee:65:d5:38:5a:21:19:04:0e:1f:23: 7a:37:68:35:1e:9e:49:fa:34:03:3b:1d:0f:72:67:ee: 37:cb:d9:d1:44:3a:e5:cc:9f:13:9d:4c:6c:45:71:86: 8a:dd:99:a8:5e:2e:f8:21:48:09:b7:ec:d7:4b:01:68: 0f:d4:39:3f:f5:45:89:bd:4e:c0:5e:95:89:11:eb:22: 1f:d9:fa:24:c7:f1:d4:d9:2b:56:bd:e7:a5:be:d1:41: e4:b8:94:2a:6e:b1:f4:cf:97:42:97:4b:ba:c5:13:ac: 27:15:75:3c:60:70:27:12:f3:d8:02:df:c9:a5:90:f9: 6c:ef:21:48:ba:b2:28:22:3b:64:ad:76:e1:a0:fc:7f: f9:ea:64:df:61:36:ca:4d:c5:af:17:c2:d2:4a:33:a7: 33:11:68:13:16:b7:3f:57:95:c2:37:ac:ba:ed:f2:23: 25:b6:03:91:72:66:68:71:34:d2:ff:2c:ed:3d:27:c7: 10:c7:79:6b:4f:21:ae:08:99:68:ad:17:3e:09:40:c5: 60:a7:8d:1c:8e:a3:fc:ce:e6:6b:f8:bb:89:fa:a4:10: 32:5b:f7:8b:12:d6:9f:3d:24:60:cb:15:b7:f7:1b:8f: 43:3c:48:e0:89:8a:ad:dd:ee:99:e7:c4:cd:23:0a:b3 Fingerprint (SHA-256): B3:53:55:15:C3:9D:28:F1:4E:5D:2D:37:51:03:5B:C1:18:5C:C1:5E:4D:70:2A:42:60:4B:F4:32:D3:CF:9A:F0 Fingerprint (SHA1): C7:CA:DC:4B:5B:AF:12:0D:37:DC:ED:6D:14:58:E3:74:90:E5:ED:27 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5354: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043455 (0x6709cbf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Jan 08 10:08:38 2016 Not After : Fri Jan 08 10:08:38 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:43:1a:54:58:7a:23:d5:04:6d:ac:28:46:98:75:03: 42:2d:b1:1e:50:26:aa:4d:df:86:9a:0c:62:f5:95:60: 68:a2:0d:7a:ad:a5:4f:75:8b:ec:ae:15:9e:d9:de:cf: 62:be:13:63:89:b1:17:9b:63:02:04:92:f0:db:74:e0: a1:01:bd:74:81:9d:f7:30:d0:f0:07:ea:d0:57:9a:cb: 5d:d7:e0:6c:46:a0:b2:7f:9a:9d:47:87:29:ad:33:92: 6e:61:d3:d1:7d:25:60:79:b8:0f:a1:28:ca:48:cc:cd: 12:c4:fc:c8:b6:3a:40:bf:8b:0f:c6:15:2f:a1:80:cc: 88:ed:03:62:66:d7:95:f8:c7:d6:68:eb:33:55:66:7c: da:c9:20:38:cf:19:7b:c1:ac:75:7a:91:51:e8:5e:d5: 4f:c8:95:b6:9e:54:f4:7b:fa:48:90:92:f6:bc:f8:4a: d5:d4:bd:87:61:f5:e7:a0:13:d3:e0:7b:19:9b:3d:f4: 2e:f6:9b:c6:24:a9:e4:94:be:47:0f:39:e0:53:19:8c: ac:78:44:e2:83:c8:5c:09:dc:3e:be:e9:62:b2:06:dc: 74:70:b0:e6:21:4c:12:12:aa:34:77:b8:e7:33:a0:8d: 16:ff:26:1d:bf:f5:67:f0:27:c9:9e:28:a5:61:c1:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:51:43:d4:fc:25:e2:46:74:8b:5f:30:f7:35:ad:03: 21:37:bf:a9:94:51:7e:6a:d7:64:e9:df:4a:18:92:31: 76:11:7e:a8:a6:7b:7a:d6:f0:3e:7d:f1:b6:74:7a:cf: 6d:98:38:7e:2c:a8:59:77:f3:13:59:76:61:29:9c:fa: 93:71:aa:d9:16:1b:25:d7:f9:f9:0d:ab:6a:8d:63:8e: 86:d9:5c:0f:96:73:97:be:cb:a0:bf:73:51:9c:0f:77: ad:ab:a7:70:74:ae:fd:c5:53:a8:64:a2:8b:1f:4f:9b: ac:ca:c9:b4:f0:89:6d:27:6f:d0:fa:dd:3b:fc:c2:28: 2d:89:7a:fd:a8:34:4f:87:13:e5:64:cf:8a:e2:0c:73: 49:58:fe:27:5b:e7:ed:2b:77:ff:74:a3:aa:b0:61:0f: 63:9c:a2:16:68:21:d6:31:49:ed:e2:31:b8:d8:23:b6: 2a:67:31:f8:4d:3b:24:9a:ed:fb:c5:be:c8:37:2e:82: 2b:8d:c1:82:e4:4a:a6:d1:d7:45:d1:92:bc:11:20:c8: d5:f7:5d:4b:bf:d0:95:f6:bc:ce:93:69:8c:00:74:4c: ec:3d:39:8b:90:dc:dc:be:b6:56:b9:f9:d4:70:01:3e: 72:82:be:b2:9a:56:37:08:61:b4:25:b5:56:93:44:c0 Fingerprint (SHA-256): 1D:08:96:90:0F:B9:D2:07:92:85:6B:88:45:76:CE:C7:23:DC:5C:DE:AA:E1:96:59:00:6C:37:3C:2A:E9:4B:BA Fingerprint (SHA1): 8A:8A:22:5D:58:10:7D:BB:2D:C1:2D:CB:6B:64:8E:C5:14:EE:A0:A7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5355: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043456 (0x6709cc0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Jan 08 10:08:52 2016 Not After : Fri Jan 08 10:08:52 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:e5:0f:dd:6a:fc:be:43:fd:54:d8:2e:f8:e3:c2:38: b3:ed:49:2f:ba:a8:86:b5:de:94:43:71:c6:98:f3:1c: 4c:6c:cc:79:79:d5:6b:14:af:3a:19:6e:14:e9:e3:ac: ab:2c:69:6a:54:65:e2:42:a3:7f:75:d8:0e:31:63:b5: d0:33:67:93:b9:3d:41:0d:15:bc:73:7a:44:95:f7:40: 71:b9:b2:85:16:ea:57:0b:e9:ae:33:c1:80:9b:e0:76: e5:1c:46:8b:c1:7d:01:24:ed:9e:74:d5:da:7b:6a:2f: 0b:d3:da:fa:eb:13:82:92:cb:96:14:9d:ee:3b:bf:78: 9d:50:13:dc:c5:91:4b:0a:a6:27:1a:c9:f4:c4:31:ad: 72:1d:6e:dc:cd:68:68:a5:d4:5a:de:90:a8:b8:85:74: 44:c4:2c:fb:1f:24:c4:ad:7e:9c:c4:2a:05:19:ab:af: 05:e5:b7:32:1c:f3:a9:b6:db:16:f8:d3:94:0d:d7:e1: c2:1c:5e:b8:56:ed:06:25:47:29:06:79:d6:3c:b6:cc: 3a:5f:ff:9a:af:c1:47:ab:68:a0:5b:c7:2c:6c:8f:8f: 6c:6b:89:1f:90:b1:1a:9a:14:94:1e:2d:cc:21:a1:7e: ec:f7:1b:83:32:53:6a:c0:7a:ac:19:5e:b0:a6:e0:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: dc:39:bd:0c:81:fb:ea:13:94:f5:ca:98:a8:96:97:e3: 0e:9d:b2:69:c5:8b:83:93:37:16:24:6b:6a:32:78:7d: 83:b5:89:32:51:cc:83:07:8a:da:2a:40:70:e0:8d:f3: e8:e8:8b:3e:d2:5f:22:4a:16:9f:1f:bd:97:15:9e:bf: ea:d1:88:52:ce:e4:d7:d9:e3:e6:09:f7:2e:74:98:e1: 0f:72:fa:bb:84:53:4c:9a:30:89:a2:80:6d:a8:ce:73: 18:e8:5f:63:05:2e:3c:88:68:03:0f:df:7d:a2:28:35: 6f:96:cb:c7:b0:9e:ad:bc:0f:28:4a:f9:f2:1e:10:d1: e3:dd:ef:18:2e:cb:6a:c2:99:b5:32:92:b9:32:0b:37: 02:3e:2a:ad:d3:6c:17:01:2d:64:f4:a8:f6:ed:40:1d: 07:a9:5a:c7:2f:45:3c:93:7c:a3:ee:ab:7e:26:f9:44: ec:fe:67:1c:14:d4:b0:1e:ea:7d:fe:de:11:66:27:67: ec:4d:75:a4:dd:b7:c1:3b:6f:89:a3:f3:52:76:0d:80: b0:e7:cd:57:83:b4:74:32:c6:ae:8d:bc:48:d9:1e:7a: e0:58:ed:07:43:37:8f:32:96:d3:38:57:be:a5:6c:9e: 58:8c:68:03:7c:cb:76:1e:d0:07:cc:32:78:92:72:d2 Fingerprint (SHA-256): E0:48:3E:D0:69:FC:D9:ED:96:2E:79:AF:1A:9B:85:EA:61:19:18:EA:86:D5:0D:A8:BC:06:47:A9:27:C5:10:71 Fingerprint (SHA1): B6:AE:7F:83:77:CF:0E:D4:3C:36:38:7C:2C:22:93:B1:18:67:DC:86 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5356: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043457 (0x6709cc1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Jan 08 10:08:57 2016 Not After : Fri Jan 08 10:08:57 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:ac:e5:10:c0:a5:3a:94:48:db:97:16:43:a5:7e:d4: e4:74:40:52:8f:18:8c:db:e3:1d:22:98:93:57:35:d9: e5:8a:6b:57:5e:ab:37:be:8c:8b:7f:67:d7:fb:00:d1: d5:c4:40:f8:5a:9c:0b:34:b1:cd:a3:57:81:d1:95:80: de:57:c8:e5:5a:17:46:e7:d2:89:68:95:58:9c:b8:48: d7:25:df:81:21:89:60:17:ec:18:a9:83:4e:f4:3b:8a: d1:ba:f0:b9:2a:8f:a4:26:31:6e:e6:07:62:f3:c0:d3: 87:47:4e:e8:17:76:6b:59:d2:ec:01:26:9f:af:0c:61: a4:f6:31:8c:c0:39:c5:da:dd:68:0c:30:b4:cd:1d:42: 3d:5c:5c:31:7d:f3:d7:99:a4:91:c9:91:29:75:b8:81: 1e:d7:50:49:32:11:ab:78:81:d0:86:73:a8:22:ff:fc: 09:2c:3c:26:74:5c:a2:82:cb:81:84:a0:b9:2d:c6:9b: 6c:80:4d:02:b2:78:ce:41:ac:22:3d:37:7f:25:03:17: d8:d1:48:25:df:a6:67:8c:c1:43:f2:c3:6d:52:84:aa: 0b:b8:d5:e6:7a:c2:8a:d6:72:73:f3:96:2c:0f:a9:8d: 61:2f:1c:21:c2:42:f7:7d:bc:b2:bc:82:00:77:b9:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:8a:3c:b7:67:7e:a0:36:89:58:c6:dc:36:10:a5:b1: 5b:34:68:bc:3f:20:39:71:5e:39:70:4d:d5:da:1a:0e: 0e:64:04:41:68:f8:33:4f:31:cb:29:24:d3:b3:7a:cd: f7:80:f5:58:86:a0:54:d2:4c:d9:8f:82:d2:87:09:aa: 35:79:40:cd:32:f6:0d:36:96:27:c5:cb:cb:50:08:52: 28:3e:fb:4a:6c:5d:75:73:df:30:18:c7:ad:ed:74:3b: d3:9b:98:02:6d:97:d0:b6:1b:c2:46:76:35:a2:34:7f: 8f:3e:9e:20:64:e9:17:9a:33:db:85:12:bd:49:f8:e6: 71:f9:5e:53:c3:f1:61:01:e3:ff:65:2e:94:79:98:4d: 73:b4:be:6b:06:79:5a:2e:2b:7c:20:9a:ea:53:0b:b4: ac:50:a5:86:9c:ea:1e:ce:b0:c3:8e:62:8d:54:b2:a6: 33:a5:d5:71:56:b5:5b:22:39:66:c1:e3:c7:3d:26:2b: 7e:37:0e:d4:40:51:16:f4:80:a4:13:72:94:0a:94:8c: 30:f3:6f:31:d5:4a:22:17:0a:2a:e2:11:c1:bf:38:58: a0:a3:5f:32:1a:a5:4a:72:db:7c:05:aa:99:68:3d:2b: 5a:c1:3a:e7:b3:5e:59:d1:f8:59:1b:c8:4d:f8:ad:36 Fingerprint (SHA-256): 0F:69:33:B7:CD:BD:36:0C:44:F2:41:03:A9:5E:2F:71:E3:0A:DB:1A:E0:FC:1C:05:C5:9F:07:AD:47:D0:F2:57 Fingerprint (SHA1): 2D:80:F9:CA:9F:85:D1:CF:D0:2F:D3:7F:CE:DB:15:00:07:6B:CA:DB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5357: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043458 (0x6709cc2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Jan 08 10:09:09 2016 Not After : Fri Jan 08 10:09:09 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:e1:d8:3e:f7:8a:82:12:24:83:a5:b4:c1:fe:e3:b7: fc:c1:c6:82:f2:78:ab:54:46:be:5f:9a:30:01:66:ad: 28:13:f3:ba:d9:c4:83:20:ee:db:99:5b:39:d1:21:15: 4e:31:73:91:6c:dd:8f:73:4b:4c:4e:a7:33:fd:a2:32: 59:10:2d:2d:9b:13:9c:09:4a:5e:5f:a7:84:11:5d:5d: 88:64:41:91:bb:1c:87:56:52:ce:b5:85:28:31:7a:1c: e4:82:86:be:e1:fc:3b:53:00:ac:60:97:55:1a:0f:58: 60:6a:1e:4e:a8:dc:15:8f:c3:68:62:5a:9c:2e:da:e3: d4:95:c6:40:9c:cf:53:04:76:93:82:27:6a:f5:38:ee: dc:1f:a8:d0:ad:c9:31:da:a0:db:d5:53:59:b4:ca:e2: 6f:3a:1b:24:b1:5f:71:4a:e1:1f:32:45:78:09:75:18: 45:5d:66:04:b9:6c:be:56:5a:b9:97:3a:58:35:0d:d0: 58:75:15:24:1d:02:1c:06:67:1d:3c:8b:06:b5:b4:85: ee:50:c3:6e:e8:db:76:4b:79:e5:63:fa:07:12:55:cc: b4:7c:c7:f6:54:be:78:ef:87:77:2b:3e:9a:01:30:f8: 05:3f:20:bb:11:02:7d:30:4b:42:05:b2:93:90:df:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:f9:fb:20:7f:ec:68:c7:c0:10:bb:e1:a7:77:f1:10: 1a:08:27:13:c0:9d:7c:bd:b4:42:b3:b5:83:bf:73:83: 11:6b:84:f2:14:e5:07:ec:ab:d1:ad:7d:14:cc:ad:16: ed:bf:be:21:2e:98:3a:1c:cb:2c:1c:17:b4:c8:12:f2: d4:04:10:b7:8d:ff:4e:9a:4c:04:d2:47:ed:22:70:bf: d4:4c:41:64:5f:55:10:01:f9:d0:48:7f:21:f0:1a:6c: 59:07:80:44:ce:3a:ec:91:01:8f:ab:3b:69:43:33:bf: 81:a9:56:3b:15:f8:c7:b7:64:ff:b0:4a:9e:05:34:5b: a9:8a:9d:5c:f3:85:fe:7f:8a:b2:39:18:9c:2e:60:14: a2:ad:9c:b1:51:fd:c8:73:03:b6:19:ca:4b:8f:00:c2: 9e:7e:d6:57:25:3e:c5:48:a5:80:98:34:8d:64:6a:08: 9a:02:a4:b8:ae:74:6b:c7:a8:e5:4b:d3:ad:db:96:35: ad:25:65:c5:d0:ac:e7:73:0c:17:80:c8:a9:86:d8:10: 6f:0a:d1:e6:de:ca:4f:70:2b:b9:d0:47:16:42:ae:d8: 73:81:d9:de:9b:5a:30:d7:e5:a2:28:46:38:b6:0d:9e: e3:40:a8:b6:e1:09:fa:7e:0b:f3:3a:e9:cc:1c:ad:7d Fingerprint (SHA-256): E1:BD:DB:31:F6:70:9F:BB:8E:CE:4B:3F:2C:12:D6:AA:28:61:22:64:B7:13:8E:6B:02:A5:FE:A9:85:3C:7D:BB Fingerprint (SHA1): 0B:EB:B7:09:92:70:20:C7:31:27:0B:22:78:1C:31:4D:E4:89:B5:E9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5358: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043459 (0x6709cc3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Jan 08 10:09:17 2016 Not After : Fri Jan 08 10:09:17 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:d0:78:0b:7d:3f:12:57:c7:38:47:b6:94:a1:3d:86: d5:30:e7:d9:35:26:5d:d1:7d:a8:eb:24:bb:92:f1:94: 22:6e:54:4c:2d:6e:e9:6b:70:b6:a7:d2:ff:b4:0a:44: 64:a5:cb:00:3c:84:73:50:38:89:ed:a5:56:43:75:8a: c2:76:7c:1b:b3:3e:c2:05:e6:f6:9e:a1:68:5c:f3:02: f0:98:55:0a:04:10:a6:34:d3:f8:d6:a4:ed:fe:32:ba: 27:4e:9f:ce:2d:c7:c7:aa:5e:51:7c:35:12:91:04:db: 00:8d:2a:f0:b4:20:82:fc:ed:f8:14:66:10:c9:d5:6c: b9:b5:5f:bf:ec:8d:71:50:9b:60:43:cf:7d:91:45:7f: 22:0a:db:fa:d4:eb:28:c3:be:ca:16:a0:36:63:7c:45: f8:c2:17:ea:b7:ed:bf:72:e2:b8:23:9e:ad:f6:af:c6: 0b:88:0e:c1:f2:81:9f:04:55:82:6d:fa:cc:c3:89:f0: 42:87:24:18:ba:85:66:8d:a6:e3:04:ec:82:e4:d6:04: 16:8c:de:f1:38:b8:9d:ff:71:6c:3f:04:65:bf:e8:2a: 83:6f:25:f4:2c:62:d0:99:1d:36:90:94:d9:a9:29:ed: 62:f1:6b:2c:c8:3c:e2:6e:58:1f:0d:1a:13:28:52:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:6b:e8:98:01:35:88:cd:94:d7:4f:e5:cd:ae:11:4c: 76:e6:01:d6:8b:58:fc:52:64:4c:b7:a4:48:08:97:8a: 2c:c1:95:f0:52:d3:5c:e8:f5:3e:b6:fe:6b:2d:a2:d8: 61:65:51:21:8c:9c:26:35:bd:26:4e:41:87:e0:27:d5: 58:51:e1:a5:52:6b:9a:82:4d:f0:18:2f:59:f4:a3:1b: 89:b0:82:b6:b2:93:3f:0a:a1:c9:6a:85:2e:00:58:28: 61:a3:6b:0b:3b:93:3b:e2:9b:f0:c8:99:f6:eb:f8:ac: 28:18:ed:42:0e:19:66:84:51:0e:2c:c4:c1:87:51:ac: bc:fd:0f:d4:7c:32:0a:ed:06:44:c7:6a:8e:22:10:44: f7:d7:9d:9c:ed:65:84:6d:72:85:4b:de:76:cd:87:b5: 10:bf:a0:f0:22:69:94:03:37:81:3c:11:1e:35:af:29: f8:f7:b1:40:95:67:a8:c0:e2:20:60:96:63:8f:05:25: 01:da:72:d3:46:28:3c:43:0b:67:aa:e2:9a:7e:cd:12: 81:f3:a9:c9:0b:dc:28:d4:dd:bb:29:f0:ed:62:a4:48: 1c:97:dc:fe:47:e3:f3:b8:40:d8:25:89:fc:d3:79:89: 17:07:1b:13:68:90:90:71:8b:4a:93:64:45:1f:2c:9f Fingerprint (SHA-256): E2:7B:A1:62:E1:08:47:58:E1:FA:47:86:5F:D3:F0:67:DB:A5:9C:13:E3:11:16:1E:17:B0:4B:C2:4E:04:89:86 Fingerprint (SHA1): 94:8B:6E:DD:24:11:5E:7A:B2:3D:35:63:51:2F:59:C3:E4:C0:AE:C6 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5359: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043460 (0x6709cc4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Jan 08 10:09:21 2016 Not After : Fri Jan 08 10:09:21 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:49:fb:b8:32:f3:e4:6b:55:dc:f6:91:12:e0:32:18: c3:8c:64:0f:f9:9e:ea:9c:a1:61:9b:9c:c6:5b:57:2c: d6:b5:bf:81:14:18:e4:cb:1b:39:76:0c:40:50:11:77: a1:6a:44:94:d3:fb:b1:61:87:3b:50:fb:5f:83:bb:4e: d2:75:8a:41:d6:21:1f:a7:b1:45:06:43:49:bf:f2:15: ad:eb:d8:ed:f1:b0:04:15:14:eb:ea:bd:28:b8:43:03: 3f:b6:55:2d:9c:44:7b:aa:2e:e2:3a:91:b0:43:cb:87: aa:2f:97:d7:5a:10:87:84:f1:17:7a:bc:25:b5:33:a8: 03:af:f5:37:ca:62:f1:ef:85:6b:32:57:11:7f:2d:2a: 8e:93:5f:1a:ce:ba:b6:31:bc:d3:99:44:40:a9:72:ab: 89:00:ee:53:9a:a7:37:46:52:28:bf:a0:d0:ec:10:4f: e8:85:2d:1f:ff:7c:93:f1:85:79:37:c4:c1:f9:82:96: d7:eb:b1:db:5f:e6:26:98:90:f4:a8:fe:f7:b1:cf:91: 34:43:a3:b5:d0:b1:ec:a7:25:fc:af:cb:cf:d0:b7:f1: 32:67:66:58:bd:52:3f:d5:0e:79:72:c7:8e:04:5d:57: ea:24:5c:e0:2e:a7:2b:2a:6e:fd:ad:39:29:9b:75:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:60:5d:94:3e:c1:aa:ec:d6:2d:52:57:e7:d0:ae:47: 62:66:12:1d:40:df:25:6b:75:13:fd:e2:98:64:13:b8: 3e:b8:bd:aa:30:91:8c:e2:5d:fa:96:f7:c1:1f:7b:e1: e2:a0:aa:48:1d:62:52:c0:56:2e:86:df:e4:1a:0d:7a: 66:f1:35:ec:da:f6:b0:15:91:4f:e9:79:02:49:70:09: 5f:c5:e9:f5:94:a4:db:04:d5:be:1b:48:c8:dc:7a:eb: 8e:aa:59:10:c1:55:fb:a0:36:97:a4:a6:a4:c8:f4:66: 92:5f:41:c7:62:a1:c1:76:c5:5d:82:d2:0c:20:71:c5: d5:92:ac:ab:55:f2:dd:00:6e:66:6d:69:56:4f:5f:67: a5:39:2f:9e:80:71:d7:45:93:34:63:14:fc:6d:fc:47: dc:aa:20:68:56:85:fa:c5:4f:b3:38:5e:50:e3:21:89: a6:63:1c:c3:e2:b1:3a:66:74:8a:a8:68:d1:8b:40:8f: f5:74:b3:a3:30:01:24:5a:9f:fc:f7:04:7b:2b:2b:9f: fe:12:ff:9b:e6:57:49:10:08:c4:7e:0f:7d:27:27:c7: f7:2e:3e:7e:2d:d1:9d:2b:39:59:df:2a:40:7e:50:e4: c6:81:65:74:de:d7:73:a0:f7:c8:39:6a:d2:c0:74:b1 Fingerprint (SHA-256): 00:83:43:31:E6:88:CF:93:FE:4D:89:21:68:03:38:F0:EB:7E:02:25:AB:FC:D4:1B:B1:51:6F:77:1F:FB:2C:C0 Fingerprint (SHA1): 83:34:62:13:FB:65:BC:9A:B0:D4:4B:E8:33:2D:41:B6:26:9B:D4:44 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5360: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043461 (0x6709cc5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Jan 08 10:09:34 2016 Not After : Fri Jan 08 10:09:34 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:b8:a8:7b:88:a2:9a:74:72:39:1b:d2:a4:6f:97:6f: c8:6c:ab:25:80:1f:a7:fe:16:e3:70:6e:30:9a:1e:a5: 5f:6d:ac:40:db:64:fd:08:b7:3f:b1:92:2a:f5:11:92: 1d:89:3f:e9:ae:3b:f3:2b:fe:d1:fe:18:02:b4:29:0a: 1b:9c:11:e0:1c:d3:3f:02:cf:15:04:66:ef:bc:d7:3d: 64:60:6b:a9:1b:31:6d:ea:e5:0e:91:8a:df:1f:7b:61: d3:65:9b:2b:f4:c3:29:ff:d6:40:b9:30:2f:3c:8c:4e: 5a:7f:84:ba:42:54:99:bf:dd:85:18:c5:d7:83:5c:ec: 37:11:a7:67:6b:2b:71:77:71:35:e5:37:4b:8d:5a:0d: 6a:f7:89:bf:80:cd:d5:4e:74:b2:0a:45:6b:6a:30:b5: 7f:90:90:59:b0:48:7b:c5:c3:92:56:8f:2f:75:8e:1f: 1c:b1:bd:c0:8f:18:8e:df:cf:17:6e:2c:7b:2a:2a:ce: 76:f3:b7:e3:a1:73:9a:0e:18:b0:26:fe:41:23:9a:9d: 66:9f:33:0d:ad:6b:b7:a4:06:20:a7:91:32:86:d5:0a: 62:93:25:e5:d0:6b:85:dc:ab:ff:59:5a:ed:ad:0b:97: 79:65:3d:59:d7:d1:d1:f6:a9:cd:76:44:2d:e7:6a:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:18:fd:a9:f6:0e:cf:c2:33:06:87:be:19:2a:00:54: 44:b5:82:e9:65:38:bc:21:f7:d6:9f:15:1d:2c:07:7f: 85:60:56:8b:c5:7f:5f:3a:31:48:4b:6a:15:d7:69:a1: 10:04:ff:e6:4b:9b:e2:96:a7:3b:c1:ee:7c:86:43:9b: db:f9:2d:54:f5:5a:69:b9:d9:e7:25:ee:5f:7f:50:94: fc:5c:e1:e0:82:34:c3:b0:99:03:1e:59:48:1c:c9:c1: df:cf:a4:dc:4e:cf:15:23:ef:82:48:2e:e9:7f:dc:3c: 2a:f1:ef:97:19:2b:67:bb:bf:c9:eb:cc:ea:f1:fc:ec: 13:77:1b:5f:d1:89:3b:ab:84:8d:82:60:f8:8c:38:89: 26:00:db:cd:a5:d5:01:4e:9f:09:5e:58:ff:e0:49:1a: 2c:cd:37:ce:69:bc:9a:1e:0b:30:36:c6:50:b7:19:e2: 42:cd:91:08:9d:f0:36:5c:64:07:5c:2a:36:6b:84:9d: f8:c7:b4:ce:f2:40:46:f9:fe:63:b7:2a:67:b4:58:2e: 61:99:ad:c3:dc:21:25:d1:a0:14:ad:35:78:19:a4:ad: b9:a1:93:2d:7d:d5:3f:81:8e:20:79:ff:b2:48:a5:b0: 56:61:02:c5:8d:c4:2a:c5:ea:27:c6:d7:99:6c:b0:4b Fingerprint (SHA-256): 75:96:1B:42:54:BB:F7:08:DB:A2:ED:B0:04:90:6B:26:69:AD:33:51:BB:06:9B:36:5C:5A:38:A1:57:40:AA:A8 Fingerprint (SHA1): BD:24:C8:34:4C:17:82:C0:8C:AD:95:6D:7E:D0:EE:3F:90:5C:A9:B7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5361: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5362: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043476 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5363: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5364: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5365: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5366: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108043477 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5367: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5368: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5369: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5370: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108043478 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5371: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5372: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5373: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5374: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108043479 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5375: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5376: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5377: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043476 (0x6709cd4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:11:02 2016 Not After : Fri Jan 08 10:11:02 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:ca:26:33:55:6d:e2:60:3b:96:53:94:18:a0:ec:90: ef:04:e6:f9:b2:18:50:15:97:27:30:67:02:aa:46:bd: 0c:aa:63:cf:df:1a:e2:4e:90:14:a3:7b:3f:ed:1b:af: 18:9a:47:93:52:ad:1e:9c:cd:3a:ae:b3:53:d5:e3:e5: 55:a2:5d:db:e1:48:77:14:96:23:ec:2b:60:cb:75:f6: a7:57:f9:fe:0e:36:fb:ca:6e:eb:10:7b:b1:16:9d:98: 93:ed:eb:76:40:26:dc:84:be:d4:61:2d:7c:b0:7c:b3: c2:fa:0a:c7:db:d8:27:22:b0:ff:f0:a4:14:82:18:d1: f2:6c:f8:31:89:33:b0:81:4b:70:1d:38:4a:6d:7f:4e: 1f:9f:53:c7:8c:fd:8b:07:6d:be:42:93:35:e2:5e:22: 12:99:ec:8c:61:a7:34:6b:17:a9:22:25:3d:d0:73:04: 51:82:8d:b2:bf:64:16:68:c2:1b:d7:71:c3:04:73:18: 2e:c1:ad:a7:89:a1:02:62:a1:6c:4b:43:0e:f9:86:cc: b2:23:11:1f:c7:4e:62:4b:f2:5d:ef:d1:6f:80:3b:6b: 2f:85:f4:0c:25:8b:ad:4b:58:3d:0a:35:70:6a:2d:38: 9d:d1:15:7a:39:8f:68:78:35:d4:14:2e:11:f0:e1:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:7c:fc:c5:1d:0b:41:d4:cf:ce:a0:80:df:bf:e2:98: ed:cc:dc:94:d4:8f:10:b5:a5:89:5f:d3:e4:da:83:36: df:1d:2c:86:60:71:cc:98:4f:71:33:0c:1c:21:e2:3b: c5:a4:2a:23:56:c6:7c:c7:60:c6:83:3d:a2:4e:8f:1a: 04:d9:f6:c9:2f:6f:74:d9:65:a0:ae:c2:99:b6:bc:25: e9:58:e6:e9:37:a8:33:3e:27:bf:58:29:a9:25:5e:7d: da:a3:65:b0:ac:e1:ea:a4:d0:bd:77:ba:67:45:03:c6: 10:a5:e6:80:fc:0e:b8:6d:e3:48:1a:b3:de:b0:13:6d: 7c:98:c2:91:5c:f6:9d:8a:87:12:ff:d9:fb:83:ef:49: 32:84:54:0b:31:0b:f4:33:53:3b:c7:e6:55:5b:ef:57: 4a:04:1c:47:e0:71:71:e1:15:ae:74:b1:1f:af:b8:3c: 6e:a0:a5:3b:2d:54:04:07:0c:dc:58:b8:e0:47:ca:14: d6:34:4a:1a:98:29:d0:4b:fd:a2:ac:37:fb:40:a0:9d: 2d:7e:42:56:ce:d8:24:c2:11:9c:f5:7a:45:0a:eb:6c: 5e:4b:e7:73:3d:ff:e5:55:56:72:62:b9:85:cc:4b:ad: b3:13:69:92:4e:76:39:e0:61:9b:a6:25:a1:8f:2b:26 Fingerprint (SHA-256): 0B:E6:4D:9E:EA:BA:B4:9D:D4:43:F4:AF:E3:E8:A8:22:36:FA:DB:C1:EB:11:03:8B:5E:E1:AB:B8:4D:A8:E1:9E Fingerprint (SHA1): DF:40:21:71:39:F8:0E:4B:B7:D5:C2:AF:90:AC:68:C3:17:D7:5D:EA Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5378: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5379: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043477 (0x6709cd5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:11:22 2016 Not After : Fri Jan 08 10:11:22 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:f9:9d:54:39:db:e9:54:52:32:1a:a6:09:87:f0:dc: 05:46:b9:e9:f3:75:e2:ec:7d:c0:0e:54:4c:2b:c5:ed: 5c:21:8f:f2:26:bb:04:e7:aa:4b:53:26:08:d9:61:45: 58:47:34:31:2c:3f:ce:ef:c6:7e:dd:7f:ea:ea:df:1b: 5c:59:92:38:ee:f3:58:89:a8:6c:66:d2:70:0b:e4:70: cb:d5:12:ee:7f:df:f3:39:d7:4d:27:fa:f0:fb:94:77: c0:e2:df:f4:54:99:e6:87:e9:17:ff:75:a3:3d:d6:8d: 31:bd:2a:ab:55:e1:6e:25:1b:a9:38:a3:5b:31:2c:2b: f9:8b:fe:69:2c:ba:39:55:62:4d:7e:b0:fe:81:ef:01: f5:e0:50:da:e4:95:7e:06:96:37:33:e6:08:e5:a6:df: c7:b6:f2:4c:99:81:32:7c:c0:fc:27:4b:18:21:b6:ec: 03:33:0d:45:14:2a:96:e2:0e:7f:db:67:44:16:a6:20: f4:bf:7d:2e:d1:3f:a8:4c:f6:32:53:fc:db:ab:73:cd: 2b:45:c7:ad:27:86:e2:9b:ec:21:c9:0b:5b:08:27:f1: cb:83:f4:aa:d9:10:7f:4f:a9:70:06:5e:8a:52:e3:d9: e7:e9:e1:50:29:9f:21:ad:51:03:d3:cf:37:9b:d4:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:4a:2a:13:74:ef:28:ab:62:06:d1:01:62:88:5a:71: d6:7e:20:b0:b4:ea:71:bf:e6:c1:cf:6c:74:35:9e:20: f2:12:a2:ce:8d:01:77:0b:97:7a:e3:f8:e5:2f:68:a8: a0:99:70:74:7d:7b:8c:99:f8:0b:bc:e0:df:61:de:27: 42:06:ce:70:d1:af:fb:9e:f0:7c:41:af:ab:17:a2:85: 43:7b:ca:57:58:4f:52:53:8b:f3:57:c4:7a:8b:20:04: 60:97:0a:3d:34:dd:66:fb:30:21:57:26:82:eb:35:3c: 21:1a:f7:3d:a7:ee:96:b3:a1:91:4c:9d:da:3c:04:ca: 25:63:e2:42:9a:cf:e2:82:c5:29:79:09:43:56:54:96: bc:42:aa:10:d9:cf:7f:89:3d:dd:b4:24:0b:c2:07:dd: e9:fa:6f:81:4e:68:51:ea:f0:aa:6f:69:ed:58:68:1f: bd:f0:fe:b0:0d:27:36:19:47:16:44:d4:97:20:60:d9: f8:69:4f:f6:e5:71:ff:f5:c8:76:73:3a:1d:b2:06:35: 92:5a:3f:f2:63:e4:f5:02:43:3c:2c:4c:03:fc:86:45: 0b:d2:17:31:c7:66:3d:7e:64:24:79:32:81:28:d3:30: fa:d6:6d:dc:5e:eb:1f:d6:fb:34:e8:60:a8:db:98:c3 Fingerprint (SHA-256): 84:7E:B8:F3:89:BC:FD:EA:FC:80:DB:20:00:50:18:91:06:73:4B:18:11:A1:AC:86:9A:E5:3D:6B:99:14:9F:92 Fingerprint (SHA1): 2E:BB:39:47:32:41:54:93:0C:17:1D:FB:88:68:CA:7E:9F:2D:CB:EC Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5380: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5381: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043478 (0x6709cd6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 10:11:37 2016 Not After : Fri Jan 08 10:11:37 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:cc:48:24:ce:fd:8a:62:45:02:17:8d:aa:74:e1:66: bf:cc:da:8e:dc:a6:41:12:cd:15:01:2b:0d:48:56:92: 1e:fc:66:3d:d2:e3:4e:96:f6:10:f2:95:d0:d7:66:7b: f8:e5:84:83:88:c1:90:2a:07:28:dc:3d:6a:85:09:22: bb:ac:f0:df:9f:e9:30:b7:b6:c5:08:14:1c:18:9e:4a: 29:99:9a:15:39:a0:a0:9a:05:4f:36:81:58:bd:b5:05: ab:dd:a6:c2:cf:00:87:74:56:61:bb:ae:2a:50:1c:62: c7:97:3b:4f:4e:0e:0b:8c:4f:8d:77:92:88:15:53:01: be:ae:dd:db:77:43:43:a7:00:72:c8:64:de:aa:fd:7c: 17:06:d8:22:88:45:61:5e:da:fb:59:73:26:cd:82:9d: 62:58:b3:b3:43:7f:6b:71:af:fb:eb:b6:87:5b:13:b6: 30:84:af:9f:00:dc:c4:d4:b6:3a:f9:05:06:5a:25:70: 72:e4:14:54:83:fc:0f:5e:c9:d1:56:14:60:e4:1d:3e: 49:8f:a6:99:81:10:97:62:b3:77:8b:58:22:c3:e6:6d: de:7e:e7:1f:f8:92:d0:de:c9:46:e0:db:d2:ca:5f:6a: 0b:d8:dc:16:b4:a4:a2:23:d5:cb:87:ad:f9:8e:4d:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:1f:7f:98:6d:53:19:65:cc:e3:02:27:09:ae:70:e2: b9:ba:70:12:d2:66:c0:12:1b:c1:35:76:32:8c:d8:e7: 5b:df:26:f4:7b:62:87:e7:98:d9:38:e1:af:e7:51:ec: 65:03:49:c2:b5:2a:84:91:04:fa:8f:fe:4d:4c:93:8c: 47:bb:57:2e:17:95:fd:0c:5e:da:fa:35:a5:07:28:f8: 42:05:1d:00:c9:e0:3d:1d:ff:40:18:53:80:3f:64:5a: bb:d4:f4:d6:2b:10:52:c7:35:58:f7:27:d0:fb:af:09: 2e:da:6c:55:04:a8:6e:ed:ae:10:a7:9e:ad:db:bf:af: 82:bf:1f:a8:04:08:79:90:ba:07:12:b5:f3:83:9d:c6: d2:f6:c8:6e:78:52:99:d0:ba:47:79:5e:0c:6e:8d:9b: c0:47:4b:48:68:82:e8:4e:31:80:b0:f7:7e:df:94:79: b2:c1:5f:e2:56:88:e0:c4:bb:c6:d8:8b:57:42:c7:fc: df:e3:79:e9:f9:49:bf:fb:6e:b1:19:62:12:3a:ed:11: 80:c8:69:3a:31:0c:9d:e2:e3:f5:d6:de:62:c8:d6:c4: 52:cf:9c:f9:89:35:6e:5a:df:2c:fd:f9:06:f7:8e:9c: fa:77:57:56:36:8b:ef:78:bf:9a:d5:6f:28:26:fd:1c Fingerprint (SHA-256): EC:A3:5A:E1:A6:FE:F9:8E:9F:23:97:91:7E:C2:3A:8F:FF:4D:DA:3F:11:94:99:2E:86:43:63:1F:A2:34:38:10 Fingerprint (SHA1): FB:74:2F:D8:CA:66:28:8D:C1:AF:05:6C:41:52:0D:C2:28:32:E3:5B Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5382: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5383: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5384: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5385: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5386: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043476 (0x6709cd4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:11:02 2016 Not After : Fri Jan 08 10:11:02 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:ca:26:33:55:6d:e2:60:3b:96:53:94:18:a0:ec:90: ef:04:e6:f9:b2:18:50:15:97:27:30:67:02:aa:46:bd: 0c:aa:63:cf:df:1a:e2:4e:90:14:a3:7b:3f:ed:1b:af: 18:9a:47:93:52:ad:1e:9c:cd:3a:ae:b3:53:d5:e3:e5: 55:a2:5d:db:e1:48:77:14:96:23:ec:2b:60:cb:75:f6: a7:57:f9:fe:0e:36:fb:ca:6e:eb:10:7b:b1:16:9d:98: 93:ed:eb:76:40:26:dc:84:be:d4:61:2d:7c:b0:7c:b3: c2:fa:0a:c7:db:d8:27:22:b0:ff:f0:a4:14:82:18:d1: f2:6c:f8:31:89:33:b0:81:4b:70:1d:38:4a:6d:7f:4e: 1f:9f:53:c7:8c:fd:8b:07:6d:be:42:93:35:e2:5e:22: 12:99:ec:8c:61:a7:34:6b:17:a9:22:25:3d:d0:73:04: 51:82:8d:b2:bf:64:16:68:c2:1b:d7:71:c3:04:73:18: 2e:c1:ad:a7:89:a1:02:62:a1:6c:4b:43:0e:f9:86:cc: b2:23:11:1f:c7:4e:62:4b:f2:5d:ef:d1:6f:80:3b:6b: 2f:85:f4:0c:25:8b:ad:4b:58:3d:0a:35:70:6a:2d:38: 9d:d1:15:7a:39:8f:68:78:35:d4:14:2e:11:f0:e1:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:7c:fc:c5:1d:0b:41:d4:cf:ce:a0:80:df:bf:e2:98: ed:cc:dc:94:d4:8f:10:b5:a5:89:5f:d3:e4:da:83:36: df:1d:2c:86:60:71:cc:98:4f:71:33:0c:1c:21:e2:3b: c5:a4:2a:23:56:c6:7c:c7:60:c6:83:3d:a2:4e:8f:1a: 04:d9:f6:c9:2f:6f:74:d9:65:a0:ae:c2:99:b6:bc:25: e9:58:e6:e9:37:a8:33:3e:27:bf:58:29:a9:25:5e:7d: da:a3:65:b0:ac:e1:ea:a4:d0:bd:77:ba:67:45:03:c6: 10:a5:e6:80:fc:0e:b8:6d:e3:48:1a:b3:de:b0:13:6d: 7c:98:c2:91:5c:f6:9d:8a:87:12:ff:d9:fb:83:ef:49: 32:84:54:0b:31:0b:f4:33:53:3b:c7:e6:55:5b:ef:57: 4a:04:1c:47:e0:71:71:e1:15:ae:74:b1:1f:af:b8:3c: 6e:a0:a5:3b:2d:54:04:07:0c:dc:58:b8:e0:47:ca:14: d6:34:4a:1a:98:29:d0:4b:fd:a2:ac:37:fb:40:a0:9d: 2d:7e:42:56:ce:d8:24:c2:11:9c:f5:7a:45:0a:eb:6c: 5e:4b:e7:73:3d:ff:e5:55:56:72:62:b9:85:cc:4b:ad: b3:13:69:92:4e:76:39:e0:61:9b:a6:25:a1:8f:2b:26 Fingerprint (SHA-256): 0B:E6:4D:9E:EA:BA:B4:9D:D4:43:F4:AF:E3:E8:A8:22:36:FA:DB:C1:EB:11:03:8B:5E:E1:AB:B8:4D:A8:E1:9E Fingerprint (SHA1): DF:40:21:71:39:F8:0E:4B:B7:D5:C2:AF:90:AC:68:C3:17:D7:5D:EA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5387: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5388: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043477 (0x6709cd5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:11:22 2016 Not After : Fri Jan 08 10:11:22 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:f9:9d:54:39:db:e9:54:52:32:1a:a6:09:87:f0:dc: 05:46:b9:e9:f3:75:e2:ec:7d:c0:0e:54:4c:2b:c5:ed: 5c:21:8f:f2:26:bb:04:e7:aa:4b:53:26:08:d9:61:45: 58:47:34:31:2c:3f:ce:ef:c6:7e:dd:7f:ea:ea:df:1b: 5c:59:92:38:ee:f3:58:89:a8:6c:66:d2:70:0b:e4:70: cb:d5:12:ee:7f:df:f3:39:d7:4d:27:fa:f0:fb:94:77: c0:e2:df:f4:54:99:e6:87:e9:17:ff:75:a3:3d:d6:8d: 31:bd:2a:ab:55:e1:6e:25:1b:a9:38:a3:5b:31:2c:2b: f9:8b:fe:69:2c:ba:39:55:62:4d:7e:b0:fe:81:ef:01: f5:e0:50:da:e4:95:7e:06:96:37:33:e6:08:e5:a6:df: c7:b6:f2:4c:99:81:32:7c:c0:fc:27:4b:18:21:b6:ec: 03:33:0d:45:14:2a:96:e2:0e:7f:db:67:44:16:a6:20: f4:bf:7d:2e:d1:3f:a8:4c:f6:32:53:fc:db:ab:73:cd: 2b:45:c7:ad:27:86:e2:9b:ec:21:c9:0b:5b:08:27:f1: cb:83:f4:aa:d9:10:7f:4f:a9:70:06:5e:8a:52:e3:d9: e7:e9:e1:50:29:9f:21:ad:51:03:d3:cf:37:9b:d4:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:4a:2a:13:74:ef:28:ab:62:06:d1:01:62:88:5a:71: d6:7e:20:b0:b4:ea:71:bf:e6:c1:cf:6c:74:35:9e:20: f2:12:a2:ce:8d:01:77:0b:97:7a:e3:f8:e5:2f:68:a8: a0:99:70:74:7d:7b:8c:99:f8:0b:bc:e0:df:61:de:27: 42:06:ce:70:d1:af:fb:9e:f0:7c:41:af:ab:17:a2:85: 43:7b:ca:57:58:4f:52:53:8b:f3:57:c4:7a:8b:20:04: 60:97:0a:3d:34:dd:66:fb:30:21:57:26:82:eb:35:3c: 21:1a:f7:3d:a7:ee:96:b3:a1:91:4c:9d:da:3c:04:ca: 25:63:e2:42:9a:cf:e2:82:c5:29:79:09:43:56:54:96: bc:42:aa:10:d9:cf:7f:89:3d:dd:b4:24:0b:c2:07:dd: e9:fa:6f:81:4e:68:51:ea:f0:aa:6f:69:ed:58:68:1f: bd:f0:fe:b0:0d:27:36:19:47:16:44:d4:97:20:60:d9: f8:69:4f:f6:e5:71:ff:f5:c8:76:73:3a:1d:b2:06:35: 92:5a:3f:f2:63:e4:f5:02:43:3c:2c:4c:03:fc:86:45: 0b:d2:17:31:c7:66:3d:7e:64:24:79:32:81:28:d3:30: fa:d6:6d:dc:5e:eb:1f:d6:fb:34:e8:60:a8:db:98:c3 Fingerprint (SHA-256): 84:7E:B8:F3:89:BC:FD:EA:FC:80:DB:20:00:50:18:91:06:73:4B:18:11:A1:AC:86:9A:E5:3D:6B:99:14:9F:92 Fingerprint (SHA1): 2E:BB:39:47:32:41:54:93:0C:17:1D:FB:88:68:CA:7E:9F:2D:CB:EC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5389: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5390: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043478 (0x6709cd6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 10:11:37 2016 Not After : Fri Jan 08 10:11:37 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:cc:48:24:ce:fd:8a:62:45:02:17:8d:aa:74:e1:66: bf:cc:da:8e:dc:a6:41:12:cd:15:01:2b:0d:48:56:92: 1e:fc:66:3d:d2:e3:4e:96:f6:10:f2:95:d0:d7:66:7b: f8:e5:84:83:88:c1:90:2a:07:28:dc:3d:6a:85:09:22: bb:ac:f0:df:9f:e9:30:b7:b6:c5:08:14:1c:18:9e:4a: 29:99:9a:15:39:a0:a0:9a:05:4f:36:81:58:bd:b5:05: ab:dd:a6:c2:cf:00:87:74:56:61:bb:ae:2a:50:1c:62: c7:97:3b:4f:4e:0e:0b:8c:4f:8d:77:92:88:15:53:01: be:ae:dd:db:77:43:43:a7:00:72:c8:64:de:aa:fd:7c: 17:06:d8:22:88:45:61:5e:da:fb:59:73:26:cd:82:9d: 62:58:b3:b3:43:7f:6b:71:af:fb:eb:b6:87:5b:13:b6: 30:84:af:9f:00:dc:c4:d4:b6:3a:f9:05:06:5a:25:70: 72:e4:14:54:83:fc:0f:5e:c9:d1:56:14:60:e4:1d:3e: 49:8f:a6:99:81:10:97:62:b3:77:8b:58:22:c3:e6:6d: de:7e:e7:1f:f8:92:d0:de:c9:46:e0:db:d2:ca:5f:6a: 0b:d8:dc:16:b4:a4:a2:23:d5:cb:87:ad:f9:8e:4d:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:1f:7f:98:6d:53:19:65:cc:e3:02:27:09:ae:70:e2: b9:ba:70:12:d2:66:c0:12:1b:c1:35:76:32:8c:d8:e7: 5b:df:26:f4:7b:62:87:e7:98:d9:38:e1:af:e7:51:ec: 65:03:49:c2:b5:2a:84:91:04:fa:8f:fe:4d:4c:93:8c: 47:bb:57:2e:17:95:fd:0c:5e:da:fa:35:a5:07:28:f8: 42:05:1d:00:c9:e0:3d:1d:ff:40:18:53:80:3f:64:5a: bb:d4:f4:d6:2b:10:52:c7:35:58:f7:27:d0:fb:af:09: 2e:da:6c:55:04:a8:6e:ed:ae:10:a7:9e:ad:db:bf:af: 82:bf:1f:a8:04:08:79:90:ba:07:12:b5:f3:83:9d:c6: d2:f6:c8:6e:78:52:99:d0:ba:47:79:5e:0c:6e:8d:9b: c0:47:4b:48:68:82:e8:4e:31:80:b0:f7:7e:df:94:79: b2:c1:5f:e2:56:88:e0:c4:bb:c6:d8:8b:57:42:c7:fc: df:e3:79:e9:f9:49:bf:fb:6e:b1:19:62:12:3a:ed:11: 80:c8:69:3a:31:0c:9d:e2:e3:f5:d6:de:62:c8:d6:c4: 52:cf:9c:f9:89:35:6e:5a:df:2c:fd:f9:06:f7:8e:9c: fa:77:57:56:36:8b:ef:78:bf:9a:d5:6f:28:26:fd:1c Fingerprint (SHA-256): EC:A3:5A:E1:A6:FE:F9:8E:9F:23:97:91:7E:C2:3A:8F:FF:4D:DA:3F:11:94:99:2E:86:43:63:1F:A2:34:38:10 Fingerprint (SHA1): FB:74:2F:D8:CA:66:28:8D:C1:AF:05:6C:41:52:0D:C2:28:32:E3:5B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5391: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5392: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5393: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043480 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5394: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5395: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5396: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5397: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108043481 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5398: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5399: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5400: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5401: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108043482 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5402: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5403: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #5404: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5405: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108043483 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5406: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5407: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #5408: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5409: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108043484 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5410: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5411: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5412: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043480 (0x6709cd8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:11:57 2016 Not After : Fri Jan 08 10:11:57 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:f0:36:87:be:15:06:8f:48:84:97:1b:ab:b6:1b:25: a4:d9:18:e8:98:c3:08:9f:71:c1:7d:71:17:6a:24:4d: a1:62:36:de:85:69:a7:ee:07:e5:e4:ba:52:d2:93:34: 99:cd:7b:83:5d:fa:9e:9e:23:18:ea:6a:5d:a2:b3:85: 41:6d:85:94:f5:b5:11:09:15:8d:bc:b0:ba:7e:d0:54: 05:a7:26:18:e5:ec:1a:21:a0:6e:e3:79:d7:80:18:d6: 22:c2:2f:8c:44:60:24:10:5f:3b:fa:db:6e:23:fe:27: 40:a3:96:4c:93:99:1e:b8:02:c9:c8:a7:00:77:30:a5: 89:98:30:4d:5b:24:36:3a:ec:6c:14:48:97:2c:18:ef: ac:6b:c3:49:92:8d:e3:41:a4:a5:d2:62:dc:c0:83:f8: d4:b8:dd:5f:77:b1:b5:b7:29:b3:c7:2c:6f:ca:9a:d0: c8:00:07:46:da:c4:63:de:45:ae:ab:90:fa:57:83:52: 43:10:fc:52:64:bf:e9:dc:4b:59:04:92:90:15:13:eb: a3:cf:38:c1:01:4d:4c:53:2e:d6:f4:c3:6d:0a:38:fe: 88:fa:52:9d:a9:8a:29:8e:00:0d:ea:33:01:cc:73:ff: 4b:86:e1:cc:be:54:67:9f:44:e6:70:4a:5a:b9:ad:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:46:c3:65:ce:50:41:8c:97:d3:da:4a:77:ee:7d:69: 32:03:87:6f:b0:0e:f5:60:b3:2d:67:15:f6:e2:f3:7c: 6c:6d:7f:34:47:fa:23:d3:36:76:de:1f:de:9e:e9:d6: 16:83:90:b9:8f:df:57:c1:07:f1:f7:4c:7c:5d:df:bd: 23:27:d2:97:f4:56:d9:b1:da:88:7e:6b:89:ec:bf:55: 74:50:c9:95:5b:29:c3:86:17:f1:2c:61:c2:1e:0e:e1: f5:25:95:49:af:96:b6:3f:3c:e1:88:fb:a0:16:cc:31: 3d:0b:57:96:53:92:c0:25:1b:22:38:7a:a9:ba:81:2e: 4e:de:ea:25:fd:9a:65:a2:a1:6f:57:6b:b6:2c:8e:b7: 6f:aa:4d:3e:ee:3e:55:39:73:4e:33:cf:05:0f:ee:d9: 73:75:28:84:4c:c1:81:00:19:6c:96:d3:05:8b:3f:e2: 74:cf:da:b2:d5:75:05:4a:27:91:82:7a:ba:e6:be:9f: 2a:20:9b:da:ad:9c:60:7d:b1:52:17:b8:bb:48:ca:81: db:b1:67:52:9c:71:72:ad:25:84:b5:1d:cc:f9:0b:a1: 32:03:e3:e3:7e:51:5e:d4:28:55:2b:65:8d:1c:aa:56: 1a:3c:12:e5:f6:27:4d:5f:3f:65:a0:d3:8a:8d:21:bc Fingerprint (SHA-256): F0:04:CA:A4:D3:40:07:37:11:0B:42:15:21:67:15:E1:56:15:51:07:6F:C0:54:94:E5:73:23:3E:C0:1A:99:D4 Fingerprint (SHA1): A4:3E:23:62:62:3A:68:B2:76:87:1D:A6:29:47:CF:50:CF:47:D7:21 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5413: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5414: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043481 (0x6709cd9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:12:07 2016 Not After : Fri Jan 08 10:12:07 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:aa:a0:ac:12:1a:c4:5c:3b:34:41:30:e0:e8:44:9f: b3:54:dd:99:0d:e7:d1:81:bd:68:b3:a0:6b:c2:ee:60: 4d:a1:1e:f3:73:f0:b3:07:75:1d:6b:d1:6b:b7:15:a8: 7c:0a:13:0e:2f:ad:93:68:45:60:83:93:ef:b7:85:2a: 9a:81:d5:ca:99:1b:e9:50:d4:84:f1:5d:0d:71:07:ff: 64:ab:58:46:74:62:bc:7d:d6:85:6d:38:02:76:8d:5f: ba:9f:ca:9d:76:7b:58:c6:37:41:f4:45:ae:77:d8:51: 04:ad:7e:b1:09:2a:af:d7:0c:3d:81:cd:40:96:f0:d0: a5:12:16:d7:a0:da:78:96:61:0a:43:07:5d:5d:6a:00: de:d9:9c:6a:e2:aa:8c:ee:fd:aa:3d:89:85:d7:16:56: af:d3:c9:2a:38:9d:0c:b6:0d:8c:0d:c4:49:c6:3c:94: b3:b1:77:05:6e:4a:5b:13:c7:b2:84:5d:93:09:71:52: 82:f0:8d:fc:c5:08:a3:74:f1:df:71:f4:ec:72:2b:39: e6:09:50:4b:5e:61:d6:ee:8c:da:e0:0e:82:49:5c:c4: 5f:1a:e0:02:90:a6:a6:1a:1a:16:f1:71:00:57:dd:7b: e4:fd:15:1c:cb:b2:e4:88:2e:d3:cb:7b:fe:f8:cf:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:35:eb:cc:fb:82:b3:5a:59:ef:8e:dd:7b:68:6c:43: 52:4d:40:e3:00:df:cc:16:4a:3c:55:f2:f3:13:e3:9a: 88:45:4a:a7:6e:3f:0b:6f:69:17:d6:87:16:89:80:dd: b3:b7:49:3e:58:58:13:c8:9d:93:8c:d5:e1:82:f6:a4: 17:ac:c6:40:46:05:9a:4c:dd:2b:f4:94:43:2c:df:61: fb:56:f6:a2:e1:8a:45:3e:a3:4b:2e:82:bb:f4:16:5c: 22:b5:86:4a:7e:94:d7:e8:d2:ac:6a:1d:c4:49:63:ed: 43:b6:2f:aa:2c:4b:d6:24:d1:58:b8:01:d5:2e:10:d8: b4:fc:68:27:20:f0:db:ef:7e:6a:ad:31:93:c5:92:bb: 25:08:87:aa:da:4d:30:70:9e:c9:08:6b:ed:a1:16:6a: ba:e2:dd:0e:33:89:ce:93:ca:0c:13:ec:88:d6:01:36: 8b:17:f5:49:27:e2:30:49:56:d4:06:30:10:5e:4b:ab: ad:fb:d0:fd:9b:14:ad:54:f5:73:d5:18:37:0a:c0:de: 93:e0:f8:2d:da:5f:36:f8:84:06:4f:d8:6a:d7:0b:c5: 1f:3f:6c:24:5b:ac:81:1d:39:43:ec:de:fb:0e:d2:13: ee:db:2d:63:20:86:4a:a5:02:37:ac:50:31:a9:54:fc Fingerprint (SHA-256): 6A:D1:40:7D:C3:FF:7E:9D:18:BA:DA:3A:1F:49:8E:3F:66:0A:0A:AB:CF:77:81:08:B1:21:F0:B4:69:15:D4:FE Fingerprint (SHA1): AF:DC:10:0F:16:8A:5B:4F:D9:09:ED:BB:56:0A:27:86:9F:51:73:CF Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5415: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5416: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043482 (0x6709cda) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 10:12:11 2016 Not After : Fri Jan 08 10:12:11 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:37:4b:20:50:3b:9b:a5:e8:61:f2:02:87:66:6b:38: 4e:2f:ef:68:7d:8d:5a:7d:9a:57:e5:46:d9:fe:94:89: 38:a6:2f:9b:a7:9a:77:5e:42:e3:99:c3:d1:0d:ef:69: 37:a4:43:d9:51:b6:a2:e1:4b:bd:93:43:b2:49:4e:3e: 11:24:c7:8a:ff:cf:38:fd:7a:0f:4a:7a:48:3a:ba:b4: 37:27:34:d7:b7:b9:db:87:59:fc:b5:3f:b0:8a:77:59: 93:de:b6:ae:65:3e:a9:54:70:1a:10:0e:94:93:f3:08: 57:d8:4d:6f:15:0e:63:79:d5:be:ed:aa:67:2e:19:33: 0a:40:a8:c0:84:ba:01:6c:e5:f2:9a:c2:13:36:ea:89: 4b:da:b2:19:03:39:2a:9a:56:14:ef:06:ff:5f:a0:f1: 26:2e:cf:c2:09:af:f2:5a:7c:a8:a0:af:8b:98:53:72: e8:38:88:df:78:e0:c0:03:92:8b:72:c9:cc:da:01:63: 1e:2e:69:cf:f8:b7:7e:00:33:44:64:72:a7:af:4f:7c: eb:09:be:95:94:c3:84:51:1e:0e:4b:e3:db:c8:1a:d1: 1e:f1:80:0d:8d:51:fd:b0:bd:e9:bf:aa:61:1f:01:4a: 53:f8:56:10:80:dc:a8:e0:4d:0c:b6:94:7c:67:e0:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:34:c7:42:06:3e:94:88:63:16:55:b0:e7:c1:98:de: 19:45:78:6c:87:62:9a:c4:57:53:2b:40:e0:3a:71:70: 86:cf:24:eb:0d:32:49:3d:17:da:5e:e2:78:b0:4f:c0: b0:60:9a:98:ea:ed:34:d2:f0:e6:76:dd:7c:f8:97:16: 6c:dc:51:e1:7f:9d:ff:5f:80:3b:0d:16:ef:44:62:0d: f1:0b:4c:64:e9:31:8b:57:02:a6:24:33:6c:11:77:b9: d7:b3:8c:f7:f7:df:2a:77:d0:5a:29:c7:52:2e:95:83: 8b:52:b4:6b:09:61:8f:4b:2b:3f:d1:ad:a9:0d:bd:4f: 55:ea:8b:af:2d:48:42:10:36:fb:e9:b1:de:51:0a:9f: 58:bb:bf:c6:81:6c:29:b0:ba:ae:b1:16:8d:b9:14:1d: 0c:8d:b8:bc:f0:57:fe:00:0c:65:7c:92:b5:94:b9:26: 83:1f:e9:38:ca:58:eb:91:1d:ca:1e:52:2d:2d:f5:ea: d5:93:0b:93:a8:60:bd:73:b6:4f:1f:d7:50:9a:c2:41: 71:e4:f7:c9:97:1d:9e:6a:ae:4a:58:d5:e8:59:c2:d3: 51:7d:01:27:8a:ad:c9:9b:67:45:5a:14:4c:9b:c7:17: 54:df:c4:b0:9c:00:46:8d:68:f8:64:3a:f1:09:24:53 Fingerprint (SHA-256): 2C:5E:5E:D9:32:1D:D1:76:7C:E5:15:13:04:C2:4C:7F:A3:DE:00:2E:03:F4:A9:4C:A2:1F:E6:33:1B:FB:F6:80 Fingerprint (SHA1): 60:5F:24:8E:02:FD:B8:90:C8:A6:A6:5B:D8:3A:81:41:F1:E5:1C:A6 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #5417: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5418: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5419: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5420: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5421: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043480 (0x6709cd8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:11:57 2016 Not After : Fri Jan 08 10:11:57 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:f0:36:87:be:15:06:8f:48:84:97:1b:ab:b6:1b:25: a4:d9:18:e8:98:c3:08:9f:71:c1:7d:71:17:6a:24:4d: a1:62:36:de:85:69:a7:ee:07:e5:e4:ba:52:d2:93:34: 99:cd:7b:83:5d:fa:9e:9e:23:18:ea:6a:5d:a2:b3:85: 41:6d:85:94:f5:b5:11:09:15:8d:bc:b0:ba:7e:d0:54: 05:a7:26:18:e5:ec:1a:21:a0:6e:e3:79:d7:80:18:d6: 22:c2:2f:8c:44:60:24:10:5f:3b:fa:db:6e:23:fe:27: 40:a3:96:4c:93:99:1e:b8:02:c9:c8:a7:00:77:30:a5: 89:98:30:4d:5b:24:36:3a:ec:6c:14:48:97:2c:18:ef: ac:6b:c3:49:92:8d:e3:41:a4:a5:d2:62:dc:c0:83:f8: d4:b8:dd:5f:77:b1:b5:b7:29:b3:c7:2c:6f:ca:9a:d0: c8:00:07:46:da:c4:63:de:45:ae:ab:90:fa:57:83:52: 43:10:fc:52:64:bf:e9:dc:4b:59:04:92:90:15:13:eb: a3:cf:38:c1:01:4d:4c:53:2e:d6:f4:c3:6d:0a:38:fe: 88:fa:52:9d:a9:8a:29:8e:00:0d:ea:33:01:cc:73:ff: 4b:86:e1:cc:be:54:67:9f:44:e6:70:4a:5a:b9:ad:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:46:c3:65:ce:50:41:8c:97:d3:da:4a:77:ee:7d:69: 32:03:87:6f:b0:0e:f5:60:b3:2d:67:15:f6:e2:f3:7c: 6c:6d:7f:34:47:fa:23:d3:36:76:de:1f:de:9e:e9:d6: 16:83:90:b9:8f:df:57:c1:07:f1:f7:4c:7c:5d:df:bd: 23:27:d2:97:f4:56:d9:b1:da:88:7e:6b:89:ec:bf:55: 74:50:c9:95:5b:29:c3:86:17:f1:2c:61:c2:1e:0e:e1: f5:25:95:49:af:96:b6:3f:3c:e1:88:fb:a0:16:cc:31: 3d:0b:57:96:53:92:c0:25:1b:22:38:7a:a9:ba:81:2e: 4e:de:ea:25:fd:9a:65:a2:a1:6f:57:6b:b6:2c:8e:b7: 6f:aa:4d:3e:ee:3e:55:39:73:4e:33:cf:05:0f:ee:d9: 73:75:28:84:4c:c1:81:00:19:6c:96:d3:05:8b:3f:e2: 74:cf:da:b2:d5:75:05:4a:27:91:82:7a:ba:e6:be:9f: 2a:20:9b:da:ad:9c:60:7d:b1:52:17:b8:bb:48:ca:81: db:b1:67:52:9c:71:72:ad:25:84:b5:1d:cc:f9:0b:a1: 32:03:e3:e3:7e:51:5e:d4:28:55:2b:65:8d:1c:aa:56: 1a:3c:12:e5:f6:27:4d:5f:3f:65:a0:d3:8a:8d:21:bc Fingerprint (SHA-256): F0:04:CA:A4:D3:40:07:37:11:0B:42:15:21:67:15:E1:56:15:51:07:6F:C0:54:94:E5:73:23:3E:C0:1A:99:D4 Fingerprint (SHA1): A4:3E:23:62:62:3A:68:B2:76:87:1D:A6:29:47:CF:50:CF:47:D7:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5422: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5423: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043481 (0x6709cd9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:12:07 2016 Not After : Fri Jan 08 10:12:07 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:aa:a0:ac:12:1a:c4:5c:3b:34:41:30:e0:e8:44:9f: b3:54:dd:99:0d:e7:d1:81:bd:68:b3:a0:6b:c2:ee:60: 4d:a1:1e:f3:73:f0:b3:07:75:1d:6b:d1:6b:b7:15:a8: 7c:0a:13:0e:2f:ad:93:68:45:60:83:93:ef:b7:85:2a: 9a:81:d5:ca:99:1b:e9:50:d4:84:f1:5d:0d:71:07:ff: 64:ab:58:46:74:62:bc:7d:d6:85:6d:38:02:76:8d:5f: ba:9f:ca:9d:76:7b:58:c6:37:41:f4:45:ae:77:d8:51: 04:ad:7e:b1:09:2a:af:d7:0c:3d:81:cd:40:96:f0:d0: a5:12:16:d7:a0:da:78:96:61:0a:43:07:5d:5d:6a:00: de:d9:9c:6a:e2:aa:8c:ee:fd:aa:3d:89:85:d7:16:56: af:d3:c9:2a:38:9d:0c:b6:0d:8c:0d:c4:49:c6:3c:94: b3:b1:77:05:6e:4a:5b:13:c7:b2:84:5d:93:09:71:52: 82:f0:8d:fc:c5:08:a3:74:f1:df:71:f4:ec:72:2b:39: e6:09:50:4b:5e:61:d6:ee:8c:da:e0:0e:82:49:5c:c4: 5f:1a:e0:02:90:a6:a6:1a:1a:16:f1:71:00:57:dd:7b: e4:fd:15:1c:cb:b2:e4:88:2e:d3:cb:7b:fe:f8:cf:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:35:eb:cc:fb:82:b3:5a:59:ef:8e:dd:7b:68:6c:43: 52:4d:40:e3:00:df:cc:16:4a:3c:55:f2:f3:13:e3:9a: 88:45:4a:a7:6e:3f:0b:6f:69:17:d6:87:16:89:80:dd: b3:b7:49:3e:58:58:13:c8:9d:93:8c:d5:e1:82:f6:a4: 17:ac:c6:40:46:05:9a:4c:dd:2b:f4:94:43:2c:df:61: fb:56:f6:a2:e1:8a:45:3e:a3:4b:2e:82:bb:f4:16:5c: 22:b5:86:4a:7e:94:d7:e8:d2:ac:6a:1d:c4:49:63:ed: 43:b6:2f:aa:2c:4b:d6:24:d1:58:b8:01:d5:2e:10:d8: b4:fc:68:27:20:f0:db:ef:7e:6a:ad:31:93:c5:92:bb: 25:08:87:aa:da:4d:30:70:9e:c9:08:6b:ed:a1:16:6a: ba:e2:dd:0e:33:89:ce:93:ca:0c:13:ec:88:d6:01:36: 8b:17:f5:49:27:e2:30:49:56:d4:06:30:10:5e:4b:ab: ad:fb:d0:fd:9b:14:ad:54:f5:73:d5:18:37:0a:c0:de: 93:e0:f8:2d:da:5f:36:f8:84:06:4f:d8:6a:d7:0b:c5: 1f:3f:6c:24:5b:ac:81:1d:39:43:ec:de:fb:0e:d2:13: ee:db:2d:63:20:86:4a:a5:02:37:ac:50:31:a9:54:fc Fingerprint (SHA-256): 6A:D1:40:7D:C3:FF:7E:9D:18:BA:DA:3A:1F:49:8E:3F:66:0A:0A:AB:CF:77:81:08:B1:21:F0:B4:69:15:D4:FE Fingerprint (SHA1): AF:DC:10:0F:16:8A:5B:4F:D9:09:ED:BB:56:0A:27:86:9F:51:73:CF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5424: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5425: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043482 (0x6709cda) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 10:12:11 2016 Not After : Fri Jan 08 10:12:11 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:37:4b:20:50:3b:9b:a5:e8:61:f2:02:87:66:6b:38: 4e:2f:ef:68:7d:8d:5a:7d:9a:57:e5:46:d9:fe:94:89: 38:a6:2f:9b:a7:9a:77:5e:42:e3:99:c3:d1:0d:ef:69: 37:a4:43:d9:51:b6:a2:e1:4b:bd:93:43:b2:49:4e:3e: 11:24:c7:8a:ff:cf:38:fd:7a:0f:4a:7a:48:3a:ba:b4: 37:27:34:d7:b7:b9:db:87:59:fc:b5:3f:b0:8a:77:59: 93:de:b6:ae:65:3e:a9:54:70:1a:10:0e:94:93:f3:08: 57:d8:4d:6f:15:0e:63:79:d5:be:ed:aa:67:2e:19:33: 0a:40:a8:c0:84:ba:01:6c:e5:f2:9a:c2:13:36:ea:89: 4b:da:b2:19:03:39:2a:9a:56:14:ef:06:ff:5f:a0:f1: 26:2e:cf:c2:09:af:f2:5a:7c:a8:a0:af:8b:98:53:72: e8:38:88:df:78:e0:c0:03:92:8b:72:c9:cc:da:01:63: 1e:2e:69:cf:f8:b7:7e:00:33:44:64:72:a7:af:4f:7c: eb:09:be:95:94:c3:84:51:1e:0e:4b:e3:db:c8:1a:d1: 1e:f1:80:0d:8d:51:fd:b0:bd:e9:bf:aa:61:1f:01:4a: 53:f8:56:10:80:dc:a8:e0:4d:0c:b6:94:7c:67:e0:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:34:c7:42:06:3e:94:88:63:16:55:b0:e7:c1:98:de: 19:45:78:6c:87:62:9a:c4:57:53:2b:40:e0:3a:71:70: 86:cf:24:eb:0d:32:49:3d:17:da:5e:e2:78:b0:4f:c0: b0:60:9a:98:ea:ed:34:d2:f0:e6:76:dd:7c:f8:97:16: 6c:dc:51:e1:7f:9d:ff:5f:80:3b:0d:16:ef:44:62:0d: f1:0b:4c:64:e9:31:8b:57:02:a6:24:33:6c:11:77:b9: d7:b3:8c:f7:f7:df:2a:77:d0:5a:29:c7:52:2e:95:83: 8b:52:b4:6b:09:61:8f:4b:2b:3f:d1:ad:a9:0d:bd:4f: 55:ea:8b:af:2d:48:42:10:36:fb:e9:b1:de:51:0a:9f: 58:bb:bf:c6:81:6c:29:b0:ba:ae:b1:16:8d:b9:14:1d: 0c:8d:b8:bc:f0:57:fe:00:0c:65:7c:92:b5:94:b9:26: 83:1f:e9:38:ca:58:eb:91:1d:ca:1e:52:2d:2d:f5:ea: d5:93:0b:93:a8:60:bd:73:b6:4f:1f:d7:50:9a:c2:41: 71:e4:f7:c9:97:1d:9e:6a:ae:4a:58:d5:e8:59:c2:d3: 51:7d:01:27:8a:ad:c9:9b:67:45:5a:14:4c:9b:c7:17: 54:df:c4:b0:9c:00:46:8d:68:f8:64:3a:f1:09:24:53 Fingerprint (SHA-256): 2C:5E:5E:D9:32:1D:D1:76:7C:E5:15:13:04:C2:4C:7F:A3:DE:00:2E:03:F4:A9:4C:A2:1F:E6:33:1B:FB:F6:80 Fingerprint (SHA1): 60:5F:24:8E:02:FD:B8:90:C8:A6:A6:5B:D8:3A:81:41:F1:E5:1C:A6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #5426: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5427: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043480 (0x6709cd8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:11:57 2016 Not After : Fri Jan 08 10:11:57 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:f0:36:87:be:15:06:8f:48:84:97:1b:ab:b6:1b:25: a4:d9:18:e8:98:c3:08:9f:71:c1:7d:71:17:6a:24:4d: a1:62:36:de:85:69:a7:ee:07:e5:e4:ba:52:d2:93:34: 99:cd:7b:83:5d:fa:9e:9e:23:18:ea:6a:5d:a2:b3:85: 41:6d:85:94:f5:b5:11:09:15:8d:bc:b0:ba:7e:d0:54: 05:a7:26:18:e5:ec:1a:21:a0:6e:e3:79:d7:80:18:d6: 22:c2:2f:8c:44:60:24:10:5f:3b:fa:db:6e:23:fe:27: 40:a3:96:4c:93:99:1e:b8:02:c9:c8:a7:00:77:30:a5: 89:98:30:4d:5b:24:36:3a:ec:6c:14:48:97:2c:18:ef: ac:6b:c3:49:92:8d:e3:41:a4:a5:d2:62:dc:c0:83:f8: d4:b8:dd:5f:77:b1:b5:b7:29:b3:c7:2c:6f:ca:9a:d0: c8:00:07:46:da:c4:63:de:45:ae:ab:90:fa:57:83:52: 43:10:fc:52:64:bf:e9:dc:4b:59:04:92:90:15:13:eb: a3:cf:38:c1:01:4d:4c:53:2e:d6:f4:c3:6d:0a:38:fe: 88:fa:52:9d:a9:8a:29:8e:00:0d:ea:33:01:cc:73:ff: 4b:86:e1:cc:be:54:67:9f:44:e6:70:4a:5a:b9:ad:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:46:c3:65:ce:50:41:8c:97:d3:da:4a:77:ee:7d:69: 32:03:87:6f:b0:0e:f5:60:b3:2d:67:15:f6:e2:f3:7c: 6c:6d:7f:34:47:fa:23:d3:36:76:de:1f:de:9e:e9:d6: 16:83:90:b9:8f:df:57:c1:07:f1:f7:4c:7c:5d:df:bd: 23:27:d2:97:f4:56:d9:b1:da:88:7e:6b:89:ec:bf:55: 74:50:c9:95:5b:29:c3:86:17:f1:2c:61:c2:1e:0e:e1: f5:25:95:49:af:96:b6:3f:3c:e1:88:fb:a0:16:cc:31: 3d:0b:57:96:53:92:c0:25:1b:22:38:7a:a9:ba:81:2e: 4e:de:ea:25:fd:9a:65:a2:a1:6f:57:6b:b6:2c:8e:b7: 6f:aa:4d:3e:ee:3e:55:39:73:4e:33:cf:05:0f:ee:d9: 73:75:28:84:4c:c1:81:00:19:6c:96:d3:05:8b:3f:e2: 74:cf:da:b2:d5:75:05:4a:27:91:82:7a:ba:e6:be:9f: 2a:20:9b:da:ad:9c:60:7d:b1:52:17:b8:bb:48:ca:81: db:b1:67:52:9c:71:72:ad:25:84:b5:1d:cc:f9:0b:a1: 32:03:e3:e3:7e:51:5e:d4:28:55:2b:65:8d:1c:aa:56: 1a:3c:12:e5:f6:27:4d:5f:3f:65:a0:d3:8a:8d:21:bc Fingerprint (SHA-256): F0:04:CA:A4:D3:40:07:37:11:0B:42:15:21:67:15:E1:56:15:51:07:6F:C0:54:94:E5:73:23:3E:C0:1A:99:D4 Fingerprint (SHA1): A4:3E:23:62:62:3A:68:B2:76:87:1D:A6:29:47:CF:50:CF:47:D7:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5428: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043480 (0x6709cd8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:11:57 2016 Not After : Fri Jan 08 10:11:57 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:f0:36:87:be:15:06:8f:48:84:97:1b:ab:b6:1b:25: a4:d9:18:e8:98:c3:08:9f:71:c1:7d:71:17:6a:24:4d: a1:62:36:de:85:69:a7:ee:07:e5:e4:ba:52:d2:93:34: 99:cd:7b:83:5d:fa:9e:9e:23:18:ea:6a:5d:a2:b3:85: 41:6d:85:94:f5:b5:11:09:15:8d:bc:b0:ba:7e:d0:54: 05:a7:26:18:e5:ec:1a:21:a0:6e:e3:79:d7:80:18:d6: 22:c2:2f:8c:44:60:24:10:5f:3b:fa:db:6e:23:fe:27: 40:a3:96:4c:93:99:1e:b8:02:c9:c8:a7:00:77:30:a5: 89:98:30:4d:5b:24:36:3a:ec:6c:14:48:97:2c:18:ef: ac:6b:c3:49:92:8d:e3:41:a4:a5:d2:62:dc:c0:83:f8: d4:b8:dd:5f:77:b1:b5:b7:29:b3:c7:2c:6f:ca:9a:d0: c8:00:07:46:da:c4:63:de:45:ae:ab:90:fa:57:83:52: 43:10:fc:52:64:bf:e9:dc:4b:59:04:92:90:15:13:eb: a3:cf:38:c1:01:4d:4c:53:2e:d6:f4:c3:6d:0a:38:fe: 88:fa:52:9d:a9:8a:29:8e:00:0d:ea:33:01:cc:73:ff: 4b:86:e1:cc:be:54:67:9f:44:e6:70:4a:5a:b9:ad:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:46:c3:65:ce:50:41:8c:97:d3:da:4a:77:ee:7d:69: 32:03:87:6f:b0:0e:f5:60:b3:2d:67:15:f6:e2:f3:7c: 6c:6d:7f:34:47:fa:23:d3:36:76:de:1f:de:9e:e9:d6: 16:83:90:b9:8f:df:57:c1:07:f1:f7:4c:7c:5d:df:bd: 23:27:d2:97:f4:56:d9:b1:da:88:7e:6b:89:ec:bf:55: 74:50:c9:95:5b:29:c3:86:17:f1:2c:61:c2:1e:0e:e1: f5:25:95:49:af:96:b6:3f:3c:e1:88:fb:a0:16:cc:31: 3d:0b:57:96:53:92:c0:25:1b:22:38:7a:a9:ba:81:2e: 4e:de:ea:25:fd:9a:65:a2:a1:6f:57:6b:b6:2c:8e:b7: 6f:aa:4d:3e:ee:3e:55:39:73:4e:33:cf:05:0f:ee:d9: 73:75:28:84:4c:c1:81:00:19:6c:96:d3:05:8b:3f:e2: 74:cf:da:b2:d5:75:05:4a:27:91:82:7a:ba:e6:be:9f: 2a:20:9b:da:ad:9c:60:7d:b1:52:17:b8:bb:48:ca:81: db:b1:67:52:9c:71:72:ad:25:84:b5:1d:cc:f9:0b:a1: 32:03:e3:e3:7e:51:5e:d4:28:55:2b:65:8d:1c:aa:56: 1a:3c:12:e5:f6:27:4d:5f:3f:65:a0:d3:8a:8d:21:bc Fingerprint (SHA-256): F0:04:CA:A4:D3:40:07:37:11:0B:42:15:21:67:15:E1:56:15:51:07:6F:C0:54:94:E5:73:23:3E:C0:1A:99:D4 Fingerprint (SHA1): A4:3E:23:62:62:3A:68:B2:76:87:1D:A6:29:47:CF:50:CF:47:D7:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5429: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043481 (0x6709cd9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:12:07 2016 Not After : Fri Jan 08 10:12:07 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:aa:a0:ac:12:1a:c4:5c:3b:34:41:30:e0:e8:44:9f: b3:54:dd:99:0d:e7:d1:81:bd:68:b3:a0:6b:c2:ee:60: 4d:a1:1e:f3:73:f0:b3:07:75:1d:6b:d1:6b:b7:15:a8: 7c:0a:13:0e:2f:ad:93:68:45:60:83:93:ef:b7:85:2a: 9a:81:d5:ca:99:1b:e9:50:d4:84:f1:5d:0d:71:07:ff: 64:ab:58:46:74:62:bc:7d:d6:85:6d:38:02:76:8d:5f: ba:9f:ca:9d:76:7b:58:c6:37:41:f4:45:ae:77:d8:51: 04:ad:7e:b1:09:2a:af:d7:0c:3d:81:cd:40:96:f0:d0: a5:12:16:d7:a0:da:78:96:61:0a:43:07:5d:5d:6a:00: de:d9:9c:6a:e2:aa:8c:ee:fd:aa:3d:89:85:d7:16:56: af:d3:c9:2a:38:9d:0c:b6:0d:8c:0d:c4:49:c6:3c:94: b3:b1:77:05:6e:4a:5b:13:c7:b2:84:5d:93:09:71:52: 82:f0:8d:fc:c5:08:a3:74:f1:df:71:f4:ec:72:2b:39: e6:09:50:4b:5e:61:d6:ee:8c:da:e0:0e:82:49:5c:c4: 5f:1a:e0:02:90:a6:a6:1a:1a:16:f1:71:00:57:dd:7b: e4:fd:15:1c:cb:b2:e4:88:2e:d3:cb:7b:fe:f8:cf:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:35:eb:cc:fb:82:b3:5a:59:ef:8e:dd:7b:68:6c:43: 52:4d:40:e3:00:df:cc:16:4a:3c:55:f2:f3:13:e3:9a: 88:45:4a:a7:6e:3f:0b:6f:69:17:d6:87:16:89:80:dd: b3:b7:49:3e:58:58:13:c8:9d:93:8c:d5:e1:82:f6:a4: 17:ac:c6:40:46:05:9a:4c:dd:2b:f4:94:43:2c:df:61: fb:56:f6:a2:e1:8a:45:3e:a3:4b:2e:82:bb:f4:16:5c: 22:b5:86:4a:7e:94:d7:e8:d2:ac:6a:1d:c4:49:63:ed: 43:b6:2f:aa:2c:4b:d6:24:d1:58:b8:01:d5:2e:10:d8: b4:fc:68:27:20:f0:db:ef:7e:6a:ad:31:93:c5:92:bb: 25:08:87:aa:da:4d:30:70:9e:c9:08:6b:ed:a1:16:6a: ba:e2:dd:0e:33:89:ce:93:ca:0c:13:ec:88:d6:01:36: 8b:17:f5:49:27:e2:30:49:56:d4:06:30:10:5e:4b:ab: ad:fb:d0:fd:9b:14:ad:54:f5:73:d5:18:37:0a:c0:de: 93:e0:f8:2d:da:5f:36:f8:84:06:4f:d8:6a:d7:0b:c5: 1f:3f:6c:24:5b:ac:81:1d:39:43:ec:de:fb:0e:d2:13: ee:db:2d:63:20:86:4a:a5:02:37:ac:50:31:a9:54:fc Fingerprint (SHA-256): 6A:D1:40:7D:C3:FF:7E:9D:18:BA:DA:3A:1F:49:8E:3F:66:0A:0A:AB:CF:77:81:08:B1:21:F0:B4:69:15:D4:FE Fingerprint (SHA1): AF:DC:10:0F:16:8A:5B:4F:D9:09:ED:BB:56:0A:27:86:9F:51:73:CF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5430: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043481 (0x6709cd9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:12:07 2016 Not After : Fri Jan 08 10:12:07 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:aa:a0:ac:12:1a:c4:5c:3b:34:41:30:e0:e8:44:9f: b3:54:dd:99:0d:e7:d1:81:bd:68:b3:a0:6b:c2:ee:60: 4d:a1:1e:f3:73:f0:b3:07:75:1d:6b:d1:6b:b7:15:a8: 7c:0a:13:0e:2f:ad:93:68:45:60:83:93:ef:b7:85:2a: 9a:81:d5:ca:99:1b:e9:50:d4:84:f1:5d:0d:71:07:ff: 64:ab:58:46:74:62:bc:7d:d6:85:6d:38:02:76:8d:5f: ba:9f:ca:9d:76:7b:58:c6:37:41:f4:45:ae:77:d8:51: 04:ad:7e:b1:09:2a:af:d7:0c:3d:81:cd:40:96:f0:d0: a5:12:16:d7:a0:da:78:96:61:0a:43:07:5d:5d:6a:00: de:d9:9c:6a:e2:aa:8c:ee:fd:aa:3d:89:85:d7:16:56: af:d3:c9:2a:38:9d:0c:b6:0d:8c:0d:c4:49:c6:3c:94: b3:b1:77:05:6e:4a:5b:13:c7:b2:84:5d:93:09:71:52: 82:f0:8d:fc:c5:08:a3:74:f1:df:71:f4:ec:72:2b:39: e6:09:50:4b:5e:61:d6:ee:8c:da:e0:0e:82:49:5c:c4: 5f:1a:e0:02:90:a6:a6:1a:1a:16:f1:71:00:57:dd:7b: e4:fd:15:1c:cb:b2:e4:88:2e:d3:cb:7b:fe:f8:cf:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:35:eb:cc:fb:82:b3:5a:59:ef:8e:dd:7b:68:6c:43: 52:4d:40:e3:00:df:cc:16:4a:3c:55:f2:f3:13:e3:9a: 88:45:4a:a7:6e:3f:0b:6f:69:17:d6:87:16:89:80:dd: b3:b7:49:3e:58:58:13:c8:9d:93:8c:d5:e1:82:f6:a4: 17:ac:c6:40:46:05:9a:4c:dd:2b:f4:94:43:2c:df:61: fb:56:f6:a2:e1:8a:45:3e:a3:4b:2e:82:bb:f4:16:5c: 22:b5:86:4a:7e:94:d7:e8:d2:ac:6a:1d:c4:49:63:ed: 43:b6:2f:aa:2c:4b:d6:24:d1:58:b8:01:d5:2e:10:d8: b4:fc:68:27:20:f0:db:ef:7e:6a:ad:31:93:c5:92:bb: 25:08:87:aa:da:4d:30:70:9e:c9:08:6b:ed:a1:16:6a: ba:e2:dd:0e:33:89:ce:93:ca:0c:13:ec:88:d6:01:36: 8b:17:f5:49:27:e2:30:49:56:d4:06:30:10:5e:4b:ab: ad:fb:d0:fd:9b:14:ad:54:f5:73:d5:18:37:0a:c0:de: 93:e0:f8:2d:da:5f:36:f8:84:06:4f:d8:6a:d7:0b:c5: 1f:3f:6c:24:5b:ac:81:1d:39:43:ec:de:fb:0e:d2:13: ee:db:2d:63:20:86:4a:a5:02:37:ac:50:31:a9:54:fc Fingerprint (SHA-256): 6A:D1:40:7D:C3:FF:7E:9D:18:BA:DA:3A:1F:49:8E:3F:66:0A:0A:AB:CF:77:81:08:B1:21:F0:B4:69:15:D4:FE Fingerprint (SHA1): AF:DC:10:0F:16:8A:5B:4F:D9:09:ED:BB:56:0A:27:86:9F:51:73:CF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5431: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043482 (0x6709cda) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 10:12:11 2016 Not After : Fri Jan 08 10:12:11 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:37:4b:20:50:3b:9b:a5:e8:61:f2:02:87:66:6b:38: 4e:2f:ef:68:7d:8d:5a:7d:9a:57:e5:46:d9:fe:94:89: 38:a6:2f:9b:a7:9a:77:5e:42:e3:99:c3:d1:0d:ef:69: 37:a4:43:d9:51:b6:a2:e1:4b:bd:93:43:b2:49:4e:3e: 11:24:c7:8a:ff:cf:38:fd:7a:0f:4a:7a:48:3a:ba:b4: 37:27:34:d7:b7:b9:db:87:59:fc:b5:3f:b0:8a:77:59: 93:de:b6:ae:65:3e:a9:54:70:1a:10:0e:94:93:f3:08: 57:d8:4d:6f:15:0e:63:79:d5:be:ed:aa:67:2e:19:33: 0a:40:a8:c0:84:ba:01:6c:e5:f2:9a:c2:13:36:ea:89: 4b:da:b2:19:03:39:2a:9a:56:14:ef:06:ff:5f:a0:f1: 26:2e:cf:c2:09:af:f2:5a:7c:a8:a0:af:8b:98:53:72: e8:38:88:df:78:e0:c0:03:92:8b:72:c9:cc:da:01:63: 1e:2e:69:cf:f8:b7:7e:00:33:44:64:72:a7:af:4f:7c: eb:09:be:95:94:c3:84:51:1e:0e:4b:e3:db:c8:1a:d1: 1e:f1:80:0d:8d:51:fd:b0:bd:e9:bf:aa:61:1f:01:4a: 53:f8:56:10:80:dc:a8:e0:4d:0c:b6:94:7c:67:e0:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:34:c7:42:06:3e:94:88:63:16:55:b0:e7:c1:98:de: 19:45:78:6c:87:62:9a:c4:57:53:2b:40:e0:3a:71:70: 86:cf:24:eb:0d:32:49:3d:17:da:5e:e2:78:b0:4f:c0: b0:60:9a:98:ea:ed:34:d2:f0:e6:76:dd:7c:f8:97:16: 6c:dc:51:e1:7f:9d:ff:5f:80:3b:0d:16:ef:44:62:0d: f1:0b:4c:64:e9:31:8b:57:02:a6:24:33:6c:11:77:b9: d7:b3:8c:f7:f7:df:2a:77:d0:5a:29:c7:52:2e:95:83: 8b:52:b4:6b:09:61:8f:4b:2b:3f:d1:ad:a9:0d:bd:4f: 55:ea:8b:af:2d:48:42:10:36:fb:e9:b1:de:51:0a:9f: 58:bb:bf:c6:81:6c:29:b0:ba:ae:b1:16:8d:b9:14:1d: 0c:8d:b8:bc:f0:57:fe:00:0c:65:7c:92:b5:94:b9:26: 83:1f:e9:38:ca:58:eb:91:1d:ca:1e:52:2d:2d:f5:ea: d5:93:0b:93:a8:60:bd:73:b6:4f:1f:d7:50:9a:c2:41: 71:e4:f7:c9:97:1d:9e:6a:ae:4a:58:d5:e8:59:c2:d3: 51:7d:01:27:8a:ad:c9:9b:67:45:5a:14:4c:9b:c7:17: 54:df:c4:b0:9c:00:46:8d:68:f8:64:3a:f1:09:24:53 Fingerprint (SHA-256): 2C:5E:5E:D9:32:1D:D1:76:7C:E5:15:13:04:C2:4C:7F:A3:DE:00:2E:03:F4:A9:4C:A2:1F:E6:33:1B:FB:F6:80 Fingerprint (SHA1): 60:5F:24:8E:02:FD:B8:90:C8:A6:A6:5B:D8:3A:81:41:F1:E5:1C:A6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #5432: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043482 (0x6709cda) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 10:12:11 2016 Not After : Fri Jan 08 10:12:11 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:37:4b:20:50:3b:9b:a5:e8:61:f2:02:87:66:6b:38: 4e:2f:ef:68:7d:8d:5a:7d:9a:57:e5:46:d9:fe:94:89: 38:a6:2f:9b:a7:9a:77:5e:42:e3:99:c3:d1:0d:ef:69: 37:a4:43:d9:51:b6:a2:e1:4b:bd:93:43:b2:49:4e:3e: 11:24:c7:8a:ff:cf:38:fd:7a:0f:4a:7a:48:3a:ba:b4: 37:27:34:d7:b7:b9:db:87:59:fc:b5:3f:b0:8a:77:59: 93:de:b6:ae:65:3e:a9:54:70:1a:10:0e:94:93:f3:08: 57:d8:4d:6f:15:0e:63:79:d5:be:ed:aa:67:2e:19:33: 0a:40:a8:c0:84:ba:01:6c:e5:f2:9a:c2:13:36:ea:89: 4b:da:b2:19:03:39:2a:9a:56:14:ef:06:ff:5f:a0:f1: 26:2e:cf:c2:09:af:f2:5a:7c:a8:a0:af:8b:98:53:72: e8:38:88:df:78:e0:c0:03:92:8b:72:c9:cc:da:01:63: 1e:2e:69:cf:f8:b7:7e:00:33:44:64:72:a7:af:4f:7c: eb:09:be:95:94:c3:84:51:1e:0e:4b:e3:db:c8:1a:d1: 1e:f1:80:0d:8d:51:fd:b0:bd:e9:bf:aa:61:1f:01:4a: 53:f8:56:10:80:dc:a8:e0:4d:0c:b6:94:7c:67:e0:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:34:c7:42:06:3e:94:88:63:16:55:b0:e7:c1:98:de: 19:45:78:6c:87:62:9a:c4:57:53:2b:40:e0:3a:71:70: 86:cf:24:eb:0d:32:49:3d:17:da:5e:e2:78:b0:4f:c0: b0:60:9a:98:ea:ed:34:d2:f0:e6:76:dd:7c:f8:97:16: 6c:dc:51:e1:7f:9d:ff:5f:80:3b:0d:16:ef:44:62:0d: f1:0b:4c:64:e9:31:8b:57:02:a6:24:33:6c:11:77:b9: d7:b3:8c:f7:f7:df:2a:77:d0:5a:29:c7:52:2e:95:83: 8b:52:b4:6b:09:61:8f:4b:2b:3f:d1:ad:a9:0d:bd:4f: 55:ea:8b:af:2d:48:42:10:36:fb:e9:b1:de:51:0a:9f: 58:bb:bf:c6:81:6c:29:b0:ba:ae:b1:16:8d:b9:14:1d: 0c:8d:b8:bc:f0:57:fe:00:0c:65:7c:92:b5:94:b9:26: 83:1f:e9:38:ca:58:eb:91:1d:ca:1e:52:2d:2d:f5:ea: d5:93:0b:93:a8:60:bd:73:b6:4f:1f:d7:50:9a:c2:41: 71:e4:f7:c9:97:1d:9e:6a:ae:4a:58:d5:e8:59:c2:d3: 51:7d:01:27:8a:ad:c9:9b:67:45:5a:14:4c:9b:c7:17: 54:df:c4:b0:9c:00:46:8d:68:f8:64:3a:f1:09:24:53 Fingerprint (SHA-256): 2C:5E:5E:D9:32:1D:D1:76:7C:E5:15:13:04:C2:4C:7F:A3:DE:00:2E:03:F4:A9:4C:A2:1F:E6:33:1B:FB:F6:80 Fingerprint (SHA1): 60:5F:24:8E:02:FD:B8:90:C8:A6:A6:5B:D8:3A:81:41:F1:E5:1C:A6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #5433: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5434: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043485 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5435: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5436: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5437: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5438: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108043486 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5439: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5440: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5441: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5442: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108043487 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5443: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5444: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5445: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5446: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 108043488 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5447: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5448: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #5449: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5450: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108043489 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5451: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5452: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #5453: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5454: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108043490 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5455: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5456: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #5457: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5458: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 108043491 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5459: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5460: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5461: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #5462: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #5463: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5464: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #5465: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043485 (0x6709cdd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:13:31 2016 Not After : Fri Jan 08 10:13:31 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:56:b1:24:a5:64:a3:71:93:7a:5d:1e:01:02:fe:cd: 21:d0:4c:2c:5a:cd:15:d0:cd:63:46:aa:40:19:d7:7a: 6b:ed:7e:07:7d:f3:e1:0d:ce:c8:dc:fc:a1:1b:bb:f4: fd:fd:30:77:ce:7b:09:eb:70:31:42:8b:30:fa:12:e0: 1b:76:cb:5a:e1:7f:46:c0:bc:ff:85:f3:f1:7f:20:b9: e3:76:0d:d0:92:fd:a2:18:4b:18:64:ca:a5:25:35:15: 60:ee:25:48:67:4f:a0:c3:2c:93:85:d4:99:88:3d:12: fa:c6:1c:0c:d4:09:fb:fc:01:7c:20:bb:5d:d0:cc:bb: 11:f8:f9:5f:c9:fd:fb:73:a1:50:20:28:2c:42:4b:c9: 75:d4:19:0d:fd:1e:66:98:26:56:d3:0b:e7:cb:10:56: f7:5c:f1:46:26:b7:d3:41:4f:4e:23:3b:ca:47:47:67: c5:e0:06:d8:ec:45:6e:5f:9c:20:4c:78:c7:4f:77:54: f7:c0:eb:d9:32:ea:7d:6d:e9:f9:ec:53:93:d4:69:2e: 84:51:bb:39:0a:43:59:57:f0:d5:24:83:32:ed:45:ce: 80:e2:cd:0d:03:61:55:56:f0:25:7b:37:18:68:b6:1b: de:a7:ff:f6:b8:fe:1d:51:8d:fc:e4:f2:bd:ff:fe:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:1d:6b:a8:26:03:d3:71:2f:6e:1d:a9:3a:f3:89:75: 13:8f:57:3d:8c:31:69:26:1d:fc:41:db:b2:8a:0d:07: ef:28:79:c6:47:3b:51:9b:c9:c9:3e:3e:a9:6d:96:aa: 39:dc:3c:57:be:c4:d0:23:df:56:d9:02:3e:40:1f:50: d1:bf:8e:4e:0c:91:2e:43:8b:7e:48:a5:64:44:1c:01: 41:ea:fd:c9:7a:d8:fe:77:b2:4c:14:16:3f:56:1e:14: e6:4b:3b:aa:18:18:7f:29:a6:37:e5:94:08:d3:6b:88: bc:de:12:1f:9e:a7:99:f3:1b:a8:87:4e:c3:07:d4:1a: b6:ce:48:f1:72:85:92:62:3a:87:c0:15:3a:34:54:dd: 3a:84:72:e2:51:4f:6f:e7:12:63:a3:a7:1e:28:f5:8e: 61:e8:a1:c6:f0:7a:d1:5f:96:96:25:8a:7c:bc:26:c1: da:46:a4:30:05:85:c9:88:6f:3d:d5:d9:b8:45:22:66: e2:84:4f:3e:66:5d:23:21:17:1d:ee:4a:fe:c2:70:eb: 88:26:85:65:cc:c6:42:33:f9:62:33:3c:c3:5d:f4:29: a7:c1:23:7b:61:9d:86:02:a9:ca:53:ed:51:9d:a4:50: 6e:b3:8e:2e:45:f2:b9:57:cf:45:73:1e:ff:d7:e4:91 Fingerprint (SHA-256): FB:B0:6C:9E:22:18:C2:BB:20:0F:1E:7F:CC:D8:71:CA:27:0A:AF:94:05:C3:B4:02:2A:25:05:F5:58:62:7F:B1 Fingerprint (SHA1): CC:58:CD:7A:AD:E9:C1:AE:B7:0F:D9:DC:C1:B2:C4:D2:10:EB:23:28 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5466: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5467: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5468: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5469: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043485 (0x6709cdd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:13:31 2016 Not After : Fri Jan 08 10:13:31 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:56:b1:24:a5:64:a3:71:93:7a:5d:1e:01:02:fe:cd: 21:d0:4c:2c:5a:cd:15:d0:cd:63:46:aa:40:19:d7:7a: 6b:ed:7e:07:7d:f3:e1:0d:ce:c8:dc:fc:a1:1b:bb:f4: fd:fd:30:77:ce:7b:09:eb:70:31:42:8b:30:fa:12:e0: 1b:76:cb:5a:e1:7f:46:c0:bc:ff:85:f3:f1:7f:20:b9: e3:76:0d:d0:92:fd:a2:18:4b:18:64:ca:a5:25:35:15: 60:ee:25:48:67:4f:a0:c3:2c:93:85:d4:99:88:3d:12: fa:c6:1c:0c:d4:09:fb:fc:01:7c:20:bb:5d:d0:cc:bb: 11:f8:f9:5f:c9:fd:fb:73:a1:50:20:28:2c:42:4b:c9: 75:d4:19:0d:fd:1e:66:98:26:56:d3:0b:e7:cb:10:56: f7:5c:f1:46:26:b7:d3:41:4f:4e:23:3b:ca:47:47:67: c5:e0:06:d8:ec:45:6e:5f:9c:20:4c:78:c7:4f:77:54: f7:c0:eb:d9:32:ea:7d:6d:e9:f9:ec:53:93:d4:69:2e: 84:51:bb:39:0a:43:59:57:f0:d5:24:83:32:ed:45:ce: 80:e2:cd:0d:03:61:55:56:f0:25:7b:37:18:68:b6:1b: de:a7:ff:f6:b8:fe:1d:51:8d:fc:e4:f2:bd:ff:fe:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:1d:6b:a8:26:03:d3:71:2f:6e:1d:a9:3a:f3:89:75: 13:8f:57:3d:8c:31:69:26:1d:fc:41:db:b2:8a:0d:07: ef:28:79:c6:47:3b:51:9b:c9:c9:3e:3e:a9:6d:96:aa: 39:dc:3c:57:be:c4:d0:23:df:56:d9:02:3e:40:1f:50: d1:bf:8e:4e:0c:91:2e:43:8b:7e:48:a5:64:44:1c:01: 41:ea:fd:c9:7a:d8:fe:77:b2:4c:14:16:3f:56:1e:14: e6:4b:3b:aa:18:18:7f:29:a6:37:e5:94:08:d3:6b:88: bc:de:12:1f:9e:a7:99:f3:1b:a8:87:4e:c3:07:d4:1a: b6:ce:48:f1:72:85:92:62:3a:87:c0:15:3a:34:54:dd: 3a:84:72:e2:51:4f:6f:e7:12:63:a3:a7:1e:28:f5:8e: 61:e8:a1:c6:f0:7a:d1:5f:96:96:25:8a:7c:bc:26:c1: da:46:a4:30:05:85:c9:88:6f:3d:d5:d9:b8:45:22:66: e2:84:4f:3e:66:5d:23:21:17:1d:ee:4a:fe:c2:70:eb: 88:26:85:65:cc:c6:42:33:f9:62:33:3c:c3:5d:f4:29: a7:c1:23:7b:61:9d:86:02:a9:ca:53:ed:51:9d:a4:50: 6e:b3:8e:2e:45:f2:b9:57:cf:45:73:1e:ff:d7:e4:91 Fingerprint (SHA-256): FB:B0:6C:9E:22:18:C2:BB:20:0F:1E:7F:CC:D8:71:CA:27:0A:AF:94:05:C3:B4:02:2A:25:05:F5:58:62:7F:B1 Fingerprint (SHA1): CC:58:CD:7A:AD:E9:C1:AE:B7:0F:D9:DC:C1:B2:C4:D2:10:EB:23:28 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5470: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5471: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5472: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043492 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5473: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5474: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5475: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5476: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108043493 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5477: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5478: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #5479: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5480: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 108043494 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5481: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5482: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #5483: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5484: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 108043495 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5485: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5486: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5487: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5488: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 108043496 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5489: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5490: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #5491: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5492: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 108043497 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5493: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5494: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #5495: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5496: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 108043498 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5497: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5498: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5499: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5500: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 108043499 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5501: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5502: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #5503: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5504: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 108043500 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5505: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5506: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #5507: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5508: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 108043501 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5509: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5510: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #5511: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5512: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 108043502 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5513: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5514: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #5515: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5516: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 108043503 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5517: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5518: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #5519: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5520: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 108043504 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5521: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5522: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #5523: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5524: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 108043505 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5525: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5526: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #5527: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5528: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 108043506 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5529: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5530: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #5531: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5532: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 108043507 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5533: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5534: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #5535: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5536: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 108043508 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5537: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5538: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #5539: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5540: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 108043509 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5541: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5542: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #5543: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5544: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 108043510 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5545: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5546: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #5547: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5548: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 108043511 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5549: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5550: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #5551: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5552: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 108043512 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5553: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5554: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #5555: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5556: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 108043513 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5557: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5558: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #5559: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5560: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 108043514 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5561: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5562: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #5563: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5564: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 108043515 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5565: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5566: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #5567: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5568: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 108043516 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5569: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5570: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #5571: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5572: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 108043517 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5573: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5574: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #5575: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5576: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 108043518 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5577: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5578: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #5579: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5580: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 108043519 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5581: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5582: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #5583: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5584: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 108043520 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5585: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5586: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #5587: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5588: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 108043521 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5589: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5590: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5591: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043492 (0x6709ce4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:15:08 2016 Not After : Fri Jan 08 10:15:08 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:31:45:e1:05:52:db:ca:29:49:2f:47:08:b7:f3:f4: f5:58:0c:61:1f:c4:fe:bc:f6:48:1e:bd:0c:bd:4a:66: 73:16:7d:52:49:41:a8:e7:e5:48:f1:a8:e7:5d:fe:9a: fe:8b:f2:29:95:41:94:73:75:9d:fb:50:1d:64:40:96: 03:d2:a5:e4:62:76:aa:4e:81:33:b7:e9:50:ab:88:94: 00:50:b4:06:0e:dc:2c:b9:a0:0b:70:33:5a:e5:b9:6d: 1d:db:04:c9:ad:4d:43:20:d7:b4:05:4d:ea:1f:9b:d1: 93:41:6b:c5:43:69:4b:05:8f:2e:11:77:95:f0:7c:60: 1b:88:9a:23:22:b8:04:16:c3:2d:79:ab:d3:58:61:e6: a3:45:51:2c:d0:1e:29:f0:9d:90:02:c6:5b:3f:3a:24: fa:c8:35:76:55:19:85:e7:3e:e4:e1:43:61:0d:95:b6: ef:d6:3b:54:4b:b5:f1:74:b7:ef:0e:f7:b8:50:78:1e: 00:f8:0c:c9:e5:0c:c1:10:f8:f7:0f:ed:d0:4c:57:bc: 9c:91:74:46:99:94:a4:fe:c1:6f:d8:0f:db:5a:5b:fd: a8:94:d7:b1:7d:05:ce:b0:e4:d1:ff:49:af:69:b6:75: 37:38:84:91:cf:91:fc:ff:27:7f:e3:41:88:0d:4a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:da:41:93:da:c8:03:cf:f7:5b:7c:dc:29:68:54:cc: c7:1a:6b:9d:f8:b7:9c:ec:7f:6c:14:de:55:15:31:00: cb:6e:d3:0d:f6:b3:82:d1:7f:c0:9b:ed:ea:b3:44:30: 54:52:b5:5d:d2:eb:30:e4:e9:73:08:88:2b:ca:68:92: 85:98:e7:c1:e6:5f:5f:04:0f:d5:b5:0a:e7:a3:d2:90: 36:bc:ed:20:fb:93:0b:48:30:13:df:af:94:b1:d1:10: f6:58:9c:7c:02:5a:79:bd:f5:fe:52:a7:22:8d:50:06: 29:84:31:12:10:2e:6a:85:4b:b5:0c:d9:fa:1a:6d:e6: 42:93:21:ae:c5:62:50:f5:cf:40:aa:f3:90:d9:72:5a: e4:34:9c:de:dc:cc:88:d7:b0:ab:4b:35:8c:20:15:ec: 72:a5:2c:4e:67:55:2d:56:db:7b:04:16:14:ea:a1:b9: ec:ae:79:55:77:3a:f1:78:d7:78:74:05:61:3c:25:65: 0e:47:03:22:4a:a2:3e:21:44:6c:aa:3b:ae:3c:88:70: 9c:7f:dc:48:b0:06:55:27:40:26:06:f5:d6:2c:7e:e2: 44:7b:9e:b6:d7:21:3e:b1:e9:f9:1c:db:82:fe:a2:3d: 5d:61:b2:ad:20:9f:bc:e6:1c:99:a8:54:39:28:13:bc Fingerprint (SHA-256): F1:BE:E0:C3:CE:1E:0C:0E:82:AC:E2:10:47:27:5C:E9:BE:52:EE:DC:34:BE:4D:E9:D4:F6:63:64:F5:77:29:5A Fingerprint (SHA1): FC:38:26:ED:B7:6B:39:B1:F5:66:1D:F6:6F:30:54:5A:B5:9D:23:AA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5592: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5593: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043492 (0x6709ce4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:15:08 2016 Not After : Fri Jan 08 10:15:08 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:31:45:e1:05:52:db:ca:29:49:2f:47:08:b7:f3:f4: f5:58:0c:61:1f:c4:fe:bc:f6:48:1e:bd:0c:bd:4a:66: 73:16:7d:52:49:41:a8:e7:e5:48:f1:a8:e7:5d:fe:9a: fe:8b:f2:29:95:41:94:73:75:9d:fb:50:1d:64:40:96: 03:d2:a5:e4:62:76:aa:4e:81:33:b7:e9:50:ab:88:94: 00:50:b4:06:0e:dc:2c:b9:a0:0b:70:33:5a:e5:b9:6d: 1d:db:04:c9:ad:4d:43:20:d7:b4:05:4d:ea:1f:9b:d1: 93:41:6b:c5:43:69:4b:05:8f:2e:11:77:95:f0:7c:60: 1b:88:9a:23:22:b8:04:16:c3:2d:79:ab:d3:58:61:e6: a3:45:51:2c:d0:1e:29:f0:9d:90:02:c6:5b:3f:3a:24: fa:c8:35:76:55:19:85:e7:3e:e4:e1:43:61:0d:95:b6: ef:d6:3b:54:4b:b5:f1:74:b7:ef:0e:f7:b8:50:78:1e: 00:f8:0c:c9:e5:0c:c1:10:f8:f7:0f:ed:d0:4c:57:bc: 9c:91:74:46:99:94:a4:fe:c1:6f:d8:0f:db:5a:5b:fd: a8:94:d7:b1:7d:05:ce:b0:e4:d1:ff:49:af:69:b6:75: 37:38:84:91:cf:91:fc:ff:27:7f:e3:41:88:0d:4a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:da:41:93:da:c8:03:cf:f7:5b:7c:dc:29:68:54:cc: c7:1a:6b:9d:f8:b7:9c:ec:7f:6c:14:de:55:15:31:00: cb:6e:d3:0d:f6:b3:82:d1:7f:c0:9b:ed:ea:b3:44:30: 54:52:b5:5d:d2:eb:30:e4:e9:73:08:88:2b:ca:68:92: 85:98:e7:c1:e6:5f:5f:04:0f:d5:b5:0a:e7:a3:d2:90: 36:bc:ed:20:fb:93:0b:48:30:13:df:af:94:b1:d1:10: f6:58:9c:7c:02:5a:79:bd:f5:fe:52:a7:22:8d:50:06: 29:84:31:12:10:2e:6a:85:4b:b5:0c:d9:fa:1a:6d:e6: 42:93:21:ae:c5:62:50:f5:cf:40:aa:f3:90:d9:72:5a: e4:34:9c:de:dc:cc:88:d7:b0:ab:4b:35:8c:20:15:ec: 72:a5:2c:4e:67:55:2d:56:db:7b:04:16:14:ea:a1:b9: ec:ae:79:55:77:3a:f1:78:d7:78:74:05:61:3c:25:65: 0e:47:03:22:4a:a2:3e:21:44:6c:aa:3b:ae:3c:88:70: 9c:7f:dc:48:b0:06:55:27:40:26:06:f5:d6:2c:7e:e2: 44:7b:9e:b6:d7:21:3e:b1:e9:f9:1c:db:82:fe:a2:3d: 5d:61:b2:ad:20:9f:bc:e6:1c:99:a8:54:39:28:13:bc Fingerprint (SHA-256): F1:BE:E0:C3:CE:1E:0C:0E:82:AC:E2:10:47:27:5C:E9:BE:52:EE:DC:34:BE:4D:E9:D4:F6:63:64:F5:77:29:5A Fingerprint (SHA1): FC:38:26:ED:B7:6B:39:B1:F5:66:1D:F6:6F:30:54:5A:B5:9D:23:AA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5594: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5595: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5596: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5597: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043492 (0x6709ce4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:15:08 2016 Not After : Fri Jan 08 10:15:08 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:31:45:e1:05:52:db:ca:29:49:2f:47:08:b7:f3:f4: f5:58:0c:61:1f:c4:fe:bc:f6:48:1e:bd:0c:bd:4a:66: 73:16:7d:52:49:41:a8:e7:e5:48:f1:a8:e7:5d:fe:9a: fe:8b:f2:29:95:41:94:73:75:9d:fb:50:1d:64:40:96: 03:d2:a5:e4:62:76:aa:4e:81:33:b7:e9:50:ab:88:94: 00:50:b4:06:0e:dc:2c:b9:a0:0b:70:33:5a:e5:b9:6d: 1d:db:04:c9:ad:4d:43:20:d7:b4:05:4d:ea:1f:9b:d1: 93:41:6b:c5:43:69:4b:05:8f:2e:11:77:95:f0:7c:60: 1b:88:9a:23:22:b8:04:16:c3:2d:79:ab:d3:58:61:e6: a3:45:51:2c:d0:1e:29:f0:9d:90:02:c6:5b:3f:3a:24: fa:c8:35:76:55:19:85:e7:3e:e4:e1:43:61:0d:95:b6: ef:d6:3b:54:4b:b5:f1:74:b7:ef:0e:f7:b8:50:78:1e: 00:f8:0c:c9:e5:0c:c1:10:f8:f7:0f:ed:d0:4c:57:bc: 9c:91:74:46:99:94:a4:fe:c1:6f:d8:0f:db:5a:5b:fd: a8:94:d7:b1:7d:05:ce:b0:e4:d1:ff:49:af:69:b6:75: 37:38:84:91:cf:91:fc:ff:27:7f:e3:41:88:0d:4a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:da:41:93:da:c8:03:cf:f7:5b:7c:dc:29:68:54:cc: c7:1a:6b:9d:f8:b7:9c:ec:7f:6c:14:de:55:15:31:00: cb:6e:d3:0d:f6:b3:82:d1:7f:c0:9b:ed:ea:b3:44:30: 54:52:b5:5d:d2:eb:30:e4:e9:73:08:88:2b:ca:68:92: 85:98:e7:c1:e6:5f:5f:04:0f:d5:b5:0a:e7:a3:d2:90: 36:bc:ed:20:fb:93:0b:48:30:13:df:af:94:b1:d1:10: f6:58:9c:7c:02:5a:79:bd:f5:fe:52:a7:22:8d:50:06: 29:84:31:12:10:2e:6a:85:4b:b5:0c:d9:fa:1a:6d:e6: 42:93:21:ae:c5:62:50:f5:cf:40:aa:f3:90:d9:72:5a: e4:34:9c:de:dc:cc:88:d7:b0:ab:4b:35:8c:20:15:ec: 72:a5:2c:4e:67:55:2d:56:db:7b:04:16:14:ea:a1:b9: ec:ae:79:55:77:3a:f1:78:d7:78:74:05:61:3c:25:65: 0e:47:03:22:4a:a2:3e:21:44:6c:aa:3b:ae:3c:88:70: 9c:7f:dc:48:b0:06:55:27:40:26:06:f5:d6:2c:7e:e2: 44:7b:9e:b6:d7:21:3e:b1:e9:f9:1c:db:82:fe:a2:3d: 5d:61:b2:ad:20:9f:bc:e6:1c:99:a8:54:39:28:13:bc Fingerprint (SHA-256): F1:BE:E0:C3:CE:1E:0C:0E:82:AC:E2:10:47:27:5C:E9:BE:52:EE:DC:34:BE:4D:E9:D4:F6:63:64:F5:77:29:5A Fingerprint (SHA1): FC:38:26:ED:B7:6B:39:B1:F5:66:1D:F6:6F:30:54:5A:B5:9D:23:AA Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5598: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5599: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5600: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5601: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043492 (0x6709ce4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:15:08 2016 Not After : Fri Jan 08 10:15:08 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:31:45:e1:05:52:db:ca:29:49:2f:47:08:b7:f3:f4: f5:58:0c:61:1f:c4:fe:bc:f6:48:1e:bd:0c:bd:4a:66: 73:16:7d:52:49:41:a8:e7:e5:48:f1:a8:e7:5d:fe:9a: fe:8b:f2:29:95:41:94:73:75:9d:fb:50:1d:64:40:96: 03:d2:a5:e4:62:76:aa:4e:81:33:b7:e9:50:ab:88:94: 00:50:b4:06:0e:dc:2c:b9:a0:0b:70:33:5a:e5:b9:6d: 1d:db:04:c9:ad:4d:43:20:d7:b4:05:4d:ea:1f:9b:d1: 93:41:6b:c5:43:69:4b:05:8f:2e:11:77:95:f0:7c:60: 1b:88:9a:23:22:b8:04:16:c3:2d:79:ab:d3:58:61:e6: a3:45:51:2c:d0:1e:29:f0:9d:90:02:c6:5b:3f:3a:24: fa:c8:35:76:55:19:85:e7:3e:e4:e1:43:61:0d:95:b6: ef:d6:3b:54:4b:b5:f1:74:b7:ef:0e:f7:b8:50:78:1e: 00:f8:0c:c9:e5:0c:c1:10:f8:f7:0f:ed:d0:4c:57:bc: 9c:91:74:46:99:94:a4:fe:c1:6f:d8:0f:db:5a:5b:fd: a8:94:d7:b1:7d:05:ce:b0:e4:d1:ff:49:af:69:b6:75: 37:38:84:91:cf:91:fc:ff:27:7f:e3:41:88:0d:4a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:da:41:93:da:c8:03:cf:f7:5b:7c:dc:29:68:54:cc: c7:1a:6b:9d:f8:b7:9c:ec:7f:6c:14:de:55:15:31:00: cb:6e:d3:0d:f6:b3:82:d1:7f:c0:9b:ed:ea:b3:44:30: 54:52:b5:5d:d2:eb:30:e4:e9:73:08:88:2b:ca:68:92: 85:98:e7:c1:e6:5f:5f:04:0f:d5:b5:0a:e7:a3:d2:90: 36:bc:ed:20:fb:93:0b:48:30:13:df:af:94:b1:d1:10: f6:58:9c:7c:02:5a:79:bd:f5:fe:52:a7:22:8d:50:06: 29:84:31:12:10:2e:6a:85:4b:b5:0c:d9:fa:1a:6d:e6: 42:93:21:ae:c5:62:50:f5:cf:40:aa:f3:90:d9:72:5a: e4:34:9c:de:dc:cc:88:d7:b0:ab:4b:35:8c:20:15:ec: 72:a5:2c:4e:67:55:2d:56:db:7b:04:16:14:ea:a1:b9: ec:ae:79:55:77:3a:f1:78:d7:78:74:05:61:3c:25:65: 0e:47:03:22:4a:a2:3e:21:44:6c:aa:3b:ae:3c:88:70: 9c:7f:dc:48:b0:06:55:27:40:26:06:f5:d6:2c:7e:e2: 44:7b:9e:b6:d7:21:3e:b1:e9:f9:1c:db:82:fe:a2:3d: 5d:61:b2:ad:20:9f:bc:e6:1c:99:a8:54:39:28:13:bc Fingerprint (SHA-256): F1:BE:E0:C3:CE:1E:0C:0E:82:AC:E2:10:47:27:5C:E9:BE:52:EE:DC:34:BE:4D:E9:D4:F6:63:64:F5:77:29:5A Fingerprint (SHA1): FC:38:26:ED:B7:6B:39:B1:F5:66:1D:F6:6F:30:54:5A:B5:9D:23:AA Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5602: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043492 (0x6709ce4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:15:08 2016 Not After : Fri Jan 08 10:15:08 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:31:45:e1:05:52:db:ca:29:49:2f:47:08:b7:f3:f4: f5:58:0c:61:1f:c4:fe:bc:f6:48:1e:bd:0c:bd:4a:66: 73:16:7d:52:49:41:a8:e7:e5:48:f1:a8:e7:5d:fe:9a: fe:8b:f2:29:95:41:94:73:75:9d:fb:50:1d:64:40:96: 03:d2:a5:e4:62:76:aa:4e:81:33:b7:e9:50:ab:88:94: 00:50:b4:06:0e:dc:2c:b9:a0:0b:70:33:5a:e5:b9:6d: 1d:db:04:c9:ad:4d:43:20:d7:b4:05:4d:ea:1f:9b:d1: 93:41:6b:c5:43:69:4b:05:8f:2e:11:77:95:f0:7c:60: 1b:88:9a:23:22:b8:04:16:c3:2d:79:ab:d3:58:61:e6: a3:45:51:2c:d0:1e:29:f0:9d:90:02:c6:5b:3f:3a:24: fa:c8:35:76:55:19:85:e7:3e:e4:e1:43:61:0d:95:b6: ef:d6:3b:54:4b:b5:f1:74:b7:ef:0e:f7:b8:50:78:1e: 00:f8:0c:c9:e5:0c:c1:10:f8:f7:0f:ed:d0:4c:57:bc: 9c:91:74:46:99:94:a4:fe:c1:6f:d8:0f:db:5a:5b:fd: a8:94:d7:b1:7d:05:ce:b0:e4:d1:ff:49:af:69:b6:75: 37:38:84:91:cf:91:fc:ff:27:7f:e3:41:88:0d:4a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:da:41:93:da:c8:03:cf:f7:5b:7c:dc:29:68:54:cc: c7:1a:6b:9d:f8:b7:9c:ec:7f:6c:14:de:55:15:31:00: cb:6e:d3:0d:f6:b3:82:d1:7f:c0:9b:ed:ea:b3:44:30: 54:52:b5:5d:d2:eb:30:e4:e9:73:08:88:2b:ca:68:92: 85:98:e7:c1:e6:5f:5f:04:0f:d5:b5:0a:e7:a3:d2:90: 36:bc:ed:20:fb:93:0b:48:30:13:df:af:94:b1:d1:10: f6:58:9c:7c:02:5a:79:bd:f5:fe:52:a7:22:8d:50:06: 29:84:31:12:10:2e:6a:85:4b:b5:0c:d9:fa:1a:6d:e6: 42:93:21:ae:c5:62:50:f5:cf:40:aa:f3:90:d9:72:5a: e4:34:9c:de:dc:cc:88:d7:b0:ab:4b:35:8c:20:15:ec: 72:a5:2c:4e:67:55:2d:56:db:7b:04:16:14:ea:a1:b9: ec:ae:79:55:77:3a:f1:78:d7:78:74:05:61:3c:25:65: 0e:47:03:22:4a:a2:3e:21:44:6c:aa:3b:ae:3c:88:70: 9c:7f:dc:48:b0:06:55:27:40:26:06:f5:d6:2c:7e:e2: 44:7b:9e:b6:d7:21:3e:b1:e9:f9:1c:db:82:fe:a2:3d: 5d:61:b2:ad:20:9f:bc:e6:1c:99:a8:54:39:28:13:bc Fingerprint (SHA-256): F1:BE:E0:C3:CE:1E:0C:0E:82:AC:E2:10:47:27:5C:E9:BE:52:EE:DC:34:BE:4D:E9:D4:F6:63:64:F5:77:29:5A Fingerprint (SHA1): FC:38:26:ED:B7:6B:39:B1:F5:66:1D:F6:6F:30:54:5A:B5:9D:23:AA Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5603: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5604: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043492 (0x6709ce4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:15:08 2016 Not After : Fri Jan 08 10:15:08 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:31:45:e1:05:52:db:ca:29:49:2f:47:08:b7:f3:f4: f5:58:0c:61:1f:c4:fe:bc:f6:48:1e:bd:0c:bd:4a:66: 73:16:7d:52:49:41:a8:e7:e5:48:f1:a8:e7:5d:fe:9a: fe:8b:f2:29:95:41:94:73:75:9d:fb:50:1d:64:40:96: 03:d2:a5:e4:62:76:aa:4e:81:33:b7:e9:50:ab:88:94: 00:50:b4:06:0e:dc:2c:b9:a0:0b:70:33:5a:e5:b9:6d: 1d:db:04:c9:ad:4d:43:20:d7:b4:05:4d:ea:1f:9b:d1: 93:41:6b:c5:43:69:4b:05:8f:2e:11:77:95:f0:7c:60: 1b:88:9a:23:22:b8:04:16:c3:2d:79:ab:d3:58:61:e6: a3:45:51:2c:d0:1e:29:f0:9d:90:02:c6:5b:3f:3a:24: fa:c8:35:76:55:19:85:e7:3e:e4:e1:43:61:0d:95:b6: ef:d6:3b:54:4b:b5:f1:74:b7:ef:0e:f7:b8:50:78:1e: 00:f8:0c:c9:e5:0c:c1:10:f8:f7:0f:ed:d0:4c:57:bc: 9c:91:74:46:99:94:a4:fe:c1:6f:d8:0f:db:5a:5b:fd: a8:94:d7:b1:7d:05:ce:b0:e4:d1:ff:49:af:69:b6:75: 37:38:84:91:cf:91:fc:ff:27:7f:e3:41:88:0d:4a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:da:41:93:da:c8:03:cf:f7:5b:7c:dc:29:68:54:cc: c7:1a:6b:9d:f8:b7:9c:ec:7f:6c:14:de:55:15:31:00: cb:6e:d3:0d:f6:b3:82:d1:7f:c0:9b:ed:ea:b3:44:30: 54:52:b5:5d:d2:eb:30:e4:e9:73:08:88:2b:ca:68:92: 85:98:e7:c1:e6:5f:5f:04:0f:d5:b5:0a:e7:a3:d2:90: 36:bc:ed:20:fb:93:0b:48:30:13:df:af:94:b1:d1:10: f6:58:9c:7c:02:5a:79:bd:f5:fe:52:a7:22:8d:50:06: 29:84:31:12:10:2e:6a:85:4b:b5:0c:d9:fa:1a:6d:e6: 42:93:21:ae:c5:62:50:f5:cf:40:aa:f3:90:d9:72:5a: e4:34:9c:de:dc:cc:88:d7:b0:ab:4b:35:8c:20:15:ec: 72:a5:2c:4e:67:55:2d:56:db:7b:04:16:14:ea:a1:b9: ec:ae:79:55:77:3a:f1:78:d7:78:74:05:61:3c:25:65: 0e:47:03:22:4a:a2:3e:21:44:6c:aa:3b:ae:3c:88:70: 9c:7f:dc:48:b0:06:55:27:40:26:06:f5:d6:2c:7e:e2: 44:7b:9e:b6:d7:21:3e:b1:e9:f9:1c:db:82:fe:a2:3d: 5d:61:b2:ad:20:9f:bc:e6:1c:99:a8:54:39:28:13:bc Fingerprint (SHA-256): F1:BE:E0:C3:CE:1E:0C:0E:82:AC:E2:10:47:27:5C:E9:BE:52:EE:DC:34:BE:4D:E9:D4:F6:63:64:F5:77:29:5A Fingerprint (SHA1): FC:38:26:ED:B7:6B:39:B1:F5:66:1D:F6:6F:30:54:5A:B5:9D:23:AA Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5605: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5606: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5607: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5608: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043492 (0x6709ce4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:15:08 2016 Not After : Fri Jan 08 10:15:08 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:31:45:e1:05:52:db:ca:29:49:2f:47:08:b7:f3:f4: f5:58:0c:61:1f:c4:fe:bc:f6:48:1e:bd:0c:bd:4a:66: 73:16:7d:52:49:41:a8:e7:e5:48:f1:a8:e7:5d:fe:9a: fe:8b:f2:29:95:41:94:73:75:9d:fb:50:1d:64:40:96: 03:d2:a5:e4:62:76:aa:4e:81:33:b7:e9:50:ab:88:94: 00:50:b4:06:0e:dc:2c:b9:a0:0b:70:33:5a:e5:b9:6d: 1d:db:04:c9:ad:4d:43:20:d7:b4:05:4d:ea:1f:9b:d1: 93:41:6b:c5:43:69:4b:05:8f:2e:11:77:95:f0:7c:60: 1b:88:9a:23:22:b8:04:16:c3:2d:79:ab:d3:58:61:e6: a3:45:51:2c:d0:1e:29:f0:9d:90:02:c6:5b:3f:3a:24: fa:c8:35:76:55:19:85:e7:3e:e4:e1:43:61:0d:95:b6: ef:d6:3b:54:4b:b5:f1:74:b7:ef:0e:f7:b8:50:78:1e: 00:f8:0c:c9:e5:0c:c1:10:f8:f7:0f:ed:d0:4c:57:bc: 9c:91:74:46:99:94:a4:fe:c1:6f:d8:0f:db:5a:5b:fd: a8:94:d7:b1:7d:05:ce:b0:e4:d1:ff:49:af:69:b6:75: 37:38:84:91:cf:91:fc:ff:27:7f:e3:41:88:0d:4a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:da:41:93:da:c8:03:cf:f7:5b:7c:dc:29:68:54:cc: c7:1a:6b:9d:f8:b7:9c:ec:7f:6c:14:de:55:15:31:00: cb:6e:d3:0d:f6:b3:82:d1:7f:c0:9b:ed:ea:b3:44:30: 54:52:b5:5d:d2:eb:30:e4:e9:73:08:88:2b:ca:68:92: 85:98:e7:c1:e6:5f:5f:04:0f:d5:b5:0a:e7:a3:d2:90: 36:bc:ed:20:fb:93:0b:48:30:13:df:af:94:b1:d1:10: f6:58:9c:7c:02:5a:79:bd:f5:fe:52:a7:22:8d:50:06: 29:84:31:12:10:2e:6a:85:4b:b5:0c:d9:fa:1a:6d:e6: 42:93:21:ae:c5:62:50:f5:cf:40:aa:f3:90:d9:72:5a: e4:34:9c:de:dc:cc:88:d7:b0:ab:4b:35:8c:20:15:ec: 72:a5:2c:4e:67:55:2d:56:db:7b:04:16:14:ea:a1:b9: ec:ae:79:55:77:3a:f1:78:d7:78:74:05:61:3c:25:65: 0e:47:03:22:4a:a2:3e:21:44:6c:aa:3b:ae:3c:88:70: 9c:7f:dc:48:b0:06:55:27:40:26:06:f5:d6:2c:7e:e2: 44:7b:9e:b6:d7:21:3e:b1:e9:f9:1c:db:82:fe:a2:3d: 5d:61:b2:ad:20:9f:bc:e6:1c:99:a8:54:39:28:13:bc Fingerprint (SHA-256): F1:BE:E0:C3:CE:1E:0C:0E:82:AC:E2:10:47:27:5C:E9:BE:52:EE:DC:34:BE:4D:E9:D4:F6:63:64:F5:77:29:5A Fingerprint (SHA1): FC:38:26:ED:B7:6B:39:B1:F5:66:1D:F6:6F:30:54:5A:B5:9D:23:AA Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5609: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043492 (0x6709ce4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:15:08 2016 Not After : Fri Jan 08 10:15:08 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:31:45:e1:05:52:db:ca:29:49:2f:47:08:b7:f3:f4: f5:58:0c:61:1f:c4:fe:bc:f6:48:1e:bd:0c:bd:4a:66: 73:16:7d:52:49:41:a8:e7:e5:48:f1:a8:e7:5d:fe:9a: fe:8b:f2:29:95:41:94:73:75:9d:fb:50:1d:64:40:96: 03:d2:a5:e4:62:76:aa:4e:81:33:b7:e9:50:ab:88:94: 00:50:b4:06:0e:dc:2c:b9:a0:0b:70:33:5a:e5:b9:6d: 1d:db:04:c9:ad:4d:43:20:d7:b4:05:4d:ea:1f:9b:d1: 93:41:6b:c5:43:69:4b:05:8f:2e:11:77:95:f0:7c:60: 1b:88:9a:23:22:b8:04:16:c3:2d:79:ab:d3:58:61:e6: a3:45:51:2c:d0:1e:29:f0:9d:90:02:c6:5b:3f:3a:24: fa:c8:35:76:55:19:85:e7:3e:e4:e1:43:61:0d:95:b6: ef:d6:3b:54:4b:b5:f1:74:b7:ef:0e:f7:b8:50:78:1e: 00:f8:0c:c9:e5:0c:c1:10:f8:f7:0f:ed:d0:4c:57:bc: 9c:91:74:46:99:94:a4:fe:c1:6f:d8:0f:db:5a:5b:fd: a8:94:d7:b1:7d:05:ce:b0:e4:d1:ff:49:af:69:b6:75: 37:38:84:91:cf:91:fc:ff:27:7f:e3:41:88:0d:4a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:da:41:93:da:c8:03:cf:f7:5b:7c:dc:29:68:54:cc: c7:1a:6b:9d:f8:b7:9c:ec:7f:6c:14:de:55:15:31:00: cb:6e:d3:0d:f6:b3:82:d1:7f:c0:9b:ed:ea:b3:44:30: 54:52:b5:5d:d2:eb:30:e4:e9:73:08:88:2b:ca:68:92: 85:98:e7:c1:e6:5f:5f:04:0f:d5:b5:0a:e7:a3:d2:90: 36:bc:ed:20:fb:93:0b:48:30:13:df:af:94:b1:d1:10: f6:58:9c:7c:02:5a:79:bd:f5:fe:52:a7:22:8d:50:06: 29:84:31:12:10:2e:6a:85:4b:b5:0c:d9:fa:1a:6d:e6: 42:93:21:ae:c5:62:50:f5:cf:40:aa:f3:90:d9:72:5a: e4:34:9c:de:dc:cc:88:d7:b0:ab:4b:35:8c:20:15:ec: 72:a5:2c:4e:67:55:2d:56:db:7b:04:16:14:ea:a1:b9: ec:ae:79:55:77:3a:f1:78:d7:78:74:05:61:3c:25:65: 0e:47:03:22:4a:a2:3e:21:44:6c:aa:3b:ae:3c:88:70: 9c:7f:dc:48:b0:06:55:27:40:26:06:f5:d6:2c:7e:e2: 44:7b:9e:b6:d7:21:3e:b1:e9:f9:1c:db:82:fe:a2:3d: 5d:61:b2:ad:20:9f:bc:e6:1c:99:a8:54:39:28:13:bc Fingerprint (SHA-256): F1:BE:E0:C3:CE:1E:0C:0E:82:AC:E2:10:47:27:5C:E9:BE:52:EE:DC:34:BE:4D:E9:D4:F6:63:64:F5:77:29:5A Fingerprint (SHA1): FC:38:26:ED:B7:6B:39:B1:F5:66:1D:F6:6F:30:54:5A:B5:9D:23:AA Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5610: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043492 (0x6709ce4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:15:08 2016 Not After : Fri Jan 08 10:15:08 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:31:45:e1:05:52:db:ca:29:49:2f:47:08:b7:f3:f4: f5:58:0c:61:1f:c4:fe:bc:f6:48:1e:bd:0c:bd:4a:66: 73:16:7d:52:49:41:a8:e7:e5:48:f1:a8:e7:5d:fe:9a: fe:8b:f2:29:95:41:94:73:75:9d:fb:50:1d:64:40:96: 03:d2:a5:e4:62:76:aa:4e:81:33:b7:e9:50:ab:88:94: 00:50:b4:06:0e:dc:2c:b9:a0:0b:70:33:5a:e5:b9:6d: 1d:db:04:c9:ad:4d:43:20:d7:b4:05:4d:ea:1f:9b:d1: 93:41:6b:c5:43:69:4b:05:8f:2e:11:77:95:f0:7c:60: 1b:88:9a:23:22:b8:04:16:c3:2d:79:ab:d3:58:61:e6: a3:45:51:2c:d0:1e:29:f0:9d:90:02:c6:5b:3f:3a:24: fa:c8:35:76:55:19:85:e7:3e:e4:e1:43:61:0d:95:b6: ef:d6:3b:54:4b:b5:f1:74:b7:ef:0e:f7:b8:50:78:1e: 00:f8:0c:c9:e5:0c:c1:10:f8:f7:0f:ed:d0:4c:57:bc: 9c:91:74:46:99:94:a4:fe:c1:6f:d8:0f:db:5a:5b:fd: a8:94:d7:b1:7d:05:ce:b0:e4:d1:ff:49:af:69:b6:75: 37:38:84:91:cf:91:fc:ff:27:7f:e3:41:88:0d:4a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:da:41:93:da:c8:03:cf:f7:5b:7c:dc:29:68:54:cc: c7:1a:6b:9d:f8:b7:9c:ec:7f:6c:14:de:55:15:31:00: cb:6e:d3:0d:f6:b3:82:d1:7f:c0:9b:ed:ea:b3:44:30: 54:52:b5:5d:d2:eb:30:e4:e9:73:08:88:2b:ca:68:92: 85:98:e7:c1:e6:5f:5f:04:0f:d5:b5:0a:e7:a3:d2:90: 36:bc:ed:20:fb:93:0b:48:30:13:df:af:94:b1:d1:10: f6:58:9c:7c:02:5a:79:bd:f5:fe:52:a7:22:8d:50:06: 29:84:31:12:10:2e:6a:85:4b:b5:0c:d9:fa:1a:6d:e6: 42:93:21:ae:c5:62:50:f5:cf:40:aa:f3:90:d9:72:5a: e4:34:9c:de:dc:cc:88:d7:b0:ab:4b:35:8c:20:15:ec: 72:a5:2c:4e:67:55:2d:56:db:7b:04:16:14:ea:a1:b9: ec:ae:79:55:77:3a:f1:78:d7:78:74:05:61:3c:25:65: 0e:47:03:22:4a:a2:3e:21:44:6c:aa:3b:ae:3c:88:70: 9c:7f:dc:48:b0:06:55:27:40:26:06:f5:d6:2c:7e:e2: 44:7b:9e:b6:d7:21:3e:b1:e9:f9:1c:db:82:fe:a2:3d: 5d:61:b2:ad:20:9f:bc:e6:1c:99:a8:54:39:28:13:bc Fingerprint (SHA-256): F1:BE:E0:C3:CE:1E:0C:0E:82:AC:E2:10:47:27:5C:E9:BE:52:EE:DC:34:BE:4D:E9:D4:F6:63:64:F5:77:29:5A Fingerprint (SHA1): FC:38:26:ED:B7:6B:39:B1:F5:66:1D:F6:6F:30:54:5A:B5:9D:23:AA Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5611: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043492 (0x6709ce4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:15:08 2016 Not After : Fri Jan 08 10:15:08 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:31:45:e1:05:52:db:ca:29:49:2f:47:08:b7:f3:f4: f5:58:0c:61:1f:c4:fe:bc:f6:48:1e:bd:0c:bd:4a:66: 73:16:7d:52:49:41:a8:e7:e5:48:f1:a8:e7:5d:fe:9a: fe:8b:f2:29:95:41:94:73:75:9d:fb:50:1d:64:40:96: 03:d2:a5:e4:62:76:aa:4e:81:33:b7:e9:50:ab:88:94: 00:50:b4:06:0e:dc:2c:b9:a0:0b:70:33:5a:e5:b9:6d: 1d:db:04:c9:ad:4d:43:20:d7:b4:05:4d:ea:1f:9b:d1: 93:41:6b:c5:43:69:4b:05:8f:2e:11:77:95:f0:7c:60: 1b:88:9a:23:22:b8:04:16:c3:2d:79:ab:d3:58:61:e6: a3:45:51:2c:d0:1e:29:f0:9d:90:02:c6:5b:3f:3a:24: fa:c8:35:76:55:19:85:e7:3e:e4:e1:43:61:0d:95:b6: ef:d6:3b:54:4b:b5:f1:74:b7:ef:0e:f7:b8:50:78:1e: 00:f8:0c:c9:e5:0c:c1:10:f8:f7:0f:ed:d0:4c:57:bc: 9c:91:74:46:99:94:a4:fe:c1:6f:d8:0f:db:5a:5b:fd: a8:94:d7:b1:7d:05:ce:b0:e4:d1:ff:49:af:69:b6:75: 37:38:84:91:cf:91:fc:ff:27:7f:e3:41:88:0d:4a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:da:41:93:da:c8:03:cf:f7:5b:7c:dc:29:68:54:cc: c7:1a:6b:9d:f8:b7:9c:ec:7f:6c:14:de:55:15:31:00: cb:6e:d3:0d:f6:b3:82:d1:7f:c0:9b:ed:ea:b3:44:30: 54:52:b5:5d:d2:eb:30:e4:e9:73:08:88:2b:ca:68:92: 85:98:e7:c1:e6:5f:5f:04:0f:d5:b5:0a:e7:a3:d2:90: 36:bc:ed:20:fb:93:0b:48:30:13:df:af:94:b1:d1:10: f6:58:9c:7c:02:5a:79:bd:f5:fe:52:a7:22:8d:50:06: 29:84:31:12:10:2e:6a:85:4b:b5:0c:d9:fa:1a:6d:e6: 42:93:21:ae:c5:62:50:f5:cf:40:aa:f3:90:d9:72:5a: e4:34:9c:de:dc:cc:88:d7:b0:ab:4b:35:8c:20:15:ec: 72:a5:2c:4e:67:55:2d:56:db:7b:04:16:14:ea:a1:b9: ec:ae:79:55:77:3a:f1:78:d7:78:74:05:61:3c:25:65: 0e:47:03:22:4a:a2:3e:21:44:6c:aa:3b:ae:3c:88:70: 9c:7f:dc:48:b0:06:55:27:40:26:06:f5:d6:2c:7e:e2: 44:7b:9e:b6:d7:21:3e:b1:e9:f9:1c:db:82:fe:a2:3d: 5d:61:b2:ad:20:9f:bc:e6:1c:99:a8:54:39:28:13:bc Fingerprint (SHA-256): F1:BE:E0:C3:CE:1E:0C:0E:82:AC:E2:10:47:27:5C:E9:BE:52:EE:DC:34:BE:4D:E9:D4:F6:63:64:F5:77:29:5A Fingerprint (SHA1): FC:38:26:ED:B7:6B:39:B1:F5:66:1D:F6:6F:30:54:5A:B5:9D:23:AA Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5612: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043492 (0x6709ce4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:15:08 2016 Not After : Fri Jan 08 10:15:08 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:31:45:e1:05:52:db:ca:29:49:2f:47:08:b7:f3:f4: f5:58:0c:61:1f:c4:fe:bc:f6:48:1e:bd:0c:bd:4a:66: 73:16:7d:52:49:41:a8:e7:e5:48:f1:a8:e7:5d:fe:9a: fe:8b:f2:29:95:41:94:73:75:9d:fb:50:1d:64:40:96: 03:d2:a5:e4:62:76:aa:4e:81:33:b7:e9:50:ab:88:94: 00:50:b4:06:0e:dc:2c:b9:a0:0b:70:33:5a:e5:b9:6d: 1d:db:04:c9:ad:4d:43:20:d7:b4:05:4d:ea:1f:9b:d1: 93:41:6b:c5:43:69:4b:05:8f:2e:11:77:95:f0:7c:60: 1b:88:9a:23:22:b8:04:16:c3:2d:79:ab:d3:58:61:e6: a3:45:51:2c:d0:1e:29:f0:9d:90:02:c6:5b:3f:3a:24: fa:c8:35:76:55:19:85:e7:3e:e4:e1:43:61:0d:95:b6: ef:d6:3b:54:4b:b5:f1:74:b7:ef:0e:f7:b8:50:78:1e: 00:f8:0c:c9:e5:0c:c1:10:f8:f7:0f:ed:d0:4c:57:bc: 9c:91:74:46:99:94:a4:fe:c1:6f:d8:0f:db:5a:5b:fd: a8:94:d7:b1:7d:05:ce:b0:e4:d1:ff:49:af:69:b6:75: 37:38:84:91:cf:91:fc:ff:27:7f:e3:41:88:0d:4a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:da:41:93:da:c8:03:cf:f7:5b:7c:dc:29:68:54:cc: c7:1a:6b:9d:f8:b7:9c:ec:7f:6c:14:de:55:15:31:00: cb:6e:d3:0d:f6:b3:82:d1:7f:c0:9b:ed:ea:b3:44:30: 54:52:b5:5d:d2:eb:30:e4:e9:73:08:88:2b:ca:68:92: 85:98:e7:c1:e6:5f:5f:04:0f:d5:b5:0a:e7:a3:d2:90: 36:bc:ed:20:fb:93:0b:48:30:13:df:af:94:b1:d1:10: f6:58:9c:7c:02:5a:79:bd:f5:fe:52:a7:22:8d:50:06: 29:84:31:12:10:2e:6a:85:4b:b5:0c:d9:fa:1a:6d:e6: 42:93:21:ae:c5:62:50:f5:cf:40:aa:f3:90:d9:72:5a: e4:34:9c:de:dc:cc:88:d7:b0:ab:4b:35:8c:20:15:ec: 72:a5:2c:4e:67:55:2d:56:db:7b:04:16:14:ea:a1:b9: ec:ae:79:55:77:3a:f1:78:d7:78:74:05:61:3c:25:65: 0e:47:03:22:4a:a2:3e:21:44:6c:aa:3b:ae:3c:88:70: 9c:7f:dc:48:b0:06:55:27:40:26:06:f5:d6:2c:7e:e2: 44:7b:9e:b6:d7:21:3e:b1:e9:f9:1c:db:82:fe:a2:3d: 5d:61:b2:ad:20:9f:bc:e6:1c:99:a8:54:39:28:13:bc Fingerprint (SHA-256): F1:BE:E0:C3:CE:1E:0C:0E:82:AC:E2:10:47:27:5C:E9:BE:52:EE:DC:34:BE:4D:E9:D4:F6:63:64:F5:77:29:5A Fingerprint (SHA1): FC:38:26:ED:B7:6B:39:B1:F5:66:1D:F6:6F:30:54:5A:B5:9D:23:AA Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5613: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043492 (0x6709ce4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:15:08 2016 Not After : Fri Jan 08 10:15:08 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:31:45:e1:05:52:db:ca:29:49:2f:47:08:b7:f3:f4: f5:58:0c:61:1f:c4:fe:bc:f6:48:1e:bd:0c:bd:4a:66: 73:16:7d:52:49:41:a8:e7:e5:48:f1:a8:e7:5d:fe:9a: fe:8b:f2:29:95:41:94:73:75:9d:fb:50:1d:64:40:96: 03:d2:a5:e4:62:76:aa:4e:81:33:b7:e9:50:ab:88:94: 00:50:b4:06:0e:dc:2c:b9:a0:0b:70:33:5a:e5:b9:6d: 1d:db:04:c9:ad:4d:43:20:d7:b4:05:4d:ea:1f:9b:d1: 93:41:6b:c5:43:69:4b:05:8f:2e:11:77:95:f0:7c:60: 1b:88:9a:23:22:b8:04:16:c3:2d:79:ab:d3:58:61:e6: a3:45:51:2c:d0:1e:29:f0:9d:90:02:c6:5b:3f:3a:24: fa:c8:35:76:55:19:85:e7:3e:e4:e1:43:61:0d:95:b6: ef:d6:3b:54:4b:b5:f1:74:b7:ef:0e:f7:b8:50:78:1e: 00:f8:0c:c9:e5:0c:c1:10:f8:f7:0f:ed:d0:4c:57:bc: 9c:91:74:46:99:94:a4:fe:c1:6f:d8:0f:db:5a:5b:fd: a8:94:d7:b1:7d:05:ce:b0:e4:d1:ff:49:af:69:b6:75: 37:38:84:91:cf:91:fc:ff:27:7f:e3:41:88:0d:4a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:da:41:93:da:c8:03:cf:f7:5b:7c:dc:29:68:54:cc: c7:1a:6b:9d:f8:b7:9c:ec:7f:6c:14:de:55:15:31:00: cb:6e:d3:0d:f6:b3:82:d1:7f:c0:9b:ed:ea:b3:44:30: 54:52:b5:5d:d2:eb:30:e4:e9:73:08:88:2b:ca:68:92: 85:98:e7:c1:e6:5f:5f:04:0f:d5:b5:0a:e7:a3:d2:90: 36:bc:ed:20:fb:93:0b:48:30:13:df:af:94:b1:d1:10: f6:58:9c:7c:02:5a:79:bd:f5:fe:52:a7:22:8d:50:06: 29:84:31:12:10:2e:6a:85:4b:b5:0c:d9:fa:1a:6d:e6: 42:93:21:ae:c5:62:50:f5:cf:40:aa:f3:90:d9:72:5a: e4:34:9c:de:dc:cc:88:d7:b0:ab:4b:35:8c:20:15:ec: 72:a5:2c:4e:67:55:2d:56:db:7b:04:16:14:ea:a1:b9: ec:ae:79:55:77:3a:f1:78:d7:78:74:05:61:3c:25:65: 0e:47:03:22:4a:a2:3e:21:44:6c:aa:3b:ae:3c:88:70: 9c:7f:dc:48:b0:06:55:27:40:26:06:f5:d6:2c:7e:e2: 44:7b:9e:b6:d7:21:3e:b1:e9:f9:1c:db:82:fe:a2:3d: 5d:61:b2:ad:20:9f:bc:e6:1c:99:a8:54:39:28:13:bc Fingerprint (SHA-256): F1:BE:E0:C3:CE:1E:0C:0E:82:AC:E2:10:47:27:5C:E9:BE:52:EE:DC:34:BE:4D:E9:D4:F6:63:64:F5:77:29:5A Fingerprint (SHA1): FC:38:26:ED:B7:6B:39:B1:F5:66:1D:F6:6F:30:54:5A:B5:9D:23:AA Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5614: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5615: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5616: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043522 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5617: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5618: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #5619: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5620: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 108043523 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5621: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5622: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #5623: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5624: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 108043524 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5625: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5626: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #5627: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5628: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 108043525 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5629: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5630: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #5631: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5632: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 108043526 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5633: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5634: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #5635: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5636: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 108043527 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5637: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5638: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #5639: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5640: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 108043528 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5641: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5642: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5643: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043522 (0x6709d02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:20:47 2016 Not After : Fri Jan 08 10:20:47 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ba:51:33:40:65:df:ed:4b:d6:4e:e3:d0:f1:58:03: c6:24:b2:d7:ae:9c:3e:fc:70:2a:88:4c:ac:27:3f:4d: bb:25:15:31:e4:2e:8b:f3:11:44:84:0b:a3:d6:0a:5c: 14:90:e5:23:c9:6f:56:e4:bc:59:45:c8:32:de:ff:76: 0e:d5:f3:18:79:a2:f3:ed:2d:0e:6b:ca:1a:34:41:dd: 00:e0:51:fd:63:d9:ab:b1:59:b0:bb:20:4c:5b:32:ef: dd:84:42:86:fe:e7:68:7f:07:7a:b6:d5:ab:c1:72:eb: 91:b6:b9:62:20:09:6e:9f:23:87:94:49:1c:27:1e:9e: 00:41:db:b4:b3:60:be:27:aa:25:9a:c0:20:e1:9b:11: 68:11:b2:83:48:66:7a:c1:ee:3c:85:65:7f:15:93:fc: 83:3a:a8:55:ed:28:e2:e2:b8:32:13:be:81:a7:42:96: 4c:c1:29:4a:ca:e0:6b:22:62:f5:75:70:ca:0b:c3:c1: 59:0c:ad:a6:fc:8d:a0:23:ce:60:08:08:25:e0:a3:a6: 6d:10:c4:6e:a8:28:68:4a:bf:17:b2:35:18:80:ad:3f: 9b:4f:d1:4a:e3:45:15:85:9e:f1:90:66:0c:10:15:bd: be:f0:59:b9:4c:75:aa:f4:28:50:0d:19:a5:32:27:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:f5:32:94:ba:8a:43:a6:06:19:29:c7:63:85:36:38: 65:7a:d1:0f:e4:7b:3b:fc:76:d4:1c:30:70:41:63:24: 2e:e1:51:f3:d5:79:78:93:e9:57:f5:f1:72:5f:60:20: 07:33:c0:1f:e0:c7:69:f9:ef:8a:fd:14:31:7a:94:c3: e1:4a:3c:19:e8:2c:2b:53:c5:46:2c:4c:91:79:12:5d: ff:2e:c5:4e:ad:57:b5:f3:36:d5:7e:7c:a5:4f:a8:85: 90:7d:12:ef:5a:5e:95:da:75:6e:73:0d:19:90:b7:a9: 64:f1:30:ff:ce:e8:22:ea:a2:db:41:ce:12:b5:e8:8e: 8a:bf:ae:d4:f2:13:39:35:af:01:13:4c:75:cd:40:e8: 93:d7:6f:f8:e4:5c:3f:99:a4:ba:19:51:cb:87:25:17: f4:dd:35:4e:e1:86:ec:8f:b8:f8:77:6e:82:a2:ee:ac: d9:72:41:20:53:72:1b:ef:a9:97:4c:68:b1:8d:6f:bf: 26:0d:34:00:eb:63:c6:0d:5f:0d:03:02:a2:9d:07:56: 39:c4:a4:56:a8:81:a3:f6:16:e2:80:7d:f4:b4:a0:ef: cd:60:14:49:82:f4:eb:b4:b7:8d:8b:94:b4:ab:e9:79: 85:ac:bd:76:b3:54:f0:7a:b0:f6:e1:a5:f0:7e:27:57 Fingerprint (SHA-256): 5F:6C:F6:EC:28:BE:AB:0C:08:78:71:A7:09:0D:80:6A:5C:CD:E4:E3:A3:04:26:29:9E:2B:BC:4B:E1:1F:2D:23 Fingerprint (SHA1): B8:BE:A7:08:4A:62:3D:01:79:51:DC:31:CD:24:AB:E7:71:94:48:1D Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #5644: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5645: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5646: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5647: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043522 (0x6709d02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:20:47 2016 Not After : Fri Jan 08 10:20:47 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ba:51:33:40:65:df:ed:4b:d6:4e:e3:d0:f1:58:03: c6:24:b2:d7:ae:9c:3e:fc:70:2a:88:4c:ac:27:3f:4d: bb:25:15:31:e4:2e:8b:f3:11:44:84:0b:a3:d6:0a:5c: 14:90:e5:23:c9:6f:56:e4:bc:59:45:c8:32:de:ff:76: 0e:d5:f3:18:79:a2:f3:ed:2d:0e:6b:ca:1a:34:41:dd: 00:e0:51:fd:63:d9:ab:b1:59:b0:bb:20:4c:5b:32:ef: dd:84:42:86:fe:e7:68:7f:07:7a:b6:d5:ab:c1:72:eb: 91:b6:b9:62:20:09:6e:9f:23:87:94:49:1c:27:1e:9e: 00:41:db:b4:b3:60:be:27:aa:25:9a:c0:20:e1:9b:11: 68:11:b2:83:48:66:7a:c1:ee:3c:85:65:7f:15:93:fc: 83:3a:a8:55:ed:28:e2:e2:b8:32:13:be:81:a7:42:96: 4c:c1:29:4a:ca:e0:6b:22:62:f5:75:70:ca:0b:c3:c1: 59:0c:ad:a6:fc:8d:a0:23:ce:60:08:08:25:e0:a3:a6: 6d:10:c4:6e:a8:28:68:4a:bf:17:b2:35:18:80:ad:3f: 9b:4f:d1:4a:e3:45:15:85:9e:f1:90:66:0c:10:15:bd: be:f0:59:b9:4c:75:aa:f4:28:50:0d:19:a5:32:27:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:f5:32:94:ba:8a:43:a6:06:19:29:c7:63:85:36:38: 65:7a:d1:0f:e4:7b:3b:fc:76:d4:1c:30:70:41:63:24: 2e:e1:51:f3:d5:79:78:93:e9:57:f5:f1:72:5f:60:20: 07:33:c0:1f:e0:c7:69:f9:ef:8a:fd:14:31:7a:94:c3: e1:4a:3c:19:e8:2c:2b:53:c5:46:2c:4c:91:79:12:5d: ff:2e:c5:4e:ad:57:b5:f3:36:d5:7e:7c:a5:4f:a8:85: 90:7d:12:ef:5a:5e:95:da:75:6e:73:0d:19:90:b7:a9: 64:f1:30:ff:ce:e8:22:ea:a2:db:41:ce:12:b5:e8:8e: 8a:bf:ae:d4:f2:13:39:35:af:01:13:4c:75:cd:40:e8: 93:d7:6f:f8:e4:5c:3f:99:a4:ba:19:51:cb:87:25:17: f4:dd:35:4e:e1:86:ec:8f:b8:f8:77:6e:82:a2:ee:ac: d9:72:41:20:53:72:1b:ef:a9:97:4c:68:b1:8d:6f:bf: 26:0d:34:00:eb:63:c6:0d:5f:0d:03:02:a2:9d:07:56: 39:c4:a4:56:a8:81:a3:f6:16:e2:80:7d:f4:b4:a0:ef: cd:60:14:49:82:f4:eb:b4:b7:8d:8b:94:b4:ab:e9:79: 85:ac:bd:76:b3:54:f0:7a:b0:f6:e1:a5:f0:7e:27:57 Fingerprint (SHA-256): 5F:6C:F6:EC:28:BE:AB:0C:08:78:71:A7:09:0D:80:6A:5C:CD:E4:E3:A3:04:26:29:9E:2B:BC:4B:E1:1F:2D:23 Fingerprint (SHA1): B8:BE:A7:08:4A:62:3D:01:79:51:DC:31:CD:24:AB:E7:71:94:48:1D Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #5648: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5649: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5650: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5651: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043529 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5652: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5653: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5654: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5655: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108043530 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5656: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5657: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5658: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5659: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108043531 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5660: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5661: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5662: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5663: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108043532 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5664: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5665: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5666: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5667: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5668: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5669: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043529 (0x6709d09) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:22:20 2016 Not After : Fri Jan 08 10:22:20 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:2f:ce:57:08:6b:1b:51:61:22:94:91:0d:c0:6c:37: c1:d5:26:f5:04:c2:ee:40:60:52:8b:f0:51:63:43:cc: e6:30:3f:2c:30:f5:71:66:a4:c8:7d:35:bb:b3:2f:67: 3f:51:98:c9:03:31:79:66:a9:87:ff:58:f7:9b:96:4b: b2:fa:8f:8c:38:4f:c7:80:47:28:98:2f:58:de:94:0b: 2f:02:d0:61:da:00:e1:c0:5c:06:b5:0c:da:44:26:35: 9a:58:3b:f1:9a:77:91:96:3d:da:b3:4b:cb:3f:ce:84: 71:42:49:7d:a4:4c:45:f3:7d:81:60:6d:a8:3b:4b:ea: 3d:90:4a:ce:a7:4b:58:e1:ef:46:8a:1d:d2:60:97:90: 66:fd:2b:63:a1:45:ad:2d:38:f1:f0:e7:7d:cc:f2:5e: ae:43:fd:32:c5:57:8e:f8:80:7d:0a:15:61:cc:7e:88: 1e:5e:e1:0b:53:1e:15:da:f4:c0:6e:3d:d7:05:1d:67: 29:4f:56:aa:4d:00:c7:ed:e2:b8:bd:8c:76:8d:d6:ae: 04:13:23:07:ff:a0:a1:2b:38:bf:a3:a6:23:1e:ef:87: 27:f6:6b:b2:7e:d0:1c:2f:88:ce:99:eb:38:64:d4:60: ae:fc:e7:b4:d2:0a:89:c8:f2:97:03:bb:6d:33:3d:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:c1:5f:15:6e:1f:50:d8:5d:28:08:b2:0a:31:8a:bd: 5f:1a:d9:1b:bd:d9:e9:a8:fe:6d:d6:64:93:93:f7:5c: d5:1a:fd:30:d1:4a:51:99:64:e8:4f:fb:33:2f:56:f1: 54:0e:03:09:2f:bf:94:b5:c9:bd:1e:99:4c:3c:e7:13: 03:6a:c7:2a:bf:3d:27:c2:76:f5:60:d5:43:05:22:27: cf:5d:a4:4c:13:8b:7d:57:82:66:cd:b9:1a:65:d2:de: 67:c1:30:e0:5a:7e:c7:27:d3:c9:bf:a2:b3:2a:65:c5: c6:4b:03:62:fa:b7:38:96:80:24:ba:e3:08:5d:8f:aa: 7b:85:bc:1f:7a:31:e7:bb:d2:62:84:4d:58:dc:8e:ba: d6:51:f7:fa:e9:62:46:99:83:fa:13:91:76:2e:4d:7f: c2:58:e4:f4:b8:19:01:35:26:21:61:eb:73:0b:8c:e3: ae:3c:61:96:d1:1e:b1:18:d4:50:aa:1d:8d:e7:35:60: 5b:82:86:c3:59:96:50:0d:4b:44:6e:49:2a:13:2c:75: b4:6e:bb:6d:cc:75:4f:7a:d2:3d:9d:44:8f:b1:fe:89: fc:34:76:36:38:0c:34:87:74:01:1d:62:13:ff:32:0a: ee:dc:7f:c5:0d:28:56:ef:10:dc:79:db:15:88:31:31 Fingerprint (SHA-256): 85:51:BF:CD:A4:74:3F:DC:95:E4:D1:DE:92:85:C7:85:4D:55:8E:CD:9C:86:D2:2D:C3:91:7F:14:A0:30:4D:56 Fingerprint (SHA1): 38:38:0B:E9:50:59:4C:65:4A:21:2B:C7:02:51:7D:87:1C:54:54:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5670: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5671: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5672: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043530 (0x6709d0a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:22:36 2016 Not After : Fri Jan 08 10:22:36 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:0e:10:a1:45:f2:a1:6b:6c:1b:51:e4:35:af:3f:73: 81:54:0c:57:84:bb:99:dc:e7:90:ed:3a:b7:72:4c:66: 1e:d9:c7:99:34:bc:ac:aa:87:f4:53:d3:e6:78:7b:3a: b2:77:2d:2b:0f:57:ed:7b:af:13:9f:8c:93:f0:ed:7e: 0f:3f:3c:e4:19:9f:74:e0:94:01:8f:e8:7b:e2:79:1a: c4:a3:fa:c9:7b:f4:b8:03:c8:e6:13:13:c3:75:9c:19: fd:7a:bb:90:85:e2:b4:b5:b5:ae:20:bd:fb:88:99:45: 7a:99:ac:9c:21:5d:9d:6b:ca:f3:83:02:16:00:c4:d8: 23:dc:59:3f:41:64:bd:37:0c:52:65:e9:34:9d:c0:c0: 71:07:5a:c1:37:5a:6c:01:a2:50:8f:4f:0e:a8:e1:3f: 4f:38:d4:c5:de:bc:47:81:f8:82:8e:f8:bd:80:88:80: 63:55:f6:95:f5:f6:ff:58:48:11:22:4d:b8:17:f8:a3: c9:eb:8e:47:77:d8:0b:49:83:fe:d6:ff:7e:ee:9b:fb: df:f7:8b:e5:81:cd:7d:b6:96:93:ed:a9:db:e7:23:28: 43:ea:c9:af:b4:24:d2:4f:54:f7:24:95:a2:7c:43:39: 3e:55:96:7d:30:a2:9b:d0:d5:4c:8a:00:33:c8:7a:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ab:3d:27:e7:06:4c:bc:71:1e:85:ca:61:34:4c:bd:eb: e9:c9:05:fd:4a:09:72:d3:67:55:a4:b4:c1:9b:4c:ae: 47:dc:33:d5:a2:b0:52:ac:15:54:d8:73:cc:97:e1:ec: 5b:f3:dd:f2:24:f3:12:e5:ba:27:b9:ef:65:4a:b1:35: b5:ca:25:7e:3b:d4:e4:bd:ad:da:05:2b:53:c6:b6:c9: f8:18:f8:cb:e0:bc:9c:e9:8e:e4:ad:81:28:04:89:ee: 3a:84:9a:61:3b:55:7e:84:44:84:11:16:f9:2a:86:2a: 7c:21:85:ab:a8:d8:b7:c4:9b:4c:63:cc:65:a0:f0:f7: 07:1c:89:ba:24:04:85:38:21:1f:74:b4:b0:9c:be:02: 60:15:bb:7a:3b:66:4e:0f:c0:f1:7c:fb:24:2c:74:66: 6f:1e:4d:c7:f5:e9:93:33:ec:43:98:df:9c:6b:a9:b2: 30:19:2c:8a:ab:09:ab:a4:b6:ad:be:0f:7a:bf:3b:db: ab:65:80:7c:5b:13:9a:f2:b8:45:fd:16:a4:88:ff:46: 41:48:8a:60:11:f5:39:5a:39:aa:e7:ef:8d:a6:5b:f2: 40:16:90:61:58:f7:80:33:79:73:69:2c:18:29:73:96: 0a:10:15:ef:3f:f9:4b:36:56:96:a7:18:25:74:5e:96 Fingerprint (SHA-256): 49:A8:6F:EE:EB:B8:CE:BA:EA:9B:5A:4A:CA:BE:70:E0:83:74:A5:33:B0:32:95:40:2C:AC:0C:BD:7A:A3:8A:7D Fingerprint (SHA1): F8:8F:44:C8:77:38:64:29:EC:58:C2:8A:73:83:CB:C5:34:0E:82:E8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5673: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5674: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043531 (0x6709d0b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 10:22:46 2016 Not After : Fri Jan 08 10:22:46 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:5c:fb:12:60:44:79:a9:52:12:1c:4d:f9:43:ba:fb: 7d:1c:2d:a1:51:9e:c6:4e:df:81:bb:ef:5e:21:0d:62: 22:b4:3a:ae:1d:e3:07:74:e5:38:83:90:cf:60:79:91: a7:a9:81:1a:84:33:41:8c:5b:67:2b:ad:7d:e8:cd:6c: 78:9c:c5:78:e1:aa:15:d3:ed:48:7e:86:e5:7d:a4:01: 82:6d:8e:9e:42:0d:2e:3d:62:52:90:fa:33:15:83:49: c6:33:29:de:a6:bb:e0:04:df:26:d0:bd:17:65:3d:b2: 1f:0c:72:ab:36:8d:51:0b:9e:ed:24:62:2c:9e:9c:35: 14:9a:26:28:68:0a:83:df:ab:0d:40:50:ba:00:66:b7: 81:00:2f:60:ad:61:2c:df:d7:53:21:7c:d7:ff:d7:28: 22:ff:6a:5a:7e:56:ec:85:68:20:d0:aa:e2:4a:78:5e: f7:09:5d:ee:f3:5a:9c:f3:7e:f5:66:e8:34:1b:cc:11: aa:57:2f:24:67:20:59:06:e6:01:be:0c:f5:34:b5:8a: df:6e:e5:b6:7a:c8:79:97:e8:f9:56:4c:61:6f:f0:4d: bb:3c:f3:ed:8e:4e:4b:e6:08:33:e1:c5:81:69:65:6b: 17:f8:52:a4:b2:96:5e:09:f7:b4:d5:43:78:26:27:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:d9:64:50:9e:9e:f9:42:c7:ec:c8:6c:91:ef:2f:cb: 02:d7:cf:29:99:f4:1e:78:4f:ee:21:c8:fe:08:e9:c8: a1:f2:66:15:7d:34:74:08:f8:6d:3b:ff:80:06:cb:c9: f7:ee:ea:71:25:8a:79:e0:9e:cd:50:79:31:84:96:ae: ea:96:02:69:84:8e:ee:cc:a8:fe:9d:9d:b4:45:13:c3: ba:5d:46:9c:62:b7:d4:c7:c9:04:b6:37:a6:3f:4c:7c: 92:9a:fe:83:d5:bd:19:2b:e4:64:b7:ea:28:66:1a:bd: 89:47:01:05:91:81:f6:25:d0:47:81:c9:b7:e3:11:b8: e5:2e:0c:d7:28:e8:19:4f:71:13:f4:72:28:c1:35:1a: 4c:ff:5a:9e:d7:60:04:7b:22:14:8a:cc:42:10:35:e0: fe:6f:fd:ef:0d:52:ab:56:20:5a:39:1e:59:91:7f:8c: 48:a1:32:0c:88:fb:16:c6:b3:4d:ed:be:aa:a7:7d:0f: 66:b8:aa:3a:b1:26:c1:39:11:a6:ef:d1:12:47:ea:f7: bf:a2:82:84:3e:c4:5c:de:5f:f8:13:01:91:19:2a:39: 2e:77:51:3a:06:86:e9:a5:73:4d:8f:a9:51:e6:1d:22: 58:34:62:23:09:17:d6:c5:95:43:d0:50:6f:70:35:44 Fingerprint (SHA-256): 66:01:04:18:55:A5:2F:6F:05:E7:57:38:6A:58:E9:6F:4A:4B:71:89:5D:51:36:1E:A6:D8:63:FD:65:3D:E0:1F Fingerprint (SHA1): 53:D0:90:EF:A0:F9:FC:5B:02:ED:5C:1E:62:18:49:9B:CB:07:27:FA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5675: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5676: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043533 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5677: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5678: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5679: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5680: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108043534 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5681: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5682: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5683: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5684: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108043535 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5685: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5686: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5687: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5688: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 108043536 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5689: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5690: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5691: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5692: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 108043537 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5693: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5694: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5695: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5696: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5697: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5698: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #5699: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043533 (0x6709d0d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:23:08 2016 Not After : Fri Jan 08 10:23:08 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:9e:70:53:4e:f8:73:66:46:94:18:a7:53:d9:cb:03: cc:70:3d:24:6c:be:e3:0e:8f:8b:d9:b8:8b:57:2c:67: ed:65:2c:d6:2d:20:ba:19:89:fb:71:f2:0b:84:22:ef: 29:0a:ca:98:39:1a:60:16:79:bb:f7:46:89:00:ba:d1: 11:a7:b1:b8:ce:a5:b4:47:41:95:dd:ee:ee:c7:54:6d: 20:2f:5d:a5:e6:e4:89:1d:08:fc:9d:ab:35:30:b7:4c: fd:bc:df:c0:04:45:61:55:41:36:4c:c5:d2:7b:1e:d2: dc:81:1f:bb:a0:b4:3f:04:cf:ee:e9:46:0a:14:55:41: 9e:42:2b:0d:80:40:2e:8c:09:33:0c:22:f3:f7:0a:f3: 45:fc:91:83:5a:fc:f4:34:6c:1f:21:6a:c9:0b:29:78: 46:3d:39:f6:2a:a0:bf:f6:8b:f7:07:cf:01:ff:7e:0f: c9:b7:b7:d0:ea:f0:fe:90:b0:90:a1:f1:af:0a:f9:f7: 4f:df:42:a0:9e:a7:b5:70:74:9a:fc:1b:f1:22:c8:32: 95:0a:5b:d0:d7:e1:f1:a9:4c:b6:cb:a5:3d:05:d3:e5: 81:a8:1f:8d:25:13:ba:cf:9b:4f:63:d0:8e:f0:a4:dd: 7e:c5:2f:49:c3:52:a0:31:e8:1b:0e:99:9c:cb:f5:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c8:f8:51:3a:fd:4a:6c:49:84:88:d7:23:c1:47:76:8f: 02:f9:4a:21:67:f0:fa:70:2e:0a:70:1e:39:a0:1e:cb: 33:1a:04:ba:b1:b7:45:72:b4:bf:97:4b:81:b4:a1:ad: 76:85:d0:71:45:74:1f:29:77:8b:ea:f6:8a:85:4d:b8: 36:a6:b8:69:63:fc:17:63:5c:53:1a:5c:2c:85:19:3e: 72:e0:40:c7:f0:3d:5a:9d:d3:46:e8:01:ee:9e:ab:37: ff:ff:cd:d2:4d:86:eb:65:31:5e:77:e0:58:cd:c1:af: 94:5d:69:5b:51:a3:33:70:47:e1:31:8a:ef:32:16:93: 19:b4:87:97:de:29:94:21:d5:2a:e9:29:05:68:48:1e: 12:26:49:91:b4:10:b4:85:09:4b:d7:69:e7:21:66:15: b6:03:b8:56:bc:e3:a3:0f:dc:9a:55:6e:4a:b3:a8:13: 58:04:8b:c1:61:94:ab:8a:84:1c:54:88:92:32:1f:93: 94:b2:89:d9:e6:04:70:8a:94:41:cd:a4:0d:5a:c2:2b: c8:01:11:a9:17:ab:08:f5:13:d6:84:22:08:b6:f6:a8: 06:a4:56:be:f4:fa:42:af:fc:61:4d:ef:35:a2:e9:e4: 64:ce:28:20:62:ed:80:65:42:13:8c:14:a1:da:66:83 Fingerprint (SHA-256): 31:FE:A8:8C:91:BF:95:CC:E7:6B:8E:42:77:4E:05:4C:40:FE:B6:50:80:12:FB:4D:D0:B4:D6:7F:3C:5A:CD:FE Fingerprint (SHA1): 8D:69:CF:F3:BB:1B:2A:5B:75:49:BF:3B:2A:68:D0:8F:DF:4E:BE:73 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5700: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5701: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043534 (0x6709d0e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:23:23 2016 Not After : Fri Jan 08 10:23:23 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:3a:4c:5e:46:a4:98:1d:18:13:87:90:a1:9d:8e:6a: 67:56:db:88:8c:79:61:54:5e:62:f7:fa:28:32:45:d8: e0:af:51:8e:f5:53:ed:59:7f:1a:6c:32:87:5b:89:0d: e3:e4:16:c5:4c:31:97:83:7b:f2:3e:bf:ab:41:ab:e4: d3:29:ed:13:49:bc:d9:87:2e:6e:ca:f3:d2:a2:70:01: 37:07:52:eb:84:f4:f3:c4:fc:7b:1e:88:44:26:20:be: d5:7c:55:d8:a9:21:7c:d0:fe:62:db:38:21:7b:3d:66: 05:c0:3c:10:64:bc:52:9c:1c:e7:96:ff:fb:b7:88:0d: 8e:18:26:bb:bb:38:6b:a7:d3:50:6d:aa:c6:7a:02:3c: 24:46:3c:96:ec:06:5f:8f:a8:d5:b8:98:0f:8d:98:41: 18:3b:5d:0b:13:c9:8b:ef:de:1f:49:41:e7:24:ff:04: f8:20:23:fc:01:ee:00:41:13:bb:ce:87:33:89:63:5b: c1:44:17:33:e8:47:a5:32:e0:fe:54:be:6b:c9:74:a4: ef:e3:d9:50:3c:0e:4b:4d:91:86:95:09:e3:98:c3:ae: b1:70:a2:ae:61:47:69:85:e1:d2:49:d4:a1:72:76:ab: 3d:d8:29:f8:fd:be:28:44:76:a8:29:47:93:0a:94:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:ee:95:8a:74:e1:b6:81:a8:cf:a4:91:cd:19:3b:d3: ea:e1:b9:fa:d6:67:44:c7:7e:6a:e9:2a:88:f9:56:8f: 89:1b:24:d1:91:39:bb:08:d9:5a:7c:7f:00:06:96:b0: 0c:62:25:85:bd:8e:7a:f8:85:35:08:d1:e5:12:c8:f7: bf:55:d5:db:61:0c:7d:12:80:15:39:46:35:ee:88:d1: e5:30:cc:da:1d:1d:3c:95:68:11:e5:5d:90:cf:cd:e9: 70:46:39:9a:5b:fc:d0:45:52:98:ce:fe:b3:29:08:2f: fa:b0:66:01:f7:e7:f7:19:5e:b9:2d:84:bd:13:09:8d: 57:8d:86:4e:3f:67:85:68:df:9a:df:6d:d0:e1:f3:b4: 57:4d:90:0a:d0:51:6e:bf:3c:d7:85:60:69:2b:fe:aa: a4:21:32:57:e7:fe:44:a8:af:92:e2:c6:dd:be:d5:3b: 7c:47:3f:10:71:6e:3e:ed:8e:3b:e5:66:ae:77:2c:2f: 98:6e:7f:c6:59:fc:cc:f7:6a:92:cc:92:f8:f1:56:0c: 27:35:e4:3f:83:53:80:18:07:31:fe:c4:68:1f:67:da: 4d:b9:6b:42:23:22:50:ce:c7:79:ea:0c:a9:62:ea:3a: de:a9:f4:d3:82:db:5a:cb:2f:eb:86:71:5c:e4:f4:8f Fingerprint (SHA-256): 88:F7:D5:70:25:BD:05:13:87:2D:5D:4F:C7:91:56:AA:B7:49:3C:43:CF:79:E8:45:2A:AA:A0:69:89:1C:EF:95 Fingerprint (SHA1): CB:DA:92:63:21:8E:88:77:FD:7F:56:AB:81:56:46:EF:A0:C2:3D:04 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5702: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5703: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5704: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043535 (0x6709d0f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 10:23:30 2016 Not After : Fri Jan 08 10:23:30 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:3d:af:02:6f:a1:ea:16:90:1e:43:8b:fe:05:0f:2e: 24:c7:f8:a5:86:40:2b:18:a2:95:51:7e:3a:f2:28:77: bb:7c:22:30:69:33:57:53:a9:81:31:68:09:f5:07:73: 1b:b7:83:e2:aa:96:b5:71:d9:d9:4b:74:4a:71:d9:c5: 55:e8:55:62:f0:ed:a4:a5:54:37:2c:d7:82:cf:a8:e1: 5d:28:8d:02:ff:b2:90:3d:f9:3e:78:86:1f:ae:d3:e5: 0d:e8:eb:4c:68:06:b2:fb:32:80:7d:84:3e:2f:c1:6e: 45:ce:9e:6a:e5:8c:e2:35:9a:1e:20:e5:d9:68:d8:1d: 5f:fd:a7:f0:57:6b:ba:6a:c3:24:69:58:7e:ac:3c:0b: 33:af:2d:1a:eb:cd:43:7d:39:34:94:e0:3d:eb:f2:57: c5:64:bb:03:44:b7:47:e3:7f:d9:b8:ce:ce:9c:85:d5: cd:a8:62:0d:25:de:79:b2:9d:22:a1:9e:59:87:67:e0: 13:fe:53:4a:e2:5b:5e:f3:e7:8f:16:6f:db:c4:b4:88: 0b:24:87:8e:5b:f8:08:0a:9a:9a:d1:d0:fc:fb:50:2f: df:69:84:35:2f:34:69:66:08:c4:9c:ba:79:d6:ac:fc: 19:15:9c:b4:f5:8d:c1:20:df:c7:87:ef:fe:99:2d:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:36:a4:fb:03:36:b1:5a:3e:77:a8:c4:57:c2:ef:25: 1a:df:a5:ac:ea:a8:54:1e:f5:90:74:92:f6:df:7e:ec: 57:70:9b:5c:bc:5c:d3:34:be:5e:bd:94:30:98:9e:62: ea:1f:ce:bc:64:30:a1:0c:7b:79:e6:c0:3e:d9:4e:e8: 2b:df:03:58:49:32:7f:2a:e4:62:ed:cd:d0:9c:26:18: 5c:68:de:d3:30:40:9e:a7:a1:c5:c1:63:c0:2e:33:fc: f8:54:be:cf:e9:07:50:5a:9d:2e:6e:c0:54:06:ce:ad: 6a:5d:71:0a:5d:71:05:7d:36:e6:2b:17:16:7f:17:4f: 77:84:fe:e5:70:16:e8:d2:d1:25:0d:94:73:cf:91:5f: cd:01:32:da:7f:a9:6a:c2:ae:d2:60:33:ba:f8:71:8c: fb:d9:56:41:78:e6:e5:83:d1:00:0f:83:7a:e8:ae:01: 2b:fe:2c:43:fc:ec:f7:d4:b2:34:56:e2:b9:f2:2d:41: 75:bf:1e:bf:a9:81:8a:9f:1f:3c:22:f3:18:e6:8e:a8: 42:ce:e1:39:4a:4a:9c:b3:fb:63:31:6d:70:01:9d:4f: 1e:c0:50:b4:4c:35:dc:0f:d4:d0:f8:10:13:43:68:3f: c1:d1:4c:2f:db:5f:4f:05:ac:43:21:a2:7e:bc:b2:09 Fingerprint (SHA-256): 11:8A:BD:31:63:99:12:49:81:C8:C7:1C:FF:FC:2B:34:5A:90:9C:AB:08:7D:6E:0C:E5:33:B4:15:AC:80:36:F0 Fingerprint (SHA1): 8F:4A:64:F1:FE:83:09:9B:A5:DB:CF:10:83:40:7E:40:75:1E:F7:E4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #5705: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5706: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043538 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5707: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5708: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5709: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5710: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108043539 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5711: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5712: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5713: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5714: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108043540 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA1Root-108043317.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5715: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5716: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5717: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5718: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108043541 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5719: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5720: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #5721: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043538 (0x6709d12) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:23:59 2016 Not After : Fri Jan 08 10:23:59 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:6e:23:3e:f9:3c:fd:0e:64:83:1f:e8:50:05:6d:c3: 10:a8:e2:2b:11:5e:e3:af:b5:b7:73:cc:4b:5a:39:85: f2:54:9d:57:4f:db:07:c4:fc:09:c0:b7:d0:c8:ee:f5: f0:98:c6:4b:a6:6d:1c:4f:be:e8:44:99:2d:9e:68:b9: 02:18:01:cb:1a:f3:b6:4c:4b:e0:8d:1d:0c:c9:a3:8b: 23:7f:e9:f8:87:66:05:13:6c:ca:9d:08:f8:6e:1b:0a: e2:ce:72:eb:02:6e:af:8b:78:1c:a9:65:32:75:7e:61: 91:32:d2:7b:51:68:ca:16:06:fa:92:96:a9:56:a6:89: 16:be:6b:e2:ee:b8:c4:7e:8a:a8:f6:a0:14:de:1c:0a: 18:84:42:d6:76:ac:41:0d:77:f1:2d:c5:d6:ea:79:5c: 98:93:94:f0:93:7b:0d:4d:aa:ed:f9:a1:b9:72:22:8b: 7c:d1:8e:47:c3:a1:72:67:84:0f:28:b0:eb:7c:8f:30: eb:7d:88:5e:c1:eb:bf:3b:91:4e:b1:25:db:85:a2:f8: 00:77:93:bf:ce:91:04:48:ea:6b:42:f0:b9:4c:cd:fb: 30:30:ff:e8:39:47:fa:3b:0a:73:06:61:ff:f8:4f:a5: 06:7b:23:53:10:51:30:0b:31:af:ae:6b:67:38:76:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:d2:ec:db:4f:e3:21:39:4d:a4:b5:1b:ce:c0:06:26: be:98:37:bf:44:d8:6a:4a:27:91:4e:83:21:a6:0d:50: e7:1f:49:ac:eb:66:f9:6e:1f:19:80:ce:e5:cc:d3:36: 9c:ac:8b:91:26:d2:3c:52:3d:4e:4f:14:cb:53:e9:be: 88:0d:9a:1c:07:98:13:8d:c4:b6:d6:78:f5:23:c2:ac: 07:8e:43:cd:0d:03:19:36:c2:ce:35:1c:99:98:48:ba: c7:b5:c0:16:e4:cf:c2:26:1f:52:9a:d5:d4:6f:e5:3f: c6:f5:86:c7:6e:2c:56:f9:c0:7c:a0:81:57:d7:17:86: e6:a0:7e:06:9f:ef:c2:11:35:2d:88:f4:33:c1:f7:a6: 1c:97:1d:7a:c9:78:56:0f:85:bb:a1:03:f3:ad:66:32: 2a:0b:66:f5:c9:7e:8d:0d:e4:40:83:3f:d0:5b:45:b9: 38:ea:04:b2:15:b8:c7:d7:f7:44:6d:94:e1:16:27:e0: 9f:86:6a:93:85:b2:5f:0c:d8:14:cd:1c:b2:00:7a:28: 90:f7:7b:c2:f3:88:ad:cb:91:4e:86:fb:6f:80:50:aa: 3b:e5:24:99:ec:43:2a:b5:2a:ab:d1:3a:50:ba:81:a6: 22:2c:3e:ce:bc:33:f2:ca:57:2d:d3:de:db:88:53:ea Fingerprint (SHA-256): 91:90:8E:52:DB:19:54:C9:04:32:5E:1A:8E:F7:37:38:91:AF:66:5C:F3:00:E8:42:11:98:6F:35:BF:DD:BC:E9 Fingerprint (SHA1): 49:44:8F:B1:20:A6:EA:4A:E0:76:51:A4:57:7F:F9:86:5A:27:0F:0D Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5722: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5723: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043542 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5724: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5725: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5726: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043543 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5727: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5728: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5729: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5730: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108043544 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5731: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5732: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108043545 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5733: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5734: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5735: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5736: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5737: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108043546 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-Bridge-108043318.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5738: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5739: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5740: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5741: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108043547 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5742: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5743: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5744: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5745: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043543 (0x6709d17) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 10:25:01 2016 Not After : Fri Jan 08 10:25:01 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:8f:dc:3e:87:f7:2c:5e:f1:3d:a2:5b:84:89:bd:8a: d5:b3:a9:f3:9e:32:2c:f7:9a:a8:ff:23:7a:40:41:43: 91:c7:9a:88:bb:37:5b:b7:aa:9e:31:d0:52:eb:9c:8c: 5d:8c:9b:bb:52:1b:84:e6:f3:e9:6d:7f:11:da:da:83: 0c:3b:84:26:a2:c9:03:29:3e:92:96:c9:83:61:3a:70: bc:a8:9e:ba:cb:6b:20:55:d4:66:4b:7d:6c:19:40:8c: 20:ba:70:0e:d8:e5:90:6a:d6:54:df:4d:c4:9d:b8:e2: 54:fd:a7:2f:80:a3:41:56:e2:3e:80:d5:b3:da:8d:d4: 31:d5:2c:d3:20:79:30:ba:9b:53:8e:4f:35:05:7e:2d: 6f:66:5f:d6:3d:46:3a:86:2f:dc:6e:f8:65:fc:ec:b0: 46:c9:15:b7:fe:1f:5f:0a:93:af:13:07:ee:ef:27:5d: aa:96:73:e9:34:89:64:4f:31:d6:cf:71:ea:c1:48:c0: f4:e9:90:1b:f7:9d:71:36:83:79:5a:60:9f:72:26:43: 68:7c:d1:50:37:df:cf:c8:15:23:32:d9:3b:88:56:7d: 53:58:f1:d5:b5:46:f2:f6:e7:ab:82:25:f8:ad:28:d7: 03:0b:1a:f7:a0:af:05:c9:89:41:a3:83:61:1f:f7:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:bd:c3:8f:27:70:13:40:7a:bd:52:fb:92:9d:5e:da: 02:09:ab:2a:a5:17:9a:67:5f:90:a6:36:ec:68:36:92: 9b:6b:16:ac:83:e6:d8:cf:f0:5a:f2:79:63:00:89:65: 91:f0:7e:7f:b5:3e:87:e3:b2:ca:cb:c9:05:62:00:80: c5:10:85:ae:db:e6:e4:25:e0:be:70:b5:ab:c5:5d:7e: be:e4:67:9a:16:a9:93:39:3a:eb:0c:ec:a7:66:63:bc: 7e:33:04:84:a3:39:f8:1a:08:3f:82:ce:74:31:6d:19: bb:f3:25:88:5c:22:66:e3:84:b4:14:3a:3a:f6:3c:6e: 8d:fd:06:db:06:11:e5:39:8d:90:a2:0f:43:13:17:fa: a4:76:e8:e3:35:f2:90:4f:27:bb:b0:8f:5a:97:bb:c1: 2e:3e:83:b7:0e:b4:0a:4f:e3:c9:32:b3:69:5a:77:4f: cd:7b:52:03:3f:90:ad:76:24:f3:77:ad:c6:b4:6f:cb: 23:d9:c1:37:d5:fd:32:26:dc:54:04:04:b2:59:f0:a7: f7:32:34:21:86:aa:96:c7:43:60:71:5c:ae:00:20:95: 4b:57:17:69:bc:13:bb:3b:8b:a9:7f:f7:9f:48:ab:bc: 51:f0:66:8d:90:8d:63:2c:92:da:7b:da:1a:2f:2f:9a Fingerprint (SHA-256): F5:6A:DE:1A:80:DC:25:FD:19:8B:58:CB:0A:8B:01:60:32:9D:7E:6B:95:30:00:C2:B2:08:40:01:CF:30:D1:9A Fingerprint (SHA1): 3F:05:FF:B7:33:BE:F9:3D:BC:6E:73:73:66:C1:8F:92:71:F3:61:E7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5746: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043543 (0x6709d17) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 10:25:01 2016 Not After : Fri Jan 08 10:25:01 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:8f:dc:3e:87:f7:2c:5e:f1:3d:a2:5b:84:89:bd:8a: d5:b3:a9:f3:9e:32:2c:f7:9a:a8:ff:23:7a:40:41:43: 91:c7:9a:88:bb:37:5b:b7:aa:9e:31:d0:52:eb:9c:8c: 5d:8c:9b:bb:52:1b:84:e6:f3:e9:6d:7f:11:da:da:83: 0c:3b:84:26:a2:c9:03:29:3e:92:96:c9:83:61:3a:70: bc:a8:9e:ba:cb:6b:20:55:d4:66:4b:7d:6c:19:40:8c: 20:ba:70:0e:d8:e5:90:6a:d6:54:df:4d:c4:9d:b8:e2: 54:fd:a7:2f:80:a3:41:56:e2:3e:80:d5:b3:da:8d:d4: 31:d5:2c:d3:20:79:30:ba:9b:53:8e:4f:35:05:7e:2d: 6f:66:5f:d6:3d:46:3a:86:2f:dc:6e:f8:65:fc:ec:b0: 46:c9:15:b7:fe:1f:5f:0a:93:af:13:07:ee:ef:27:5d: aa:96:73:e9:34:89:64:4f:31:d6:cf:71:ea:c1:48:c0: f4:e9:90:1b:f7:9d:71:36:83:79:5a:60:9f:72:26:43: 68:7c:d1:50:37:df:cf:c8:15:23:32:d9:3b:88:56:7d: 53:58:f1:d5:b5:46:f2:f6:e7:ab:82:25:f8:ad:28:d7: 03:0b:1a:f7:a0:af:05:c9:89:41:a3:83:61:1f:f7:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:bd:c3:8f:27:70:13:40:7a:bd:52:fb:92:9d:5e:da: 02:09:ab:2a:a5:17:9a:67:5f:90:a6:36:ec:68:36:92: 9b:6b:16:ac:83:e6:d8:cf:f0:5a:f2:79:63:00:89:65: 91:f0:7e:7f:b5:3e:87:e3:b2:ca:cb:c9:05:62:00:80: c5:10:85:ae:db:e6:e4:25:e0:be:70:b5:ab:c5:5d:7e: be:e4:67:9a:16:a9:93:39:3a:eb:0c:ec:a7:66:63:bc: 7e:33:04:84:a3:39:f8:1a:08:3f:82:ce:74:31:6d:19: bb:f3:25:88:5c:22:66:e3:84:b4:14:3a:3a:f6:3c:6e: 8d:fd:06:db:06:11:e5:39:8d:90:a2:0f:43:13:17:fa: a4:76:e8:e3:35:f2:90:4f:27:bb:b0:8f:5a:97:bb:c1: 2e:3e:83:b7:0e:b4:0a:4f:e3:c9:32:b3:69:5a:77:4f: cd:7b:52:03:3f:90:ad:76:24:f3:77:ad:c6:b4:6f:cb: 23:d9:c1:37:d5:fd:32:26:dc:54:04:04:b2:59:f0:a7: f7:32:34:21:86:aa:96:c7:43:60:71:5c:ae:00:20:95: 4b:57:17:69:bc:13:bb:3b:8b:a9:7f:f7:9f:48:ab:bc: 51:f0:66:8d:90:8d:63:2c:92:da:7b:da:1a:2f:2f:9a Fingerprint (SHA-256): F5:6A:DE:1A:80:DC:25:FD:19:8B:58:CB:0A:8B:01:60:32:9D:7E:6B:95:30:00:C2:B2:08:40:01:CF:30:D1:9A Fingerprint (SHA1): 3F:05:FF:B7:33:BE:F9:3D:BC:6E:73:73:66:C1:8F:92:71:F3:61:E7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5747: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5748: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043548 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5749: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5750: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5751: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043549 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5752: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5753: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5754: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5755: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108043550 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5756: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5757: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108043551 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5758: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5759: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5760: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5761: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5762: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108043552 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-Bridge-108043319.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5763: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5764: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5765: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5766: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108043553 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5767: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5768: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5769: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5770: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108043554 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-BridgeNavy-108043320.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5771: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5772: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5773: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5774: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108043555 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5775: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5776: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5777: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5778: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043549 (0x6709d1d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 10:25:59 2016 Not After : Fri Jan 08 10:25:59 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:08:bc:9a:70:99:42:f4:33:5e:ba:92:2f:38:95:b4: 7c:34:bb:3d:e0:14:5a:65:3f:01:6c:83:89:fe:9d:5e: d3:40:12:f4:5e:c6:95:a9:d6:1e:c6:6e:55:98:87:a5: 89:07:9a:0e:c3:44:f5:66:be:5e:98:59:c6:71:b1:9a: f5:3c:8c:37:89:e6:a8:89:f9:a9:f8:ba:23:1f:1a:c8: 4c:12:f0:1d:52:c9:e3:fb:56:b6:aa:47:59:c8:fd:70: 37:6b:6e:b0:3d:4b:6e:c3:bf:25:a4:c3:6a:78:ce:76: 8d:d1:94:e9:19:cc:3b:eb:ee:5a:7f:d0:20:05:78:d9: 6c:de:2d:3d:d7:c1:d2:06:83:4e:98:1a:bc:d1:36:1d: fa:67:17:ff:c5:63:a2:f8:7f:d9:4b:af:54:3a:81:3f: 6d:14:df:aa:d8:89:ab:56:ed:68:fe:18:27:00:bc:1b: 01:ba:a6:d9:46:11:69:92:7e:69:2d:99:73:72:66:02: c1:80:e3:ac:d0:9b:b6:80:db:89:8c:6a:c2:be:89:02: 29:fc:8c:03:e6:9e:96:c4:6e:c7:d1:b8:ee:1e:bc:9e: f3:61:86:f8:ac:6d:44:be:35:03:b4:cc:2f:d4:b1:91: 79:f9:c7:a9:5d:41:47:20:47:35:ca:95:21:f6:e3:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:69:21:9d:29:b6:fc:e7:c8:d7:5c:78:c5:c5:06:40: 85:64:47:9d:2c:19:23:87:91:8c:0c:61:2e:48:b8:23: be:a1:d7:e1:dc:30:fd:77:19:d2:48:87:11:ec:c3:23: ac:01:9a:f2:d0:3e:c9:ab:03:79:5a:54:d4:a7:4b:0e: f9:de:f2:09:4c:26:ba:22:fd:68:ac:55:16:a8:15:4d: f2:9b:ea:fb:57:1a:f9:56:41:0d:9a:52:35:cf:b8:97: 9b:a9:90:4e:c0:4c:c3:4f:55:e5:78:0a:d9:57:3e:1a: 2d:e0:95:86:de:d9:a3:c2:2c:e8:98:d3:cb:3e:92:df: 67:e2:bb:fa:0a:6b:5a:78:af:0e:ec:0a:be:e6:e1:ae: d2:33:13:92:c6:3b:94:3f:04:28:1d:0d:4b:62:26:d2: 4d:e5:25:b3:58:81:d0:46:23:19:db:8e:5b:98:f3:e0: af:a8:d6:2b:93:ed:a4:73:d7:3f:ec:ac:53:ac:fa:4b: 97:aa:2e:05:a2:6c:ab:90:63:05:02:72:b4:cc:83:96: fb:81:a2:d3:4f:51:df:83:37:47:22:14:10:7a:27:24: 64:01:29:2f:eb:c6:ed:65:a9:a9:cd:95:a7:8e:82:78: 7f:b0:ce:04:e7:e8:49:1a:f6:2d:b3:77:66:f0:f6:66 Fingerprint (SHA-256): 31:50:6B:71:2B:42:B6:45:F0:42:91:4F:2E:61:3A:B9:B3:B5:A9:64:FA:10:21:09:E4:38:16:C6:46:9F:1D:C4 Fingerprint (SHA1): 56:31:49:A3:1E:01:91:5F:5C:9C:A1:43:6F:5B:56:0F:C5:E0:3C:1F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5779: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043549 (0x6709d1d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 10:25:59 2016 Not After : Fri Jan 08 10:25:59 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:08:bc:9a:70:99:42:f4:33:5e:ba:92:2f:38:95:b4: 7c:34:bb:3d:e0:14:5a:65:3f:01:6c:83:89:fe:9d:5e: d3:40:12:f4:5e:c6:95:a9:d6:1e:c6:6e:55:98:87:a5: 89:07:9a:0e:c3:44:f5:66:be:5e:98:59:c6:71:b1:9a: f5:3c:8c:37:89:e6:a8:89:f9:a9:f8:ba:23:1f:1a:c8: 4c:12:f0:1d:52:c9:e3:fb:56:b6:aa:47:59:c8:fd:70: 37:6b:6e:b0:3d:4b:6e:c3:bf:25:a4:c3:6a:78:ce:76: 8d:d1:94:e9:19:cc:3b:eb:ee:5a:7f:d0:20:05:78:d9: 6c:de:2d:3d:d7:c1:d2:06:83:4e:98:1a:bc:d1:36:1d: fa:67:17:ff:c5:63:a2:f8:7f:d9:4b:af:54:3a:81:3f: 6d:14:df:aa:d8:89:ab:56:ed:68:fe:18:27:00:bc:1b: 01:ba:a6:d9:46:11:69:92:7e:69:2d:99:73:72:66:02: c1:80:e3:ac:d0:9b:b6:80:db:89:8c:6a:c2:be:89:02: 29:fc:8c:03:e6:9e:96:c4:6e:c7:d1:b8:ee:1e:bc:9e: f3:61:86:f8:ac:6d:44:be:35:03:b4:cc:2f:d4:b1:91: 79:f9:c7:a9:5d:41:47:20:47:35:ca:95:21:f6:e3:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:69:21:9d:29:b6:fc:e7:c8:d7:5c:78:c5:c5:06:40: 85:64:47:9d:2c:19:23:87:91:8c:0c:61:2e:48:b8:23: be:a1:d7:e1:dc:30:fd:77:19:d2:48:87:11:ec:c3:23: ac:01:9a:f2:d0:3e:c9:ab:03:79:5a:54:d4:a7:4b:0e: f9:de:f2:09:4c:26:ba:22:fd:68:ac:55:16:a8:15:4d: f2:9b:ea:fb:57:1a:f9:56:41:0d:9a:52:35:cf:b8:97: 9b:a9:90:4e:c0:4c:c3:4f:55:e5:78:0a:d9:57:3e:1a: 2d:e0:95:86:de:d9:a3:c2:2c:e8:98:d3:cb:3e:92:df: 67:e2:bb:fa:0a:6b:5a:78:af:0e:ec:0a:be:e6:e1:ae: d2:33:13:92:c6:3b:94:3f:04:28:1d:0d:4b:62:26:d2: 4d:e5:25:b3:58:81:d0:46:23:19:db:8e:5b:98:f3:e0: af:a8:d6:2b:93:ed:a4:73:d7:3f:ec:ac:53:ac:fa:4b: 97:aa:2e:05:a2:6c:ab:90:63:05:02:72:b4:cc:83:96: fb:81:a2:d3:4f:51:df:83:37:47:22:14:10:7a:27:24: 64:01:29:2f:eb:c6:ed:65:a9:a9:cd:95:a7:8e:82:78: 7f:b0:ce:04:e7:e8:49:1a:f6:2d:b3:77:66:f0:f6:66 Fingerprint (SHA-256): 31:50:6B:71:2B:42:B6:45:F0:42:91:4F:2E:61:3A:B9:B3:B5:A9:64:FA:10:21:09:E4:38:16:C6:46:9F:1D:C4 Fingerprint (SHA1): 56:31:49:A3:1E:01:91:5F:5C:9C:A1:43:6F:5B:56:0F:C5:E0:3C:1F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5780: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #5781: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043548 (0x6709d1c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 10:25:45 2016 Not After : Fri Jan 08 10:25:45 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:05:c8:fe:68:d8:96:d7:bb:41:25:e5:71:45:68:04: e6:f0:d6:68:25:6c:4c:db:61:ca:45:2f:d0:5a:39:23: 0f:4f:31:dc:cb:ba:8f:f1:cc:7f:1b:2d:b7:3e:d6:ce: fd:99:ec:6f:fe:42:47:5c:e2:68:35:7d:4a:24:cd:84: 61:79:25:e8:ab:eb:c7:8e:7d:33:7e:45:5e:66:59:9e: 38:9f:a3:a2:06:c3:82:68:c5:f7:53:63:83:3f:d6:bc: fd:d8:5b:7f:6c:d8:5e:2b:84:ef:3a:6e:06:e1:81:ee: b6:be:ac:a1:82:a3:52:2a:8d:bc:ce:43:00:80:a9:69: e6:04:8c:27:6c:15:3a:9f:cb:64:d9:4f:06:f5:bc:cb: 6f:1b:9f:ed:36:c6:85:ce:e9:9f:3d:66:c3:72:57:d1: 07:1b:3e:98:d6:d4:22:f2:28:3b:e4:f2:55:9c:f9:8b: 5c:ab:a4:19:bc:fd:c5:5a:30:14:27:87:5d:26:dd:3a: a4:a3:fc:01:6b:b3:0e:2c:39:85:dc:b6:08:cb:2d:83: 08:92:1f:e1:37:e9:01:f6:6e:f4:ad:34:68:ae:01:43: 98:66:e7:58:02:ad:b3:0d:78:06:08:0b:5e:cd:24:81: 14:f2:41:d8:94:df:91:34:58:8a:cb:ad:e4:eb:22:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:22:7e:10:b5:f6:57:dc:74:95:31:90:35:e3:5c:70: 1f:97:5a:07:ea:93:d3:5c:df:47:38:23:78:10:bb:01: 1b:95:38:6d:18:49:08:7c:c3:cb:75:e9:7f:36:11:f2: bd:8d:4c:17:bd:b5:60:ca:5e:a5:c2:f3:8e:bb:9f:2a: 85:64:7e:7f:a1:c0:15:84:55:ac:2b:cc:82:5a:17:7d: f8:24:f0:df:7c:98:20:73:7c:19:81:f8:5b:f9:60:d7: 7a:bb:4e:60:cd:05:73:e9:1b:46:39:92:11:f5:7d:7a: 48:cd:ca:a3:14:1c:93:fe:6c:34:94:2f:ae:55:78:21: 0c:bd:fc:54:3c:16:e6:ba:b8:ab:45:ef:22:ba:5f:46: 2d:ac:b7:66:c4:79:82:9e:d5:15:f1:16:e0:5b:8e:05: 79:3b:84:09:82:f9:44:eb:bc:4b:03:41:12:bf:e3:a7: 27:aa:4f:da:3b:8f:68:9d:c4:5c:24:0a:d5:6e:c2:ed: 1e:fc:31:68:33:72:33:e3:9f:a2:0b:1b:0c:4f:e9:b8: 5c:fe:6f:13:bf:2c:3d:79:fe:00:02:0e:4c:9c:a8:3c: 82:11:11:3e:da:d5:d8:be:d2:94:64:0b:29:e3:08:00: c4:65:6d:43:62:d3:aa:3f:e5:77:ff:e6:29:4e:7b:94 Fingerprint (SHA-256): 86:8E:2B:C8:48:6A:0F:89:32:5E:18:99:41:70:4E:AA:EF:B6:CD:98:74:29:A0:C3:4C:18:15:29:4C:0B:86:F0 Fingerprint (SHA1): 45:74:DF:BA:0A:97:73:54:75:9D:FF:2B:3B:C1:54:E5:CE:43:7B:3B Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5782: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043549 (0x6709d1d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 10:25:59 2016 Not After : Fri Jan 08 10:25:59 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:08:bc:9a:70:99:42:f4:33:5e:ba:92:2f:38:95:b4: 7c:34:bb:3d:e0:14:5a:65:3f:01:6c:83:89:fe:9d:5e: d3:40:12:f4:5e:c6:95:a9:d6:1e:c6:6e:55:98:87:a5: 89:07:9a:0e:c3:44:f5:66:be:5e:98:59:c6:71:b1:9a: f5:3c:8c:37:89:e6:a8:89:f9:a9:f8:ba:23:1f:1a:c8: 4c:12:f0:1d:52:c9:e3:fb:56:b6:aa:47:59:c8:fd:70: 37:6b:6e:b0:3d:4b:6e:c3:bf:25:a4:c3:6a:78:ce:76: 8d:d1:94:e9:19:cc:3b:eb:ee:5a:7f:d0:20:05:78:d9: 6c:de:2d:3d:d7:c1:d2:06:83:4e:98:1a:bc:d1:36:1d: fa:67:17:ff:c5:63:a2:f8:7f:d9:4b:af:54:3a:81:3f: 6d:14:df:aa:d8:89:ab:56:ed:68:fe:18:27:00:bc:1b: 01:ba:a6:d9:46:11:69:92:7e:69:2d:99:73:72:66:02: c1:80:e3:ac:d0:9b:b6:80:db:89:8c:6a:c2:be:89:02: 29:fc:8c:03:e6:9e:96:c4:6e:c7:d1:b8:ee:1e:bc:9e: f3:61:86:f8:ac:6d:44:be:35:03:b4:cc:2f:d4:b1:91: 79:f9:c7:a9:5d:41:47:20:47:35:ca:95:21:f6:e3:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:69:21:9d:29:b6:fc:e7:c8:d7:5c:78:c5:c5:06:40: 85:64:47:9d:2c:19:23:87:91:8c:0c:61:2e:48:b8:23: be:a1:d7:e1:dc:30:fd:77:19:d2:48:87:11:ec:c3:23: ac:01:9a:f2:d0:3e:c9:ab:03:79:5a:54:d4:a7:4b:0e: f9:de:f2:09:4c:26:ba:22:fd:68:ac:55:16:a8:15:4d: f2:9b:ea:fb:57:1a:f9:56:41:0d:9a:52:35:cf:b8:97: 9b:a9:90:4e:c0:4c:c3:4f:55:e5:78:0a:d9:57:3e:1a: 2d:e0:95:86:de:d9:a3:c2:2c:e8:98:d3:cb:3e:92:df: 67:e2:bb:fa:0a:6b:5a:78:af:0e:ec:0a:be:e6:e1:ae: d2:33:13:92:c6:3b:94:3f:04:28:1d:0d:4b:62:26:d2: 4d:e5:25:b3:58:81:d0:46:23:19:db:8e:5b:98:f3:e0: af:a8:d6:2b:93:ed:a4:73:d7:3f:ec:ac:53:ac:fa:4b: 97:aa:2e:05:a2:6c:ab:90:63:05:02:72:b4:cc:83:96: fb:81:a2:d3:4f:51:df:83:37:47:22:14:10:7a:27:24: 64:01:29:2f:eb:c6:ed:65:a9:a9:cd:95:a7:8e:82:78: 7f:b0:ce:04:e7:e8:49:1a:f6:2d:b3:77:66:f0:f6:66 Fingerprint (SHA-256): 31:50:6B:71:2B:42:B6:45:F0:42:91:4F:2E:61:3A:B9:B3:B5:A9:64:FA:10:21:09:E4:38:16:C6:46:9F:1D:C4 Fingerprint (SHA1): 56:31:49:A3:1E:01:91:5F:5C:9C:A1:43:6F:5B:56:0F:C5:E0:3C:1F Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5783: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043549 (0x6709d1d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 10:25:59 2016 Not After : Fri Jan 08 10:25:59 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:08:bc:9a:70:99:42:f4:33:5e:ba:92:2f:38:95:b4: 7c:34:bb:3d:e0:14:5a:65:3f:01:6c:83:89:fe:9d:5e: d3:40:12:f4:5e:c6:95:a9:d6:1e:c6:6e:55:98:87:a5: 89:07:9a:0e:c3:44:f5:66:be:5e:98:59:c6:71:b1:9a: f5:3c:8c:37:89:e6:a8:89:f9:a9:f8:ba:23:1f:1a:c8: 4c:12:f0:1d:52:c9:e3:fb:56:b6:aa:47:59:c8:fd:70: 37:6b:6e:b0:3d:4b:6e:c3:bf:25:a4:c3:6a:78:ce:76: 8d:d1:94:e9:19:cc:3b:eb:ee:5a:7f:d0:20:05:78:d9: 6c:de:2d:3d:d7:c1:d2:06:83:4e:98:1a:bc:d1:36:1d: fa:67:17:ff:c5:63:a2:f8:7f:d9:4b:af:54:3a:81:3f: 6d:14:df:aa:d8:89:ab:56:ed:68:fe:18:27:00:bc:1b: 01:ba:a6:d9:46:11:69:92:7e:69:2d:99:73:72:66:02: c1:80:e3:ac:d0:9b:b6:80:db:89:8c:6a:c2:be:89:02: 29:fc:8c:03:e6:9e:96:c4:6e:c7:d1:b8:ee:1e:bc:9e: f3:61:86:f8:ac:6d:44:be:35:03:b4:cc:2f:d4:b1:91: 79:f9:c7:a9:5d:41:47:20:47:35:ca:95:21:f6:e3:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:69:21:9d:29:b6:fc:e7:c8:d7:5c:78:c5:c5:06:40: 85:64:47:9d:2c:19:23:87:91:8c:0c:61:2e:48:b8:23: be:a1:d7:e1:dc:30:fd:77:19:d2:48:87:11:ec:c3:23: ac:01:9a:f2:d0:3e:c9:ab:03:79:5a:54:d4:a7:4b:0e: f9:de:f2:09:4c:26:ba:22:fd:68:ac:55:16:a8:15:4d: f2:9b:ea:fb:57:1a:f9:56:41:0d:9a:52:35:cf:b8:97: 9b:a9:90:4e:c0:4c:c3:4f:55:e5:78:0a:d9:57:3e:1a: 2d:e0:95:86:de:d9:a3:c2:2c:e8:98:d3:cb:3e:92:df: 67:e2:bb:fa:0a:6b:5a:78:af:0e:ec:0a:be:e6:e1:ae: d2:33:13:92:c6:3b:94:3f:04:28:1d:0d:4b:62:26:d2: 4d:e5:25:b3:58:81:d0:46:23:19:db:8e:5b:98:f3:e0: af:a8:d6:2b:93:ed:a4:73:d7:3f:ec:ac:53:ac:fa:4b: 97:aa:2e:05:a2:6c:ab:90:63:05:02:72:b4:cc:83:96: fb:81:a2:d3:4f:51:df:83:37:47:22:14:10:7a:27:24: 64:01:29:2f:eb:c6:ed:65:a9:a9:cd:95:a7:8e:82:78: 7f:b0:ce:04:e7:e8:49:1a:f6:2d:b3:77:66:f0:f6:66 Fingerprint (SHA-256): 31:50:6B:71:2B:42:B6:45:F0:42:91:4F:2E:61:3A:B9:B3:B5:A9:64:FA:10:21:09:E4:38:16:C6:46:9F:1D:C4 Fingerprint (SHA1): 56:31:49:A3:1E:01:91:5F:5C:9C:A1:43:6F:5B:56:0F:C5:E0:3C:1F Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5784: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5785: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043556 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5786: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5787: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5788: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043557 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5789: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5790: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #5791: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5792: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 108043558 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5793: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5794: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #5795: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5796: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 108043559 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5797: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5798: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5799: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5800: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 108043560 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5801: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5802: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 108043561 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5803: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5804: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #5805: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5806: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5807: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108043562 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5808: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5809: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5810: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5811: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108043563 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5812: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5813: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5814: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5815: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108043564 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5816: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5817: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5818: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5819: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108043565 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5820: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5821: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5822: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043556 (0x6709d24) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 10:27:44 2016 Not After : Fri Jan 08 10:27:44 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fb:8c:2b:46:22:bf:4e:2e:e0:ac:8c:05:4c:3a:7d: a4:92:8c:fc:b1:81:f7:91:23:89:68:97:fe:8b:55:03: 7f:f0:75:27:3f:99:03:b7:c7:58:fb:c7:be:56:08:9d: 7a:e8:5b:e7:39:bd:56:56:87:b2:23:74:c5:ed:fd:c3: 08:10:00:06:9a:0b:d1:03:4f:e1:d2:c4:31:3b:58:98: 8c:7e:5b:ae:27:72:18:63:cb:41:bd:6f:7a:05:65:b0: cf:25:ae:e5:c4:f8:50:a1:4f:4f:98:6e:30:90:d2:92: f3:a4:67:59:b8:68:e2:46:98:99:92:d3:24:43:68:fb: 89:95:59:67:7f:54:17:58:37:af:97:21:71:b5:c1:5f: 8e:68:9c:25:e1:4a:3e:c7:72:a2:2d:e9:2e:26:0e:f4: e0:c2:ee:b3:93:2e:96:27:b3:43:a3:f2:29:2d:d1:07: e2:70:90:23:11:a5:72:5a:bd:7a:98:9d:eb:15:05:2c: 21:03:d6:10:4b:50:01:2a:c4:61:10:2e:f0:fc:84:8c: 18:86:36:5b:e6:7a:3b:d0:e9:90:3d:52:33:d9:d1:d3: 77:db:ba:5f:73:18:09:ee:c7:dd:0f:76:6f:c1:36:d9: b3:9b:9a:b9:54:07:4c:9f:5a:0e:6d:75:9e:ad:4b:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:1f:68:c0:80:5d:73:5d:d3:71:a8:66:33:39:ee:42: 5c:a3:61:13:3c:3c:1b:38:3f:d1:e3:4c:17:cc:ec:b0: 56:f1:48:d6:a7:9f:66:e6:18:fc:ca:7f:c5:9a:f0:24: 85:ef:46:2e:ba:53:21:f5:64:17:6f:fe:e0:b6:da:95: 29:bf:3d:77:26:69:9b:2f:77:f1:e3:18:e3:4b:a7:e2: 2d:ab:ba:fc:1b:25:b3:d3:1a:98:e0:88:40:3e:dc:df: 99:18:b4:1b:ef:e3:b7:dc:6c:94:02:70:87:63:7a:62: ab:34:68:f5:39:4c:77:8f:f5:2a:4e:22:b4:0e:ad:e1: 9e:2a:4c:00:37:18:31:8c:26:41:49:80:4f:60:e1:fe: 3c:70:8a:ae:0a:49:6c:58:5d:54:36:3e:5a:b2:34:8b: e8:ac:c7:cd:3a:b2:22:18:40:50:e0:db:85:a3:5f:6c: f9:ec:fe:11:c9:91:16:3b:b6:6f:63:31:8a:0c:64:d4: 1a:42:dc:fa:d1:f8:2b:52:5c:17:08:97:26:7e:c1:7c: 0e:ca:e6:93:ba:76:ff:14:72:80:47:83:07:57:7c:e0: 9b:25:d5:9c:51:20:64:0b:82:e5:bb:65:38:71:a9:19: 09:e5:ff:7d:df:f8:b9:cd:20:7b:56:7a:1b:6b:2f:12 Fingerprint (SHA-256): 5D:A7:FD:C5:76:3E:EE:E6:A4:09:FF:C4:CA:01:2B:79:80:DB:0B:94:0E:23:B7:F3:B1:2C:89:7A:59:FB:97:1B Fingerprint (SHA1): E4:20:43:35:56:7F:C7:D4:A1:0F:B9:A7:10:DD:5A:13:E5:4C:9D:FB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #5823: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5824: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5825: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5826: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5827: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5828: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5829: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5830: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5831: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043557 (0x6709d25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 10:27:53 2016 Not After : Fri Jan 08 10:27:53 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:86:18:4a:10:f1:4f:eb:f1:ae:08:d5:54:75:0f:42: ce:48:ae:a7:ef:d8:d4:ab:b4:cb:e4:b7:ee:45:a3:ad: 78:e0:1b:da:60:42:19:8d:44:f9:00:d1:29:b2:9d:2e: ea:c9:d4:f3:ae:6a:89:d2:9d:37:7d:c5:8a:eb:dc:94: 83:8c:99:77:de:e3:07:ec:a0:0f:a2:58:2c:10:9f:a8: 77:63:ea:27:ec:f5:ff:57:9f:74:bb:30:9a:cd:91:25: 0c:09:43:b1:30:85:35:48:91:3e:e2:b4:a9:31:e8:f0: ef:13:e9:21:4c:04:0c:33:bc:ce:03:7d:69:5d:15:94: fc:54:35:48:ea:58:12:b6:75:66:68:94:ba:5b:b5:4d: 85:e2:92:31:b9:1a:19:1e:55:3a:a0:66:dc:a9:5a:1d: 5e:f0:40:9c:7c:f8:90:d5:df:06:52:54:78:e4:ea:d6: ea:c8:e6:b8:ca:7b:ee:17:8e:16:80:50:87:8e:7c:86: fb:2c:d9:99:1f:bd:20:cf:14:74:48:60:81:2a:3c:b1: 67:2c:4d:78:d4:d2:93:8b:cd:c5:55:f4:e4:bf:ca:01: 62:6a:17:66:e9:ea:c5:f1:54:6c:59:b5:be:06:de:a1: ba:a7:26:2e:db:12:a9:06:68:52:3f:d2:e7:38:de:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:5e:97:ad:77:c2:ad:9a:61:a9:ab:87:95:65:a9:53: 05:80:f1:ec:ef:89:43:91:11:f8:54:f6:6c:11:e3:d5: 2f:91:3e:f0:0b:57:9e:5e:1a:98:6a:54:c1:0c:33:7e: eb:60:73:44:b9:bf:29:ab:1b:bc:3f:dd:b8:ff:af:b1: 90:53:f7:c8:c9:30:91:05:4b:cd:e6:5c:92:5e:17:cd: e7:d9:40:9d:2c:3d:93:9f:4a:7c:83:95:21:df:94:4d: 1b:a7:9c:2d:8a:e4:3b:7b:85:0d:46:ba:1d:ef:8d:5e: ba:28:f4:1b:4f:85:64:9c:aa:15:48:1f:dc:28:61:a3: c1:c0:c1:94:5b:78:d3:fd:ff:6f:ef:f7:c4:a4:b5:04: e9:55:61:fb:af:91:cb:1b:79:d2:bc:16:a5:8c:ba:ef: 63:90:23:c6:73:44:c7:d0:92:43:ab:42:f7:bb:f8:e2: 4d:ea:6a:ec:48:92:e5:1c:67:8f:8d:8d:7c:67:c9:c4: ff:30:cb:6c:f0:c3:d9:24:3e:05:a4:b8:37:e4:8c:a6: 80:33:59:1f:e5:b7:ee:32:80:43:25:0a:20:26:32:5e: bf:86:57:73:e1:25:e2:ee:b7:78:58:b8:6f:52:84:01: 6f:bd:42:40:68:55:00:34:b0:92:72:ed:e3:b6:3f:f6 Fingerprint (SHA-256): 8C:41:57:AD:9D:C3:94:F3:EF:A3:07:DD:ED:FC:4A:76:5A:E5:0C:D1:AA:7A:27:DE:B8:DA:37:E7:39:06:D5:F8 Fingerprint (SHA1): B0:16:FD:68:0C:FB:56:C4:0F:E5:D9:C8:7A:EF:F4:79:91:1B:81:2B Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #5832: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5833: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5834: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5835: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5836: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5837: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5838: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #5839: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #5840: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #5841: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #5842: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #5843: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #5844: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #5845: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #5846: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #5847: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #5848: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #5849: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5850: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043566 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5851: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5852: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5853: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5854: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108043567 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5855: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5856: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5857: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5858: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108043568 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5859: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5860: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5861: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5862: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 108043569 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5863: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5864: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5865: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5866: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108043570 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5867: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5868: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5869: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5870: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 108043571 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5871: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5872: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #5873: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5874: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 108043572 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5875: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5876: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #5877: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5878: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 108043573 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5879: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5880: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #5881: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5882: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 108043574 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5883: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5884: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5885: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043566 (0x6709d2e) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:29:05 2016 Not After : Fri Jan 08 10:29:05 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 44:a1:66:41:3f:1b:fe:6a:75:6c:8b:19:54:e1:c5:0c: c9:4d:d6:52:41:cb:5d:48:d1:d6:83:00:0b:17:d0:5e: a5:2e:18:42:61:b5:57:a0:bd:5f:55:2f:8d:e4:42:40: 03:1c:2c:9c:25:0d:f6:69:4b:f1:c8:8c:6f:9d:1c:c8: 43:4d:cf:dc:60:aa:c0:7e:aa:15:86:f7:e0:89:ab:c9: 56:40:0a:bc:75:d1:81:13:a5:31:80:54:99:73:bc:19: f1:ff:4a:94:0b:ac:b7:1c:3f:a4:5e:7f:0f:05:5e:25: f6:27:29:cc:e8:b2:f4:50:9a:ee:2f:d8:6c:4f:08:e8: 04:fa:f1:de:de:c9:f8:ab:59:cc:03:45:bd:f1:8d:f6: ac:00:a5:71:9d:37:90:88:e9:d1:90:64:70:3b:46:e5: 9a:f0:aa:5c:c5:87:77:40:79:27:9c:ac:c2:a8:da:b6: 48:5f:37:c2:ac:6c:b4:f4:4e:af:36:38:db:29:bc:e4: 7c:01:c5:b1:22:e6:a7:66:25:7b:5d:23:5b:ad:b9:0e: 18:c6:30:26:01:5a:da:ab:69:7c:77:b7:06:8b:cb:c9: b0:b5:f2:8f:6f:a4:75:08:bb:23:4d:0e:52:30:de:30: 85:8b:4e:f6:66:9e:df:7c:5d:cb:da:98:45:2c:9c:5d Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:6f:0f:78:7b:94:c6:ad:06:69:55:17:b4: d2:b2:9e:0b:f4:66:bf:36:c8:ab:99:b1:f7:bf:ad:79: 02:1c:48:a7:3c:6a:50:59:53:87:a3:60:22:ac:2c:6b: 1e:d9:9d:c1:97:39:5c:9f:32:e4:d7:b0:1e:34 Fingerprint (SHA-256): 36:47:E0:B5:15:0F:F8:61:9A:BD:DD:CE:A0:E3:26:5A:50:34:70:D5:14:56:42:8D:63:AB:09:C9:B2:2F:31:12 Fingerprint (SHA1): 85:3D:B5:C0:AB:0D:7A:C5:7B:61:64:20:C1:CD:B8:6D:EF:40:AB:AB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5886: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043566 (0x6709d2e) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:29:05 2016 Not After : Fri Jan 08 10:29:05 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 44:a1:66:41:3f:1b:fe:6a:75:6c:8b:19:54:e1:c5:0c: c9:4d:d6:52:41:cb:5d:48:d1:d6:83:00:0b:17:d0:5e: a5:2e:18:42:61:b5:57:a0:bd:5f:55:2f:8d:e4:42:40: 03:1c:2c:9c:25:0d:f6:69:4b:f1:c8:8c:6f:9d:1c:c8: 43:4d:cf:dc:60:aa:c0:7e:aa:15:86:f7:e0:89:ab:c9: 56:40:0a:bc:75:d1:81:13:a5:31:80:54:99:73:bc:19: f1:ff:4a:94:0b:ac:b7:1c:3f:a4:5e:7f:0f:05:5e:25: f6:27:29:cc:e8:b2:f4:50:9a:ee:2f:d8:6c:4f:08:e8: 04:fa:f1:de:de:c9:f8:ab:59:cc:03:45:bd:f1:8d:f6: ac:00:a5:71:9d:37:90:88:e9:d1:90:64:70:3b:46:e5: 9a:f0:aa:5c:c5:87:77:40:79:27:9c:ac:c2:a8:da:b6: 48:5f:37:c2:ac:6c:b4:f4:4e:af:36:38:db:29:bc:e4: 7c:01:c5:b1:22:e6:a7:66:25:7b:5d:23:5b:ad:b9:0e: 18:c6:30:26:01:5a:da:ab:69:7c:77:b7:06:8b:cb:c9: b0:b5:f2:8f:6f:a4:75:08:bb:23:4d:0e:52:30:de:30: 85:8b:4e:f6:66:9e:df:7c:5d:cb:da:98:45:2c:9c:5d Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:6f:0f:78:7b:94:c6:ad:06:69:55:17:b4: d2:b2:9e:0b:f4:66:bf:36:c8:ab:99:b1:f7:bf:ad:79: 02:1c:48:a7:3c:6a:50:59:53:87:a3:60:22:ac:2c:6b: 1e:d9:9d:c1:97:39:5c:9f:32:e4:d7:b0:1e:34 Fingerprint (SHA-256): 36:47:E0:B5:15:0F:F8:61:9A:BD:DD:CE:A0:E3:26:5A:50:34:70:D5:14:56:42:8D:63:AB:09:C9:B2:2F:31:12 Fingerprint (SHA1): 85:3D:B5:C0:AB:0D:7A:C5:7B:61:64:20:C1:CD:B8:6D:EF:40:AB:AB Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5887: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043566 (0x6709d2e) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:29:05 2016 Not After : Fri Jan 08 10:29:05 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 44:a1:66:41:3f:1b:fe:6a:75:6c:8b:19:54:e1:c5:0c: c9:4d:d6:52:41:cb:5d:48:d1:d6:83:00:0b:17:d0:5e: a5:2e:18:42:61:b5:57:a0:bd:5f:55:2f:8d:e4:42:40: 03:1c:2c:9c:25:0d:f6:69:4b:f1:c8:8c:6f:9d:1c:c8: 43:4d:cf:dc:60:aa:c0:7e:aa:15:86:f7:e0:89:ab:c9: 56:40:0a:bc:75:d1:81:13:a5:31:80:54:99:73:bc:19: f1:ff:4a:94:0b:ac:b7:1c:3f:a4:5e:7f:0f:05:5e:25: f6:27:29:cc:e8:b2:f4:50:9a:ee:2f:d8:6c:4f:08:e8: 04:fa:f1:de:de:c9:f8:ab:59:cc:03:45:bd:f1:8d:f6: ac:00:a5:71:9d:37:90:88:e9:d1:90:64:70:3b:46:e5: 9a:f0:aa:5c:c5:87:77:40:79:27:9c:ac:c2:a8:da:b6: 48:5f:37:c2:ac:6c:b4:f4:4e:af:36:38:db:29:bc:e4: 7c:01:c5:b1:22:e6:a7:66:25:7b:5d:23:5b:ad:b9:0e: 18:c6:30:26:01:5a:da:ab:69:7c:77:b7:06:8b:cb:c9: b0:b5:f2:8f:6f:a4:75:08:bb:23:4d:0e:52:30:de:30: 85:8b:4e:f6:66:9e:df:7c:5d:cb:da:98:45:2c:9c:5d Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:6f:0f:78:7b:94:c6:ad:06:69:55:17:b4: d2:b2:9e:0b:f4:66:bf:36:c8:ab:99:b1:f7:bf:ad:79: 02:1c:48:a7:3c:6a:50:59:53:87:a3:60:22:ac:2c:6b: 1e:d9:9d:c1:97:39:5c:9f:32:e4:d7:b0:1e:34 Fingerprint (SHA-256): 36:47:E0:B5:15:0F:F8:61:9A:BD:DD:CE:A0:E3:26:5A:50:34:70:D5:14:56:42:8D:63:AB:09:C9:B2:2F:31:12 Fingerprint (SHA1): 85:3D:B5:C0:AB:0D:7A:C5:7B:61:64:20:C1:CD:B8:6D:EF:40:AB:AB Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #5888: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043566 (0x6709d2e) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:29:05 2016 Not After : Fri Jan 08 10:29:05 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 44:a1:66:41:3f:1b:fe:6a:75:6c:8b:19:54:e1:c5:0c: c9:4d:d6:52:41:cb:5d:48:d1:d6:83:00:0b:17:d0:5e: a5:2e:18:42:61:b5:57:a0:bd:5f:55:2f:8d:e4:42:40: 03:1c:2c:9c:25:0d:f6:69:4b:f1:c8:8c:6f:9d:1c:c8: 43:4d:cf:dc:60:aa:c0:7e:aa:15:86:f7:e0:89:ab:c9: 56:40:0a:bc:75:d1:81:13:a5:31:80:54:99:73:bc:19: f1:ff:4a:94:0b:ac:b7:1c:3f:a4:5e:7f:0f:05:5e:25: f6:27:29:cc:e8:b2:f4:50:9a:ee:2f:d8:6c:4f:08:e8: 04:fa:f1:de:de:c9:f8:ab:59:cc:03:45:bd:f1:8d:f6: ac:00:a5:71:9d:37:90:88:e9:d1:90:64:70:3b:46:e5: 9a:f0:aa:5c:c5:87:77:40:79:27:9c:ac:c2:a8:da:b6: 48:5f:37:c2:ac:6c:b4:f4:4e:af:36:38:db:29:bc:e4: 7c:01:c5:b1:22:e6:a7:66:25:7b:5d:23:5b:ad:b9:0e: 18:c6:30:26:01:5a:da:ab:69:7c:77:b7:06:8b:cb:c9: b0:b5:f2:8f:6f:a4:75:08:bb:23:4d:0e:52:30:de:30: 85:8b:4e:f6:66:9e:df:7c:5d:cb:da:98:45:2c:9c:5d Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:6f:0f:78:7b:94:c6:ad:06:69:55:17:b4: d2:b2:9e:0b:f4:66:bf:36:c8:ab:99:b1:f7:bf:ad:79: 02:1c:48:a7:3c:6a:50:59:53:87:a3:60:22:ac:2c:6b: 1e:d9:9d:c1:97:39:5c:9f:32:e4:d7:b0:1e:34 Fingerprint (SHA-256): 36:47:E0:B5:15:0F:F8:61:9A:BD:DD:CE:A0:E3:26:5A:50:34:70:D5:14:56:42:8D:63:AB:09:C9:B2:2F:31:12 Fingerprint (SHA1): 85:3D:B5:C0:AB:0D:7A:C5:7B:61:64:20:C1:CD:B8:6D:EF:40:AB:AB Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #5889: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5890: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5891: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5892: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5893: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5894: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5895: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5896: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5897: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5898: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5899: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5900: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5901: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5902: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5903: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5904: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #5905: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5906: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5907: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5908: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5909: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5910: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5911: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5912: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5913: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5914: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5915: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5916: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108103114Z nextupdate=20170108103114Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 10:31:14 2016 Next Update: Sun Jan 08 10:31:14 2017 CRL Extensions: chains.sh: #5917: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108103114Z nextupdate=20170108103114Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 10:31:14 2016 Next Update: Sun Jan 08 10:31:14 2017 CRL Extensions: chains.sh: #5918: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108103115Z nextupdate=20170108103115Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 10:31:15 2016 Next Update: Sun Jan 08 10:31:15 2017 CRL Extensions: chains.sh: #5919: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108103116Z nextupdate=20170108103116Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 10:31:16 2016 Next Update: Sun Jan 08 10:31:16 2017 CRL Extensions: chains.sh: #5920: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108103117Z addcert 14 20160108103117Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 10:31:17 2016 Next Update: Sun Jan 08 10:31:15 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Jan 08 10:31:17 2016 CRL Extensions: chains.sh: #5921: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108103118Z addcert 15 20160108103118Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 10:31:18 2016 Next Update: Sun Jan 08 10:31:14 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Jan 08 10:31:18 2016 CRL Extensions: chains.sh: #5922: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5923: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5924: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5925: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #5926: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #5927: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #5928: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #5929: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #5930: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #5931: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:30:03 2016 Not After : Fri Jan 08 10:30:03 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:14:52:53:fa:87:ad:50:8d:3c:e9:78:2d:c2:5e:96: ce:ac:a0:ab:3e:a0:e7:cb:6d:77:33:fa:53:e2:b9:73: 3c:75:56:51:7c:79:66:40:56:e3:e7:fd:8a:91:67:2a: ad:a2:2c:4e:a1:9b:6e:95:74:1c:66:a8:e7:78:db:84: a0:87:f7:ce:66:33:58:ec:df:ed:86:8d:a0:fd:b1:29: 85:a3:b4:1a:14:6e:9b:7f:f1:55:46:89:d7:26:67:5b: e8:51:2c:a7:94:95:e2:08:8d:a5:68:23:18:ae:d0:a4: 4e:2b:62:e8:b2:e8:36:76:3a:2f:26:c3:49:9e:95:0e: 94:4c:e8:d7:57:ae:a1:30:a0:3f:ed:d0:16:90:c0:4c: 1f:c4:9d:af:5c:7b:69:3e:d6:dd:94:77:d3:ff:5c:5f: 75:69:95:5b:53:d2:30:9c:d4:eb:fe:34:48:a4:2b:78: ae:c1:6b:0a:ee:bb:2a:ad:e8:ef:cc:de:30:aa:9c:6c: 70:50:2d:ff:4c:7e:30:59:00:09:6a:45:a4:73:a3:6a: 25:3a:27:6a:fc:ab:56:65:8b:99:f1:e4:fb:06:b7:fa: 8a:d2:f2:37:f8:10:6f:4a:73:45:50:75:86:44:6a:01: b0:91:25:51:a0:7d:ba:15:a0:5b:e8:6b:ad:62:31:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:85:36:ad:b9:4f:24:0e:71:8a:08:a7:81:88:8c:c4: 03:e4:91:fc:ac:57:56:33:19:f8:bb:f0:c5:1f:13:f8: 31:80:87:9d:3e:d0:39:b0:03:b8:26:c1:93:13:5b:43: 57:31:c3:c8:d1:24:56:9e:4a:a1:b3:3e:ba:93:af:53: dc:39:b8:e0:c7:f3:63:a7:4d:da:93:8b:7e:1e:a1:e9: 29:db:e1:75:7f:f5:0c:d7:74:ce:b2:6d:0d:93:d4:49: 39:47:8f:38:46:15:22:a1:38:aa:3a:42:24:6b:54:67: b7:60:31:3f:1e:6d:07:36:2e:df:70:f0:ca:26:6a:ea: 55:d3:c7:1a:7c:df:fa:36:a3:af:97:16:31:71:64:87: 5d:75:c2:67:04:54:47:8c:2b:a1:86:f9:45:6c:0b:c8: fa:74:81:2b:1b:d9:8e:56:78:86:b7:34:34:58:06:17: fd:2e:77:23:c9:8f:a6:34:bf:f6:2e:6a:81:b8:33:54: 0b:1e:18:f4:1f:e7:62:bb:dc:bb:5a:5e:41:d6:06:3c: fa:75:02:76:7c:21:bb:5f:dc:c6:fa:89:9a:69:1b:64: 59:e0:95:6d:f6:83:aa:91:2e:5a:a2:7b:7d:23:72:0f: c2:ea:b2:03:1b:f5:d0:ee:aa:9a:f6:be:de:9e:aa:d3 Fingerprint (SHA-256): 07:2A:CF:22:B0:37:58:D2:74:36:23:8B:36:EF:88:9E:00:B6:31:E5:84:58:3C:CC:18:57:78:00:34:7B:A8:C6 Fingerprint (SHA1): 22:90:C8:0E:FE:5D:1A:4E:CE:AC:EF:AA:8F:4C:5E:C0:65:78:F8:68 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5932: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5933: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:30:03 2016 Not After : Fri Jan 08 10:30:03 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:14:52:53:fa:87:ad:50:8d:3c:e9:78:2d:c2:5e:96: ce:ac:a0:ab:3e:a0:e7:cb:6d:77:33:fa:53:e2:b9:73: 3c:75:56:51:7c:79:66:40:56:e3:e7:fd:8a:91:67:2a: ad:a2:2c:4e:a1:9b:6e:95:74:1c:66:a8:e7:78:db:84: a0:87:f7:ce:66:33:58:ec:df:ed:86:8d:a0:fd:b1:29: 85:a3:b4:1a:14:6e:9b:7f:f1:55:46:89:d7:26:67:5b: e8:51:2c:a7:94:95:e2:08:8d:a5:68:23:18:ae:d0:a4: 4e:2b:62:e8:b2:e8:36:76:3a:2f:26:c3:49:9e:95:0e: 94:4c:e8:d7:57:ae:a1:30:a0:3f:ed:d0:16:90:c0:4c: 1f:c4:9d:af:5c:7b:69:3e:d6:dd:94:77:d3:ff:5c:5f: 75:69:95:5b:53:d2:30:9c:d4:eb:fe:34:48:a4:2b:78: ae:c1:6b:0a:ee:bb:2a:ad:e8:ef:cc:de:30:aa:9c:6c: 70:50:2d:ff:4c:7e:30:59:00:09:6a:45:a4:73:a3:6a: 25:3a:27:6a:fc:ab:56:65:8b:99:f1:e4:fb:06:b7:fa: 8a:d2:f2:37:f8:10:6f:4a:73:45:50:75:86:44:6a:01: b0:91:25:51:a0:7d:ba:15:a0:5b:e8:6b:ad:62:31:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:85:36:ad:b9:4f:24:0e:71:8a:08:a7:81:88:8c:c4: 03:e4:91:fc:ac:57:56:33:19:f8:bb:f0:c5:1f:13:f8: 31:80:87:9d:3e:d0:39:b0:03:b8:26:c1:93:13:5b:43: 57:31:c3:c8:d1:24:56:9e:4a:a1:b3:3e:ba:93:af:53: dc:39:b8:e0:c7:f3:63:a7:4d:da:93:8b:7e:1e:a1:e9: 29:db:e1:75:7f:f5:0c:d7:74:ce:b2:6d:0d:93:d4:49: 39:47:8f:38:46:15:22:a1:38:aa:3a:42:24:6b:54:67: b7:60:31:3f:1e:6d:07:36:2e:df:70:f0:ca:26:6a:ea: 55:d3:c7:1a:7c:df:fa:36:a3:af:97:16:31:71:64:87: 5d:75:c2:67:04:54:47:8c:2b:a1:86:f9:45:6c:0b:c8: fa:74:81:2b:1b:d9:8e:56:78:86:b7:34:34:58:06:17: fd:2e:77:23:c9:8f:a6:34:bf:f6:2e:6a:81:b8:33:54: 0b:1e:18:f4:1f:e7:62:bb:dc:bb:5a:5e:41:d6:06:3c: fa:75:02:76:7c:21:bb:5f:dc:c6:fa:89:9a:69:1b:64: 59:e0:95:6d:f6:83:aa:91:2e:5a:a2:7b:7d:23:72:0f: c2:ea:b2:03:1b:f5:d0:ee:aa:9a:f6:be:de:9e:aa:d3 Fingerprint (SHA-256): 07:2A:CF:22:B0:37:58:D2:74:36:23:8B:36:EF:88:9E:00:B6:31:E5:84:58:3C:CC:18:57:78:00:34:7B:A8:C6 Fingerprint (SHA1): 22:90:C8:0E:FE:5D:1A:4E:CE:AC:EF:AA:8F:4C:5E:C0:65:78:F8:68 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5934: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5935: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5936: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043575 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5937: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5938: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5939: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5940: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 108043576 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5941: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5942: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5943: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108043347.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5944: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108043321.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5945: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5946: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5947: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108043347.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5948: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 108043577 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5949: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5950: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5951: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108043347.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5952: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108043322.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5953: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5954: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5955: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5956: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 108043578 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5957: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5958: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5959: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108043347.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5960: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108043323.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5961: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5962: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5963: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108043347.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5964: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108043324.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5965: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5966: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108103310Z nextupdate=20170108103310Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 10:33:10 2016 Next Update: Sun Jan 08 10:33:10 2017 CRL Extensions: chains.sh: #5967: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108103311Z nextupdate=20170108103311Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 10:33:11 2016 Next Update: Sun Jan 08 10:33:11 2017 CRL Extensions: chains.sh: #5968: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108103311Z nextupdate=20170108103311Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 10:33:11 2016 Next Update: Sun Jan 08 10:33:11 2017 CRL Extensions: chains.sh: #5969: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108103312Z nextupdate=20170108103312Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 10:33:12 2016 Next Update: Sun Jan 08 10:33:12 2017 CRL Extensions: chains.sh: #5970: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108103313Z addcert 20 20160108103313Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 10:33:13 2016 Next Update: Sun Jan 08 10:33:11 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 10:33:13 2016 CRL Extensions: chains.sh: #5971: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108103314Z addcert 40 20160108103314Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 10:33:14 2016 Next Update: Sun Jan 08 10:33:11 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 10:33:13 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 10:33:14 2016 CRL Extensions: chains.sh: #5972: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5973: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5974: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5975: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043575 (0x6709d37) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:31:46 2016 Not After : Fri Jan 08 10:31:46 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:32:81:72:ca:54:e3:c3:97:55:b0:fa:0e:e3:5c:5f: c3:f7:d8:20:b7:1c:44:b3:21:35:7e:cf:2e:ae:79:a4: 86:a0:8a:b3:40:2f:29:f2:44:46:61:a3:2c:bc:3e:11: 50:89:c2:bc:33:65:a0:0a:57:2c:9c:9a:c8:f3:0f:57: 4b:11:47:d8:f2:5b:06:a6:16:93:9f:3c:fe:97:f6:a2: 54:97:6e:a1:b4:08:78:14:5d:76:61:73:b3:f3:5f:43: 32:f2:dc:56:b1:f4:b6:e4:78:63:a5:78:20:38:0d:fc: 82:57:96:2b:e4:59:76:04:d5:c5:75:bd:0e:8d:e3:05: 10:c2:1b:1a:6c:58:5d:57:ae:9a:d8:3b:48:48:07:9a: 62:5d:0e:06:6c:43:f5:5f:93:54:85:d8:0d:ab:44:14: d1:d3:ea:a9:28:ed:d2:d0:cd:1a:a3:85:e4:98:8a:21: ed:d9:7a:7f:45:48:28:f1:c9:03:0b:56:d2:c8:ee:93: 59:0e:8b:91:76:2e:70:ae:28:28:a0:9d:e4:7f:6c:15: 7f:65:2c:0f:0a:03:3a:c1:df:c3:6e:75:02:9b:bb:57: 18:cf:4c:37:e0:cd:65:1e:b2:f7:5c:3e:be:10:f7:99: 37:1c:f8:6c:8d:98:9b:49:d3:63:b0:93:0f:fc:e3:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d2:aa:69:9d:42:10:76:b4:9b:57:52:05:a8:57:9f:7e: c3:7b:93:ad:a4:1d:5c:83:e6:a5:7a:1f:19:e0:1e:b4: a9:c3:51:89:60:48:d4:51:ec:ca:81:a3:a1:95:f3:42: eb:fb:ce:86:8f:d1:eb:21:f8:33:1b:7e:99:72:1a:26: cd:fe:77:11:87:3e:06:d8:ef:d4:cd:54:b7:7a:d3:61: 09:dc:97:69:b6:77:d3:d7:c4:88:a8:5b:97:50:6b:87: ff:9c:c8:71:1b:f2:1d:cb:2e:21:7e:c2:ae:f3:54:a3: 7f:4a:78:bf:de:d2:e4:00:4f:50:8d:3a:b1:51:2e:69: ee:91:4b:35:d0:68:7a:75:03:8c:2e:7b:fc:65:fc:c3: 68:f9:fb:b7:43:56:d3:2e:1a:38:d9:ef:25:a0:cc:d1: 0e:10:0c:9e:18:ef:b6:c0:c5:1b:a6:d4:94:f5:2e:8c: 48:b3:28:24:81:ac:98:33:ad:5a:0b:3e:7d:74:05:c8: 41:2a:72:17:35:1c:f7:ca:bd:97:0d:c3:46:1e:a2:b4: 05:2e:0f:59:34:7c:92:c8:94:1e:c7:ed:e9:49:56:48: b5:86:4b:b2:b5:11:7c:88:51:6f:61:ee:c1:e0:5e:9f: 68:d8:60:4d:f5:bb:eb:1e:1e:37:37:cb:0f:ea:45:d7 Fingerprint (SHA-256): D4:56:1F:CF:84:E1:8F:B9:9F:46:A4:33:F1:2E:4C:CA:41:05:2B:31:AB:46:9B:CC:16:95:B3:5F:BA:5F:14:C6 Fingerprint (SHA1): 03:87:3E:0E:50:41:DE:D2:CC:BE:24:DB:78:9C:B4:67:D4:F7:40:95 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5976: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5977: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043575 (0x6709d37) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 10:31:46 2016 Not After : Fri Jan 08 10:31:46 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:32:81:72:ca:54:e3:c3:97:55:b0:fa:0e:e3:5c:5f: c3:f7:d8:20:b7:1c:44:b3:21:35:7e:cf:2e:ae:79:a4: 86:a0:8a:b3:40:2f:29:f2:44:46:61:a3:2c:bc:3e:11: 50:89:c2:bc:33:65:a0:0a:57:2c:9c:9a:c8:f3:0f:57: 4b:11:47:d8:f2:5b:06:a6:16:93:9f:3c:fe:97:f6:a2: 54:97:6e:a1:b4:08:78:14:5d:76:61:73:b3:f3:5f:43: 32:f2:dc:56:b1:f4:b6:e4:78:63:a5:78:20:38:0d:fc: 82:57:96:2b:e4:59:76:04:d5:c5:75:bd:0e:8d:e3:05: 10:c2:1b:1a:6c:58:5d:57:ae:9a:d8:3b:48:48:07:9a: 62:5d:0e:06:6c:43:f5:5f:93:54:85:d8:0d:ab:44:14: d1:d3:ea:a9:28:ed:d2:d0:cd:1a:a3:85:e4:98:8a:21: ed:d9:7a:7f:45:48:28:f1:c9:03:0b:56:d2:c8:ee:93: 59:0e:8b:91:76:2e:70:ae:28:28:a0:9d:e4:7f:6c:15: 7f:65:2c:0f:0a:03:3a:c1:df:c3:6e:75:02:9b:bb:57: 18:cf:4c:37:e0:cd:65:1e:b2:f7:5c:3e:be:10:f7:99: 37:1c:f8:6c:8d:98:9b:49:d3:63:b0:93:0f:fc:e3:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d2:aa:69:9d:42:10:76:b4:9b:57:52:05:a8:57:9f:7e: c3:7b:93:ad:a4:1d:5c:83:e6:a5:7a:1f:19:e0:1e:b4: a9:c3:51:89:60:48:d4:51:ec:ca:81:a3:a1:95:f3:42: eb:fb:ce:86:8f:d1:eb:21:f8:33:1b:7e:99:72:1a:26: cd:fe:77:11:87:3e:06:d8:ef:d4:cd:54:b7:7a:d3:61: 09:dc:97:69:b6:77:d3:d7:c4:88:a8:5b:97:50:6b:87: ff:9c:c8:71:1b:f2:1d:cb:2e:21:7e:c2:ae:f3:54:a3: 7f:4a:78:bf:de:d2:e4:00:4f:50:8d:3a:b1:51:2e:69: ee:91:4b:35:d0:68:7a:75:03:8c:2e:7b:fc:65:fc:c3: 68:f9:fb:b7:43:56:d3:2e:1a:38:d9:ef:25:a0:cc:d1: 0e:10:0c:9e:18:ef:b6:c0:c5:1b:a6:d4:94:f5:2e:8c: 48:b3:28:24:81:ac:98:33:ad:5a:0b:3e:7d:74:05:c8: 41:2a:72:17:35:1c:f7:ca:bd:97:0d:c3:46:1e:a2:b4: 05:2e:0f:59:34:7c:92:c8:94:1e:c7:ed:e9:49:56:48: b5:86:4b:b2:b5:11:7c:88:51:6f:61:ee:c1:e0:5e:9f: 68:d8:60:4d:f5:bb:eb:1e:1e:37:37:cb:0f:ea:45:d7 Fingerprint (SHA-256): D4:56:1F:CF:84:E1:8F:B9:9F:46:A4:33:F1:2E:4C:CA:41:05:2B:31:AB:46:9B:CC:16:95:B3:5F:BA:5F:14:C6 Fingerprint (SHA1): 03:87:3E:0E:50:41:DE:D2:CC:BE:24:DB:78:9C:B4:67:D4:F7:40:95 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5978: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5979: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5980: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043579 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5981: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5982: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5983: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5984: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108043580 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5985: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5986: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5987: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5988: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108043581 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5989: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5990: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5991: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5992: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 108043582 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5993: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5994: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #5995: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108043583 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5996: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #5997: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #5998: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5999: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 108043584 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #6000: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6001: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #6002: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6003: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 108043585 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #6004: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6005: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #6006: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #6007: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #6008: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043579 (0x6709d3b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:33:23 2016 Not After : Fri Jan 08 10:33:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:30:17:00:6d:d7:9c:11:b4:fa:14:09:6a:d2:ec:79: 05:0d:82:22:5d:b7:97:ad:7d:46:f0:97:f5:12:1c:35: ca:c3:3a:40:f5:ca:2c:26:67:72:00:24:f8:c8:fe:cd: 6e:7e:f1:c1:08:91:ec:4e:36:48:d9:f6:83:51:a4:89: ba:fd:13:f5:53:d6:f4:53:cb:e6:9f:3b:97:b2:47:51: 85:b2:b3:43:4d:98:df:80:51:1d:b7:57:b7:4c:e2:b8: 98:d4:29:b8:d1:4c:7d:e8:77:2d:73:b9:0f:a4:ab:3e: bd:c4:30:c5:0c:29:1f:40:aa:47:41:3c:fa:05:5e:a0: ec:1a:09:1b:db:55:f8:56:ef:b8:7e:57:6e:96:55:ea: 31:29:c0:67:34:5a:37:07:46:ce:4b:fa:a8:77:91:3e: e8:94:da:a1:ca:59:7f:5f:ec:ca:51:61:80:42:3a:1b: 92:2a:99:45:56:e9:df:56:dd:07:de:60:63:1e:0f:96: 1a:4e:2d:4f:6d:a6:5b:16:9f:a2:90:10:6a:58:df:7e: a5:81:a0:ac:1b:ce:ef:06:18:2a:02:2f:eb:cc:cb:f0: 32:9b:c6:ce:09:08:16:f8:20:de:e9:1c:06:33:3d:bf: 71:d9:45:9a:a8:26:33:bf:3d:c5:5e:18:12:ec:01:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:c0:07:5e:23:86:7b:a1:38:dc:74:ac:1d:78:1c:11: d2:79:1c:9c:a0:2a:1f:74:c8:65:10:f2:25:64:72:43: 3b:c2:43:73:f7:60:6e:35:ce:f7:ec:3a:f0:69:74:03: f0:af:e2:c7:ed:e0:84:b4:0e:89:0c:9a:64:b9:da:7d: c7:96:17:90:20:a6:c9:77:66:25:82:46:7d:cd:ee:88: 4d:6b:f4:7c:83:14:55:2a:62:7f:99:b4:ca:4e:7e:a0: c5:62:14:07:5f:bc:9f:df:1d:88:12:75:10:32:33:c6: 43:77:cf:0c:5c:95:3d:0c:18:45:40:22:a7:5b:a9:2b: f4:bb:c7:f6:66:ad:89:45:d8:35:4e:00:36:94:f0:f3: b3:b2:52:a3:ab:b5:b2:86:61:e5:ee:f3:f4:80:74:ac: 15:fe:d2:07:ab:93:de:f0:47:bc:9e:0e:fa:d1:39:f9: bf:8c:a4:f4:4a:b2:fd:7a:0e:26:72:bf:ba:57:a7:d1: aa:68:17:57:26:f4:3b:1b:32:71:f7:7c:59:44:99:a2: 7a:fe:02:27:98:6d:17:24:4e:9a:d0:6b:0a:85:44:86: 33:92:b2:f1:b1:d6:7c:58:25:e7:b2:fe:54:47:34:d8: ca:e9:0c:44:ed:89:77:cd:bd:54:e7:c9:d5:4f:3c:16 Fingerprint (SHA-256): 25:96:FC:FC:B7:53:57:B2:2C:86:F1:A0:AA:AB:9E:1C:80:5F:42:B2:41:54:90:24:00:9B:37:9D:68:2D:41:3D Fingerprint (SHA1): 62:B7:9E:67:89:47:A8:42:93:06:0E:DB:DD:48:70:3D:50:DC:84:FF Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6009: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043581 (0x6709d3d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 10:33:46 2016 Not After : Fri Jan 08 10:33:46 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:2d:c2:4d:65:ef:19:f7:49:8d:9a:df:e5:d6:35:7e: 6b:a1:03:c0:85:fd:02:93:1e:d2:39:89:e5:ef:2f:3f: eb:f7:9e:72:f6:1a:e2:0b:58:0d:64:1c:11:df:a7:cb: 7a:17:00:8c:1f:e0:f0:50:cd:76:c2:96:20:42:9e:41: 5f:1c:6b:e9:b8:10:b7:57:46:99:0a:5c:04:6f:87:87: a0:9b:e0:e8:1b:52:4d:57:8a:3d:16:e9:a7:86:2e:69: 79:9e:37:ad:fd:08:af:90:97:4c:fb:3a:b0:d5:27:3e: b8:7e:98:3d:45:34:15:4a:e1:ad:75:c6:f3:b1:ec:ca: e8:52:90:b1:4b:0e:f3:7a:e6:05:af:a8:34:61:94:22: 1c:b2:9c:08:37:47:64:5b:6d:bc:ae:c7:f7:14:cf:27: c3:b5:c5:da:bb:44:eb:21:97:3a:00:a5:60:e2:3c:84: ce:7e:28:20:5e:0b:cf:b0:b5:f2:d4:16:6e:eb:a1:46: be:c0:2e:c5:ed:60:a5:0c:ad:5e:f1:d3:9f:1f:9d:5c: 3b:8c:83:0d:5c:ae:ed:a1:22:6f:98:54:d9:d5:69:f1: d4:de:84:91:ba:bf:8b:2f:04:4b:d9:59:e2:3e:0d:ea: ae:54:9b:c2:29:88:1e:13:ac:4f:51:84:3b:cd:e6:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:34:77:97:34:d1:b8:d5:58:98:57:ba:ea:a6:a7:97: 32:e1:c7:82:c6:49:a4:01:16:cc:39:a3:f2:25:73:e2: b4:58:37:aa:bc:b3:3e:90:28:2c:76:6c:fd:72:42:07: cb:98:66:d1:92:d8:19:23:ee:9a:5b:0c:f5:8b:c5:06: b3:52:da:d8:94:3b:1b:9e:39:bf:bb:cc:69:fa:1f:dd: 89:0b:76:04:a5:49:3a:b3:57:55:17:88:ed:ae:83:3a: 8c:30:db:de:f0:48:0b:1e:ed:a7:f3:45:4f:36:cb:c1: d7:36:7d:f1:54:0b:50:08:86:7e:61:c7:00:ac:ae:d2: 10:36:bd:08:33:c7:ec:ca:60:17:54:71:5f:90:37:a4: 98:bb:f2:fe:39:78:f6:5c:80:f9:06:29:0f:6f:dd:91: 93:06:f8:68:bb:63:54:d6:d7:4a:f9:b5:28:53:ae:de: 6a:15:de:72:ac:eb:e5:04:07:25:0a:f0:24:78:d0:cc: 3b:02:d3:5e:72:92:f0:23:f9:2c:cb:20:fd:6a:16:43: 0c:19:86:96:9d:3b:c3:14:31:4a:83:06:83:0f:8a:ce: 88:8d:74:64:b2:cc:07:76:5b:27:cc:38:06:8e:54:58: cd:24:6f:86:b8:d5:e4:cb:26:e0:ac:8e:98:80:54:fc Fingerprint (SHA-256): D6:F7:AB:A9:20:15:0A:FD:C0:DB:12:41:E8:34:F5:71:65:14:D4:BE:C9:76:CA:7E:E4:4D:19:0F:62:9D:33:A6 Fingerprint (SHA1): AE:A6:87:9C:78:24:2F:7D:7B:2B:9D:AA:D2:61:6F:52:E9:3E:D6:7D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #6010: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043579 (0x6709d3b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:33:23 2016 Not After : Fri Jan 08 10:33:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:30:17:00:6d:d7:9c:11:b4:fa:14:09:6a:d2:ec:79: 05:0d:82:22:5d:b7:97:ad:7d:46:f0:97:f5:12:1c:35: ca:c3:3a:40:f5:ca:2c:26:67:72:00:24:f8:c8:fe:cd: 6e:7e:f1:c1:08:91:ec:4e:36:48:d9:f6:83:51:a4:89: ba:fd:13:f5:53:d6:f4:53:cb:e6:9f:3b:97:b2:47:51: 85:b2:b3:43:4d:98:df:80:51:1d:b7:57:b7:4c:e2:b8: 98:d4:29:b8:d1:4c:7d:e8:77:2d:73:b9:0f:a4:ab:3e: bd:c4:30:c5:0c:29:1f:40:aa:47:41:3c:fa:05:5e:a0: ec:1a:09:1b:db:55:f8:56:ef:b8:7e:57:6e:96:55:ea: 31:29:c0:67:34:5a:37:07:46:ce:4b:fa:a8:77:91:3e: e8:94:da:a1:ca:59:7f:5f:ec:ca:51:61:80:42:3a:1b: 92:2a:99:45:56:e9:df:56:dd:07:de:60:63:1e:0f:96: 1a:4e:2d:4f:6d:a6:5b:16:9f:a2:90:10:6a:58:df:7e: a5:81:a0:ac:1b:ce:ef:06:18:2a:02:2f:eb:cc:cb:f0: 32:9b:c6:ce:09:08:16:f8:20:de:e9:1c:06:33:3d:bf: 71:d9:45:9a:a8:26:33:bf:3d:c5:5e:18:12:ec:01:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:c0:07:5e:23:86:7b:a1:38:dc:74:ac:1d:78:1c:11: d2:79:1c:9c:a0:2a:1f:74:c8:65:10:f2:25:64:72:43: 3b:c2:43:73:f7:60:6e:35:ce:f7:ec:3a:f0:69:74:03: f0:af:e2:c7:ed:e0:84:b4:0e:89:0c:9a:64:b9:da:7d: c7:96:17:90:20:a6:c9:77:66:25:82:46:7d:cd:ee:88: 4d:6b:f4:7c:83:14:55:2a:62:7f:99:b4:ca:4e:7e:a0: c5:62:14:07:5f:bc:9f:df:1d:88:12:75:10:32:33:c6: 43:77:cf:0c:5c:95:3d:0c:18:45:40:22:a7:5b:a9:2b: f4:bb:c7:f6:66:ad:89:45:d8:35:4e:00:36:94:f0:f3: b3:b2:52:a3:ab:b5:b2:86:61:e5:ee:f3:f4:80:74:ac: 15:fe:d2:07:ab:93:de:f0:47:bc:9e:0e:fa:d1:39:f9: bf:8c:a4:f4:4a:b2:fd:7a:0e:26:72:bf:ba:57:a7:d1: aa:68:17:57:26:f4:3b:1b:32:71:f7:7c:59:44:99:a2: 7a:fe:02:27:98:6d:17:24:4e:9a:d0:6b:0a:85:44:86: 33:92:b2:f1:b1:d6:7c:58:25:e7:b2:fe:54:47:34:d8: ca:e9:0c:44:ed:89:77:cd:bd:54:e7:c9:d5:4f:3c:16 Fingerprint (SHA-256): 25:96:FC:FC:B7:53:57:B2:2C:86:F1:A0:AA:AB:9E:1C:80:5F:42:B2:41:54:90:24:00:9B:37:9D:68:2D:41:3D Fingerprint (SHA1): 62:B7:9E:67:89:47:A8:42:93:06:0E:DB:DD:48:70:3D:50:DC:84:FF Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6011: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #6012: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043579 (0x6709d3b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:33:23 2016 Not After : Fri Jan 08 10:33:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:30:17:00:6d:d7:9c:11:b4:fa:14:09:6a:d2:ec:79: 05:0d:82:22:5d:b7:97:ad:7d:46:f0:97:f5:12:1c:35: ca:c3:3a:40:f5:ca:2c:26:67:72:00:24:f8:c8:fe:cd: 6e:7e:f1:c1:08:91:ec:4e:36:48:d9:f6:83:51:a4:89: ba:fd:13:f5:53:d6:f4:53:cb:e6:9f:3b:97:b2:47:51: 85:b2:b3:43:4d:98:df:80:51:1d:b7:57:b7:4c:e2:b8: 98:d4:29:b8:d1:4c:7d:e8:77:2d:73:b9:0f:a4:ab:3e: bd:c4:30:c5:0c:29:1f:40:aa:47:41:3c:fa:05:5e:a0: ec:1a:09:1b:db:55:f8:56:ef:b8:7e:57:6e:96:55:ea: 31:29:c0:67:34:5a:37:07:46:ce:4b:fa:a8:77:91:3e: e8:94:da:a1:ca:59:7f:5f:ec:ca:51:61:80:42:3a:1b: 92:2a:99:45:56:e9:df:56:dd:07:de:60:63:1e:0f:96: 1a:4e:2d:4f:6d:a6:5b:16:9f:a2:90:10:6a:58:df:7e: a5:81:a0:ac:1b:ce:ef:06:18:2a:02:2f:eb:cc:cb:f0: 32:9b:c6:ce:09:08:16:f8:20:de:e9:1c:06:33:3d:bf: 71:d9:45:9a:a8:26:33:bf:3d:c5:5e:18:12:ec:01:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:c0:07:5e:23:86:7b:a1:38:dc:74:ac:1d:78:1c:11: d2:79:1c:9c:a0:2a:1f:74:c8:65:10:f2:25:64:72:43: 3b:c2:43:73:f7:60:6e:35:ce:f7:ec:3a:f0:69:74:03: f0:af:e2:c7:ed:e0:84:b4:0e:89:0c:9a:64:b9:da:7d: c7:96:17:90:20:a6:c9:77:66:25:82:46:7d:cd:ee:88: 4d:6b:f4:7c:83:14:55:2a:62:7f:99:b4:ca:4e:7e:a0: c5:62:14:07:5f:bc:9f:df:1d:88:12:75:10:32:33:c6: 43:77:cf:0c:5c:95:3d:0c:18:45:40:22:a7:5b:a9:2b: f4:bb:c7:f6:66:ad:89:45:d8:35:4e:00:36:94:f0:f3: b3:b2:52:a3:ab:b5:b2:86:61:e5:ee:f3:f4:80:74:ac: 15:fe:d2:07:ab:93:de:f0:47:bc:9e:0e:fa:d1:39:f9: bf:8c:a4:f4:4a:b2:fd:7a:0e:26:72:bf:ba:57:a7:d1: aa:68:17:57:26:f4:3b:1b:32:71:f7:7c:59:44:99:a2: 7a:fe:02:27:98:6d:17:24:4e:9a:d0:6b:0a:85:44:86: 33:92:b2:f1:b1:d6:7c:58:25:e7:b2:fe:54:47:34:d8: ca:e9:0c:44:ed:89:77:cd:bd:54:e7:c9:d5:4f:3c:16 Fingerprint (SHA-256): 25:96:FC:FC:B7:53:57:B2:2C:86:F1:A0:AA:AB:9E:1C:80:5F:42:B2:41:54:90:24:00:9B:37:9D:68:2D:41:3D Fingerprint (SHA1): 62:B7:9E:67:89:47:A8:42:93:06:0E:DB:DD:48:70:3D:50:DC:84:FF Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6013: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043581 (0x6709d3d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 10:33:46 2016 Not After : Fri Jan 08 10:33:46 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:2d:c2:4d:65:ef:19:f7:49:8d:9a:df:e5:d6:35:7e: 6b:a1:03:c0:85:fd:02:93:1e:d2:39:89:e5:ef:2f:3f: eb:f7:9e:72:f6:1a:e2:0b:58:0d:64:1c:11:df:a7:cb: 7a:17:00:8c:1f:e0:f0:50:cd:76:c2:96:20:42:9e:41: 5f:1c:6b:e9:b8:10:b7:57:46:99:0a:5c:04:6f:87:87: a0:9b:e0:e8:1b:52:4d:57:8a:3d:16:e9:a7:86:2e:69: 79:9e:37:ad:fd:08:af:90:97:4c:fb:3a:b0:d5:27:3e: b8:7e:98:3d:45:34:15:4a:e1:ad:75:c6:f3:b1:ec:ca: e8:52:90:b1:4b:0e:f3:7a:e6:05:af:a8:34:61:94:22: 1c:b2:9c:08:37:47:64:5b:6d:bc:ae:c7:f7:14:cf:27: c3:b5:c5:da:bb:44:eb:21:97:3a:00:a5:60:e2:3c:84: ce:7e:28:20:5e:0b:cf:b0:b5:f2:d4:16:6e:eb:a1:46: be:c0:2e:c5:ed:60:a5:0c:ad:5e:f1:d3:9f:1f:9d:5c: 3b:8c:83:0d:5c:ae:ed:a1:22:6f:98:54:d9:d5:69:f1: d4:de:84:91:ba:bf:8b:2f:04:4b:d9:59:e2:3e:0d:ea: ae:54:9b:c2:29:88:1e:13:ac:4f:51:84:3b:cd:e6:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:34:77:97:34:d1:b8:d5:58:98:57:ba:ea:a6:a7:97: 32:e1:c7:82:c6:49:a4:01:16:cc:39:a3:f2:25:73:e2: b4:58:37:aa:bc:b3:3e:90:28:2c:76:6c:fd:72:42:07: cb:98:66:d1:92:d8:19:23:ee:9a:5b:0c:f5:8b:c5:06: b3:52:da:d8:94:3b:1b:9e:39:bf:bb:cc:69:fa:1f:dd: 89:0b:76:04:a5:49:3a:b3:57:55:17:88:ed:ae:83:3a: 8c:30:db:de:f0:48:0b:1e:ed:a7:f3:45:4f:36:cb:c1: d7:36:7d:f1:54:0b:50:08:86:7e:61:c7:00:ac:ae:d2: 10:36:bd:08:33:c7:ec:ca:60:17:54:71:5f:90:37:a4: 98:bb:f2:fe:39:78:f6:5c:80:f9:06:29:0f:6f:dd:91: 93:06:f8:68:bb:63:54:d6:d7:4a:f9:b5:28:53:ae:de: 6a:15:de:72:ac:eb:e5:04:07:25:0a:f0:24:78:d0:cc: 3b:02:d3:5e:72:92:f0:23:f9:2c:cb:20:fd:6a:16:43: 0c:19:86:96:9d:3b:c3:14:31:4a:83:06:83:0f:8a:ce: 88:8d:74:64:b2:cc:07:76:5b:27:cc:38:06:8e:54:58: cd:24:6f:86:b8:d5:e4:cb:26:e0:ac:8e:98:80:54:fc Fingerprint (SHA-256): D6:F7:AB:A9:20:15:0A:FD:C0:DB:12:41:E8:34:F5:71:65:14:D4:BE:C9:76:CA:7E:E4:4D:19:0F:62:9D:33:A6 Fingerprint (SHA1): AE:A6:87:9C:78:24:2F:7D:7B:2B:9D:AA:D2:61:6F:52:E9:3E:D6:7D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #6014: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #6015: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #6016: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #6017: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043579 (0x6709d3b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:33:23 2016 Not After : Fri Jan 08 10:33:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:30:17:00:6d:d7:9c:11:b4:fa:14:09:6a:d2:ec:79: 05:0d:82:22:5d:b7:97:ad:7d:46:f0:97:f5:12:1c:35: ca:c3:3a:40:f5:ca:2c:26:67:72:00:24:f8:c8:fe:cd: 6e:7e:f1:c1:08:91:ec:4e:36:48:d9:f6:83:51:a4:89: ba:fd:13:f5:53:d6:f4:53:cb:e6:9f:3b:97:b2:47:51: 85:b2:b3:43:4d:98:df:80:51:1d:b7:57:b7:4c:e2:b8: 98:d4:29:b8:d1:4c:7d:e8:77:2d:73:b9:0f:a4:ab:3e: bd:c4:30:c5:0c:29:1f:40:aa:47:41:3c:fa:05:5e:a0: ec:1a:09:1b:db:55:f8:56:ef:b8:7e:57:6e:96:55:ea: 31:29:c0:67:34:5a:37:07:46:ce:4b:fa:a8:77:91:3e: e8:94:da:a1:ca:59:7f:5f:ec:ca:51:61:80:42:3a:1b: 92:2a:99:45:56:e9:df:56:dd:07:de:60:63:1e:0f:96: 1a:4e:2d:4f:6d:a6:5b:16:9f:a2:90:10:6a:58:df:7e: a5:81:a0:ac:1b:ce:ef:06:18:2a:02:2f:eb:cc:cb:f0: 32:9b:c6:ce:09:08:16:f8:20:de:e9:1c:06:33:3d:bf: 71:d9:45:9a:a8:26:33:bf:3d:c5:5e:18:12:ec:01:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:c0:07:5e:23:86:7b:a1:38:dc:74:ac:1d:78:1c:11: d2:79:1c:9c:a0:2a:1f:74:c8:65:10:f2:25:64:72:43: 3b:c2:43:73:f7:60:6e:35:ce:f7:ec:3a:f0:69:74:03: f0:af:e2:c7:ed:e0:84:b4:0e:89:0c:9a:64:b9:da:7d: c7:96:17:90:20:a6:c9:77:66:25:82:46:7d:cd:ee:88: 4d:6b:f4:7c:83:14:55:2a:62:7f:99:b4:ca:4e:7e:a0: c5:62:14:07:5f:bc:9f:df:1d:88:12:75:10:32:33:c6: 43:77:cf:0c:5c:95:3d:0c:18:45:40:22:a7:5b:a9:2b: f4:bb:c7:f6:66:ad:89:45:d8:35:4e:00:36:94:f0:f3: b3:b2:52:a3:ab:b5:b2:86:61:e5:ee:f3:f4:80:74:ac: 15:fe:d2:07:ab:93:de:f0:47:bc:9e:0e:fa:d1:39:f9: bf:8c:a4:f4:4a:b2:fd:7a:0e:26:72:bf:ba:57:a7:d1: aa:68:17:57:26:f4:3b:1b:32:71:f7:7c:59:44:99:a2: 7a:fe:02:27:98:6d:17:24:4e:9a:d0:6b:0a:85:44:86: 33:92:b2:f1:b1:d6:7c:58:25:e7:b2:fe:54:47:34:d8: ca:e9:0c:44:ed:89:77:cd:bd:54:e7:c9:d5:4f:3c:16 Fingerprint (SHA-256): 25:96:FC:FC:B7:53:57:B2:2C:86:F1:A0:AA:AB:9E:1C:80:5F:42:B2:41:54:90:24:00:9B:37:9D:68:2D:41:3D Fingerprint (SHA1): 62:B7:9E:67:89:47:A8:42:93:06:0E:DB:DD:48:70:3D:50:DC:84:FF Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6018: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043583 (0x6709d3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 10:34:16 2016 Not After : Fri Jan 08 10:34:16 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:02:73:55:f6:d5:2c:5c:10:9a:fc:36:ab:68:38:24: ac:9a:61:71:cd:ea:43:b6:4b:94:6d:23:98:6f:c6:0c: f0:f3:5e:89:58:b0:53:63:00:21:36:a4:e8:c3:5d:17: bb:fb:9d:9f:ae:a1:21:1d:44:d0:1c:6b:4e:7f:4f:83: bd:57:de:06:b8:9e:29:3a:08:c8:53:98:8a:03:02:d8: 47:97:e6:a4:5c:f3:b5:58:ef:1b:cf:cf:60:47:f5:d3: 6a:6d:1c:da:d1:2d:9c:ff:6c:ed:9b:ae:9c:d6:d3:28: 1f:6e:9e:64:3f:6c:51:99:f8:fe:d8:f9:54:91:fc:e2: 59:eb:f4:f8:9d:95:16:2b:ef:d7:9d:cb:f1:9d:b6:5c: e7:c2:c1:2b:17:19:d0:0f:d0:f8:96:d4:d0:e9:49:62: 05:1b:b2:12:2c:77:f6:8a:f1:cb:17:30:bc:e4:ef:cb: bd:1a:7e:ae:bd:b5:34:c0:24:c3:60:86:6a:6b:b6:40: f7:a9:f1:d5:02:81:be:f8:5a:7d:c4:82:76:8a:41:c5: ca:05:1e:b9:68:33:5f:c8:ac:7e:28:47:b8:9d:ea:35: 82:05:09:09:ae:b8:7e:50:3f:6a:7f:ab:62:18:e7:77: 0b:51:3b:7a:cc:84:25:12:f4:84:91:37:13:da:1d:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:a4:54:c4:f3:21:ef:c4:44:78:38:aa:7c:b5:1f:e6: 08:cc:5e:16:46:ff:c0:44:c3:05:d5:fb:84:3a:fa:16: 76:be:b7:07:60:56:89:21:4e:ca:30:40:6f:06:79:86: 85:41:a4:d6:5c:ab:a4:42:ce:f0:09:f1:04:ed:46:eb: dc:ce:8c:45:45:59:0e:40:a1:36:40:89:d4:ac:54:8d: 91:8a:4f:3e:72:b1:78:92:dc:df:19:20:d0:7d:50:50: a0:87:cf:26:20:b0:c2:0e:bb:01:a7:78:27:6d:b3:8a: 08:54:d9:f1:6c:41:6a:83:d8:81:ce:bc:d4:29:d2:58: 1c:07:4f:6d:a8:5b:eb:4a:ed:1d:68:98:0a:23:51:12: 9b:da:7e:87:f1:47:20:84:dc:92:19:8a:43:a2:4d:77: b1:dc:11:8c:e6:77:b6:56:74:ec:2b:5d:b6:74:41:2c: 72:1e:4e:5c:72:9d:de:87:cd:8d:a6:d5:26:f4:cb:e9: 15:87:90:f5:7c:74:ae:6c:1f:25:47:04:f8:98:ee:d4: 43:e1:46:97:e6:75:fd:ff:14:5e:8c:9d:16:d4:7f:16: dc:17:72:19:1e:c5:c5:51:de:5b:3d:13:45:8a:92:d0: 37:70:8a:bc:45:67:9a:22:09:f8:cc:7f:a3:2d:7d:f1 Fingerprint (SHA-256): 8D:EB:0C:DC:BD:54:8B:B8:0E:FC:FD:D3:96:6B:2F:4D:BF:E7:25:C7:43:FB:09:10:87:FA:B3:78:0F:ED:24:E5 Fingerprint (SHA1): 24:D3:99:E5:A7:F4:2B:C6:11:E8:5B:3F:C9:8A:3E:71:8E:0B:42:DB Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #6019: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043579 (0x6709d3b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 10:33:23 2016 Not After : Fri Jan 08 10:33:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:30:17:00:6d:d7:9c:11:b4:fa:14:09:6a:d2:ec:79: 05:0d:82:22:5d:b7:97:ad:7d:46:f0:97:f5:12:1c:35: ca:c3:3a:40:f5:ca:2c:26:67:72:00:24:f8:c8:fe:cd: 6e:7e:f1:c1:08:91:ec:4e:36:48:d9:f6:83:51:a4:89: ba:fd:13:f5:53:d6:f4:53:cb:e6:9f:3b:97:b2:47:51: 85:b2:b3:43:4d:98:df:80:51:1d:b7:57:b7:4c:e2:b8: 98:d4:29:b8:d1:4c:7d:e8:77:2d:73:b9:0f:a4:ab:3e: bd:c4:30:c5:0c:29:1f:40:aa:47:41:3c:fa:05:5e:a0: ec:1a:09:1b:db:55:f8:56:ef:b8:7e:57:6e:96:55:ea: 31:29:c0:67:34:5a:37:07:46:ce:4b:fa:a8:77:91:3e: e8:94:da:a1:ca:59:7f:5f:ec:ca:51:61:80:42:3a:1b: 92:2a:99:45:56:e9:df:56:dd:07:de:60:63:1e:0f:96: 1a:4e:2d:4f:6d:a6:5b:16:9f:a2:90:10:6a:58:df:7e: a5:81:a0:ac:1b:ce:ef:06:18:2a:02:2f:eb:cc:cb:f0: 32:9b:c6:ce:09:08:16:f8:20:de:e9:1c:06:33:3d:bf: 71:d9:45:9a:a8:26:33:bf:3d:c5:5e:18:12:ec:01:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:c0:07:5e:23:86:7b:a1:38:dc:74:ac:1d:78:1c:11: d2:79:1c:9c:a0:2a:1f:74:c8:65:10:f2:25:64:72:43: 3b:c2:43:73:f7:60:6e:35:ce:f7:ec:3a:f0:69:74:03: f0:af:e2:c7:ed:e0:84:b4:0e:89:0c:9a:64:b9:da:7d: c7:96:17:90:20:a6:c9:77:66:25:82:46:7d:cd:ee:88: 4d:6b:f4:7c:83:14:55:2a:62:7f:99:b4:ca:4e:7e:a0: c5:62:14:07:5f:bc:9f:df:1d:88:12:75:10:32:33:c6: 43:77:cf:0c:5c:95:3d:0c:18:45:40:22:a7:5b:a9:2b: f4:bb:c7:f6:66:ad:89:45:d8:35:4e:00:36:94:f0:f3: b3:b2:52:a3:ab:b5:b2:86:61:e5:ee:f3:f4:80:74:ac: 15:fe:d2:07:ab:93:de:f0:47:bc:9e:0e:fa:d1:39:f9: bf:8c:a4:f4:4a:b2:fd:7a:0e:26:72:bf:ba:57:a7:d1: aa:68:17:57:26:f4:3b:1b:32:71:f7:7c:59:44:99:a2: 7a:fe:02:27:98:6d:17:24:4e:9a:d0:6b:0a:85:44:86: 33:92:b2:f1:b1:d6:7c:58:25:e7:b2:fe:54:47:34:d8: ca:e9:0c:44:ed:89:77:cd:bd:54:e7:c9:d5:4f:3c:16 Fingerprint (SHA-256): 25:96:FC:FC:B7:53:57:B2:2C:86:F1:A0:AA:AB:9E:1C:80:5F:42:B2:41:54:90:24:00:9B:37:9D:68:2D:41:3D Fingerprint (SHA1): 62:B7:9E:67:89:47:A8:42:93:06:0E:DB:DD:48:70:3D:50:DC:84:FF Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6020: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #6021: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #6022: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #6023: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #6024: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #6025: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108043584 (0x6709d40) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 10:34:24 2016 Not After : Fri Jan 08 10:34:24 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:8c:9a:6a:51:98:01:8a:0b:fb:40:9d:8d:bf:ad: 0e:03:9f:68:61:16:60:9f:38:5d:5e:65:3f:9c:33:0d: 04:7b:ec:69:c5:61:25:be:d0:89:df:7e:9c:6d:e6:b2: 5d:c4:6c:fe:49:3a:4f:2c:46:6a:32:47:58:09:94:57: 0e:95:8a:89:13:71:fb:76:0a:69:db:9c:48:e3:27:88: 59:8b:80:46:37:bc:9b:c3:07:3d:9f:e6:be:dc:3d:01: 88:f6:80:72:d0:70:7f:21:e9:a8:cb:3b:51:9f:cd:6f: fb:67:c4:6c:f8:85:76:9c:2a:eb:fb:9f:86:f9:9a:c6: 37:6a:ae:fc:d0:f9:a5:dc:6f:5e:5e:36:d6:0e:e0:e8: 2a:c7:a9:23:58:d0:f3:22:12:04:21:af:af:93:bc:33: 9d:9a:44:e2:e3:4e:b6:b9:16:5d:19:49:06:2a:96:13: df:13:97:dc:b7:4a:7b:bc:e4:24:71:63:25:5f:bd:f6: b1:3c:e2:42:c2:b0:49:a0:30:80:8d:ec:c2:af:93:9e: 7b:25:62:86:5e:5a:7c:a6:e7:1c:29:35:1d:ae:8e:78: 39:d7:38:95:ce:d0:00:40:19:a9:eb:61:e2:71:e3:22: 32:b0:da:aa:58:7a:76:e5:d1:29:10:9b:91:31:a1:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:77:96:31:6f:70:31:2d:1f:f7:95:7a:ab:d0:3c:aa: a3:27:4f:08:5d:7a:f1:36:11:69:1c:dd:9e:5e:73:fd: 75:ed:d5:8f:1d:71:66:79:40:50:c5:4a:f0:79:4b:68: c2:06:b5:f0:b2:44:09:8e:f7:45:8a:d6:57:f6:05:50: de:4d:ec:77:55:49:d8:8c:06:e0:c5:93:77:f0:4f:9e: 2e:14:3c:d8:5f:55:ca:3a:a4:ea:71:be:9b:d5:8c:74: b4:34:e3:d2:f6:cc:56:64:3b:d5:8d:ad:e6:83:96:81: fa:bb:d3:ba:17:e4:c8:9a:6f:46:81:55:0a:6e:73:0f: dd:af:06:61:33:80:5e:77:b9:12:b2:dc:fa:d3:50:3e: 43:d1:64:5f:1a:e3:f3:57:df:60:18:5d:c9:eb:f1:34: af:1c:04:53:93:b8:88:7e:15:0e:ac:00:e4:33:14:7f: 4e:91:24:82:c6:5c:3c:4e:22:c2:b5:4a:b5:a1:fa:75: d9:08:81:22:71:fd:21:2f:25:aa:ca:42:48:ce:39:c0: 57:02:ce:eb:37:31:a1:96:8a:44:75:65:2e:02:33:7c: 34:cb:9a:b5:60:fd:3b:26:77:16:1a:28:45:2f:ac:71: 64:02:04:49:d2:79:2b:ce:2d:93:e0:86:ef:cf:25:28 Fingerprint (SHA-256): 52:95:D5:40:D9:F6:8A:E7:8A:C5:50:95:25:B8:29:B5:AE:DF:F7:70:8C:49:8A:32:A1:D4:AF:C6:DA:44:B0:B4 Fingerprint (SHA1): 28:E2:B1:49:81:9F:45:C9:E9:8D:1E:8E:EF:6C:D4:6C:FA:45:1B:FC Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #6026: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #6027: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #6028: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #6029: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #6030: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #6031: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6032: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #6033: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #6034: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6035: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #6036: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #6037: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #6038: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #6039: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6040: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #6041: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6042: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #6043: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6044: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #6045: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6046: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #6047: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6048: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #6049: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 1695 at Fri Jan 8 05:34:59 EST 2016 kill -USR1 1695 httpserv: normal termination httpserv -b -p 9601 2>/dev/null; httpserv with PID 1695 killed at Fri Jan 8 05:34:59 EST 2016 TIMESTAMP chains END: Fri Jan 8 05:34:59 EST 2016 chains.sh: Testing with PKIX =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Fri Jan 8 05:34:59 EST 2016 TIMESTAMP libpkix END: Fri Jan 8 05:34:59 EST 2016 Running tests for cert TIMESTAMP cert BEGIN: Fri Jan 8 05:34:59 EST 2016 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #6050: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #6051: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6052: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6053: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #6054: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #6055: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6056: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6057: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #6058: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6059: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #6060: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6061: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #6062: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #6063: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6064: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6065: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #6066: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6067: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #6068: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6069: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #6070: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6071: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #6072: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6073: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #6074: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6075: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #6076: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6077: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #6078: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6079: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #6080: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6081: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #6082: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6083: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #6084: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6085: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #6086: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6087: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #6088: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6089: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #6090: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6091: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #6092: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6093: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #6094: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6095: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #6096: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6097: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #6098: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #6099: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6100: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6101: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #6102: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6103: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #6104: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6105: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #6106: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6107: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #6108: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6109: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #6110: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6111: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6112: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #6113: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6114: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #6115: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6116: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #6117: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6118: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #6119: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #6120: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6121: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6122: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #6123: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6124: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6125: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6126: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6127: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw cert.sh: #6128: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6129: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6130: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #6131: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6132: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #6133: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6134: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #6135: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6136: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #6137: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6138: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #6139: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6140: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6141: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #6142: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6143: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #6144: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6145: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #6146: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6147: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6148: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #6149: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6150: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #6151: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6152: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6153: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6154: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6155: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #6156: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw cert.sh: #6157: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6158: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert cert.sh: #6159: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #6160: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-ec.ca.cert cert.sh: #6161: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6162: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #6163: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6164: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6165: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #6166: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6167: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6168: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #6169: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6170: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6171: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #6172: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6173: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6174: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #6175: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6176: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #6177: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6178: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert cert.sh: #6179: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #6180: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-ec.ca.cert cert.sh: #6181: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6182: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #6183: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6184: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6185: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #6186: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6187: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6188: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #6189: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6190: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6191: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #6192: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6193: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6194: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #6195: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6196: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6197: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #6198: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6199: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6200: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #6201: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6202: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6203: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #6204: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6205: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6206: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #6207: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6208: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6209: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #6210: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6211: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #6212: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #6213: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #6214: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating ssl_gtest DB dir cert.sh: Creating database for ssl_gtests cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ssl_gtests --empty-password cert.sh: #6215: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Creating server certs for ssl_gtests cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -S -z ../tests_noise -g 2048 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ssl_gtests -n server -s CN=server -t C,C,C -x -m 1 -w -2 -v 120 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? cert.sh: #6216: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -S -z ../tests_noise -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ssl_gtests -n ecdsa -s CN=ecdsa -t C,C,C -x -m 1 -w -2 -v 120 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? cert.sh: #6217: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw cert.sh: #6218: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6219: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert cert.sh: #6220: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #6221: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #6222: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6223: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #6224: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6225: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6226: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #6227: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6228: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6229: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #6230: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6231: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6232: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #6233: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6234: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6235: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #6236: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6237: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw cert.sh: #6238: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6239: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert cert.sh: #6240: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #6241: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #6242: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6243: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #6244: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6245: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6246: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #6247: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6248: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6249: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #6250: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6251: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6252: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #6253: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6254: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6255: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #6256: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6257: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw cert.sh: #6258: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6259: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert cert.sh: #6260: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #6261: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #6262: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6263: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #6264: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6265: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6266: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #6267: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6268: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6269: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #6270: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6271: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6272: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #6273: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6274: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6275: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #6276: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6277: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw cert.sh: #6278: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6279: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert cert.sh: #6280: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #6281: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #6282: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6283: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #6284: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6285: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6286: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #6287: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6288: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6289: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #6290: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6291: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6292: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #6293: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6294: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6295: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #6296: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6297: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #6298: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #6299: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #6300: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #6301: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #6302: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #6303: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #6304: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #6305: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw cert.sh: #6306: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6307: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #6308: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6309: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw cert.sh: #6310: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6311: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #6312: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6313: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #6314: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6315: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6316: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #6317: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6318: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6319: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #6320: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6321: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw cert.sh: #6322: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6323: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #6324: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #6325: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #6326: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6327: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #6328: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6329: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6330: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #6331: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6332: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6333: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #6334: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6335: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6336: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #6337: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6338: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6339: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #6340: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6341: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:07:06 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 10:40:51 2016 Not After : Fri Apr 08 10:40:51 2016 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:7e:34:35:ae:5f:9e:ea:d7:e3:d9:0c:00:3b:e9:f3: 99:ff:c8:d8:66:0b:f1:cf:ec:52:af:04:f8:fc:af:ac: 02:7d:3f:37:2b:a0:d2:48:d4:01:b5:68:96:68:62:9e: 70:de:3a:03:13:f2:c3:30:35:d8:bb:98:f7:bd:74:a9: e1:03:7e:e6:73:8b:b5:10:3b:7d:0d:8a:b2:18:20:6d: ed:b1:28:be:80:52:a1:20:3f:b1:e9:cb:05:51:3c:be: d0:5a:01:fc:43:7f:24:e3:97:9a:68:50:b1:8a:ff:64: 34:ae:d8:d6:20:af:40:b8:12:08:2f:72:9f:6a:af:06: a3:b4:cf:88:11:9b:3f:bd:d8:85:5b:00:a7:34:88:40: ff:21:b7:4f:d8:a2:5d:7f:33:70:e1:4d:f7:5d:01:fe: 3c:53:ed:30:f9:ab:98:70:41:e7:b4:df:81:85:99:8b: ac:f7:39:5b:ea:7a:d5:4f:98:b2:b7:df:b3:27:b3:97: 4f:7e:a1:97:06:db:52:f9:d5:8d:9d:56:d0:c1:04:64: 77:60:b4:0b:c2:40:92:da:8b:b3:f7:8d:9f:65:75:69: 95:93:9b:76:3d:9b:07:3e:5d:4c:de:8b:6c:1b:5c:0f: 9c:9d:24:f6:8e:99:2a:63:1b:27:7c:1f:38:bc:d9:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:31:4b:e8:4b:1a:dd:c0:00:e6:9c:98:ee:52:35:64: c8:58:6b:10:3f:06:ed:46:9a:cd:b5:bc:48:fa:61:7b: ac:95:ad:d4:c6:91:18:89:9d:af:04:8f:7e:44:69:bc: cb:6f:b2:61:b2:6d:09:8a:a0:2c:a6:be:47:fc:90:37: 6d:b3:17:5a:81:3d:5d:e6:b7:68:94:5c:47:d3:d3:a2: f7:85:1c:1d:24:a7:ab:20:47:ab:a5:d6:3e:fd:d0:44: 71:9f:ec:30:9c:8c:73:b6:a7:42:9a:83:d0:7b:4c:c9: f5:9b:a6:c2:47:84:d7:41:e5:ef:e8:28:94:fe:db:3d: ea:42:f1:73:de:86:da:5d:39:9a:af:b5:c1:3a:c9:99: fe:4e:4c:09:b1:8d:e0:22:26:3c:f8:2e:d3:62:49:14: 43:9e:02:28:4d:5c:c9:6d:85:d5:90:23:30:52:b7:80: b3:5d:c1:82:87:f8:d5:93:4a:98:0b:8b:db:d7:dc:a5: 4e:45:7b:de:e4:e7:0b:ee:6b:12:81:d2:52:eb:b4:41: 8d:dc:0f:46:c3:98:aa:9b:0c:9d:cf:d9:76:6f:87:6e: 5e:8d:5b:3e:3c:db:7e:86:a7:bd:8a:49:40:da:c9:44: e9:96:aa:97:9b:fc:57:4f:10:93:d8:f6:30:76:23:4f Fingerprint (SHA-256): DD:F3:05:34:9C:7A:D7:6C:2E:D6:CB:37:06:8B:2D:EB:BA:3D:D6:76:2F:FF:04:2E:15:E4:C9:E8:E2:5E:77:CC Fingerprint (SHA1): 21:25:EC:F9:48:76:C6:E8:BF:F4:B9:E4:79:AD:9C:99:21:31:98:8A Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6342: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:07:16 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 10:40:57 2016 Not After : Fri Apr 08 10:40:57 2016 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:03:b2:d8:09:ab:7a:2c:cd:10:11:a8:6e:03:2e:93: b7:f7:a6:ad:c2:65:ac:0a:9a:d6:cd:5e:72:83:5a:a8: 58:64:37:93:51:90:aa:a0:7d:23:6f:1e:2c:32:eb:b1: f8:30:48:a6:a4:82:a1:e5:ca:73:2a:84:dc:69:ee:95: 14:f8:d3:99:01:14:6f:f4:41:f7:c1:88:96:4b:45:b4: b4:85:19:48:09:32:33:94:8c:7f:b3:82:f5:53:6d:bc: 42:85:23:b5:93:ef:72:cc:fb:dd:90:c5:93:f0:32:a5: 8f:60:51:56:95:fc:04:07:ab:ae:d8:0b:f6:47:01:70: 3c:9c:0f:e9:63:db:a3:f5:90:b5:2c:4d:67:e5:14:c7: 76:7d:9f:5c:94:64:8e:74:be:43:fb:04:0f:c5:b7:af: f1:1e:fb:62:86:76:c4:99:6e:37:25:c7:2f:9c:32:7b: 03:ea:a8:4c:d5:0f:43:06:0c:42:f4:ef:47:a0:95:15: 6d:ed:58:46:43:67:4e:c4:43:3e:ef:cb:4c:6e:a2:36: 97:ca:93:88:c2:f4:5a:24:c7:7f:1a:be:3e:6c:37:1a: c4:fa:f2:60:bd:3d:d9:9e:e3:19:d3:61:bd:56:b8:a1: 57:d6:54:e2:fa:58:f9:30:a6:48:a0:6a:51:41:1a:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ca:f0:4f:c3:25:1d:81:3a:5c:57:e6:e3:77:3c:69:78: 4a:d0:08:bc:e4:f2:05:ad:f7:8f:47:0d:d1:7e:0a:2e: b7:e0:28:97:4f:89:5e:7b:cf:5c:7c:5e:0f:e0:7a:44: f2:92:c4:81:2a:be:9e:5c:34:55:be:49:4d:cc:71:eb: 18:2a:25:7f:43:85:c2:f2:19:98:df:d4:69:e8:4e:08: 50:23:38:b7:da:04:56:c4:c4:82:ae:6c:d9:ba:a4:45: 4d:f5:45:65:54:05:19:4c:16:75:e4:bc:07:c0:56:72: 89:df:06:de:7e:3e:34:1a:ec:55:56:36:df:86:01:e0: 1e:75:de:4f:75:f8:81:a7:c9:08:21:90:f4:35:81:cf: 68:78:e8:fa:2d:73:b8:23:49:4e:d8:4f:fc:27:88:d4: e6:7c:c3:83:1e:4c:ea:b8:0d:4a:4f:27:83:eb:99:77: e3:a9:dc:2e:ee:b6:47:f5:14:0c:3f:a4:a1:4e:b7:6d: fe:91:32:7d:ca:2a:68:51:0d:b5:ce:e8:b1:06:4a:2e: 59:07:3c:5a:8e:77:93:b7:85:b2:25:d9:2f:5b:e5:6a: 1d:cd:66:96:c6:2b:02:74:fd:dc:51:23:2e:ea:0b:93: ed:4f:e4:26:ba:31:cf:3a:c3:e5:bc:7f:67:0e:8b:1a Fingerprint (SHA-256): 1A:EB:5E:16:80:B2:1E:E0:A9:9F:2C:02:8A:E0:77:54:03:36:1A:FD:EB:E6:FF:48:3F:09:F5:8D:1C:AA:0F:B9 Fingerprint (SHA1): 81:8B:E1:CF:FE:8E:44:D0:40:0A:3C:52:8D:F4:E4:7C:86:0A:88:85 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6343: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:07:21 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 10:41:10 2016 Not After : Fri Apr 08 10:41:10 2016 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:20:e8:e2:b8:7a:88:b1:d3:aa:64:49:5e:22:bc:74: 01:10:d5:c6:91:93:46:9e:15:21:fd:4d:e4:7a:96:d7: 08:0f:97:e9:50:20:0d:50:91:dc:94:8d:55:6a:c0:07: 87:3d:f3:d2:53:80:9b:78:1d:61:5b:56:ae:64:0b:7f: c8:d8:5f:71:31:7c:66:53:61:39:f2:a0:94:a2:e6:fd: c1:66:ee:0a:9a:99:10:d5:f9:5a:d0:51:ab:e0:f9:ce: ff:b3:6a:e5:a7:c9:62:cc:50:aa:87:38:55:8f:df:0a: 23:95:19:d1:f2:f5:c2:3c:15:68:b6:3b:23:c1:f3:5c: d5:6e:f3:a4:9c:0c:ed:b1:79:7d:c9:7e:58:94:ec:fc: b5:5e:c1:1b:19:4f:d2:9c:7b:0b:27:29:c9:f7:18:91: 25:c2:34:74:30:6c:b6:e4:13:55:d1:4f:31:52:31:e1: 2d:ad:d5:c8:63:c1:fc:b5:4a:ea:c5:b1:d7:e8:02:e0: bd:5d:f0:35:cb:6e:dd:aa:a5:85:d1:05:70:53:fd:64: 8d:be:46:52:49:c7:dc:50:21:23:a6:f1:11:c4:b4:7f: ea:97:72:a5:26:7c:70:df:98:7f:1b:23:21:d0:63:c5: ab:0b:1e:e5:59:23:38:a4:3b:d7:09:f4:2a:0a:ac:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:0f:1c:4b:42:f8:68:e5:45:41:bd:41:3b:d1:c4:a2: ef:53:9d:1b:2d:67:37:2a:c3:28:d1:60:e1:6e:cd:bf: 2e:81:76:20:58:ff:0e:f4:15:ec:87:72:10:9f:64:44: 74:74:5f:8c:39:f5:c7:cc:57:37:7f:70:24:8b:75:af: f2:3e:76:c3:01:bb:ff:6a:5a:d5:ba:3f:01:3d:9c:b6: cf:aa:ee:1e:38:08:3e:c9:74:32:a6:54:46:4d:34:3f: 77:4c:d0:75:76:e3:b3:fa:2f:9c:fd:e1:03:d9:94:79: 11:8c:88:22:4d:c4:db:32:3c:13:bc:bb:74:9b:fb:31: 91:e2:c0:0f:da:db:1e:1d:63:c3:d4:a4:f5:2d:52:db: 9b:09:ab:b3:03:2d:70:9c:2c:07:80:b5:25:3f:12:75: 74:68:e3:ad:88:c8:17:37:6d:d8:8e:cc:65:59:be:f6: c3:97:89:ab:70:26:a6:e7:9e:99:62:54:a2:b9:80:15: ca:78:fb:3c:39:33:ab:a7:b3:1d:ab:19:eb:de:f7:91: c1:c2:91:f4:22:01:c4:fb:e2:f4:a2:4d:4a:df:65:87: 0b:be:97:96:57:e4:3b:fe:d5:88:e1:5f:92:ba:a8:6d: a9:75:6f:2f:bf:43:c3:f2:11:d0:96:ed:b2:aa:b9:ee Fingerprint (SHA-256): 08:9A:D0:3C:D7:33:50:87:5C:E5:07:80:9A:0E:27:6A:18:13:0C:C4:E9:62:96:61:FF:BE:CB:B1:CF:33:EA:30 Fingerprint (SHA1): 60:57:CF:4A:1A:28:61:27:8F:DE:34:61:C0:02:7E:E7:AE:85:81:9C Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6344: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:07:3a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 10:41:26 2016 Not After : Fri Apr 08 10:41:26 2016 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f0:e4:ca:1f:dd:f8:c0:d9:a7:27:79:91:4e:7c:4a:68: 48:f1:7d:7f:81:ff:76:a8:a7:90:55:f0:2c:8a:e5:ad: 2c:d9:d3:32:cb:06:71:96:c5:c7:af:11:77:c8:89:df: af:6c:80:d0:24:52:4a:82:e8:1d:50:f3:a4:50:07:55: f6:99:93:04:d6:d9:80:75:54:7c:b1:6c:44:f0:9b:76: 1e:71:f3:c1:1b:28:df:bd:c3:c6:d9:7b:d7:2b:ca:84: e8:d6:ec:7f:ff:fb:4a:20:4f:5d:e4:fb:86:21:63:18: 3c:af:49:15:6b:d6:1e:5c:e4:b0:7e:b2:4f:cc:af:69: 0d:ab:02:dd:44:f8:d9:63:be:92:8a:15:85:cf:f2:f5: 01:36:ea:9f:5a:59:5e:0c:2f:80:2b:43:77:8b:de:39: b9:42:46:a6:85:c0:15:30:64:6e:0d:84:b0:fe:fb:a8: 17:80:71:6d:b8:0a:fb:4a:2a:f2:b5:e5:cf:b9:c3:66: 09:5e:44:dc:b9:25:a8:f7:86:99:6f:c0:8a:8c:71:a0: 5e:ec:bf:bf:5e:ba:4e:44:c9:3f:d5:ae:ce:07:8d:29: 0b:e4:4b:30:20:18:87:84:7e:f0:8d:b3:53:77:25:d4: c2:b8:10:68:72:3d:5c:71:a2:67:0b:12:ec:99:fe:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:ea:99:74:89:55:2b:fd:50:89:ee:0e:45:73:dd:33: 2f:85:6b:3a:9b:6c:1a:67:9e:1e:da:00:b7:87:bd:8e: 2d:16:af:e6:f0:dc:69:36:d3:75:98:c3:9a:24:be:2a: c1:89:1c:4e:c1:01:ea:45:b5:db:2a:3b:57:17:19:5d: 15:1e:ca:6b:e3:ff:33:3f:d3:ff:4e:da:2d:15:21:bf: 67:58:33:d3:e4:37:13:ff:ca:33:a2:6c:a9:79:cd:bb: 83:11:e9:ce:df:b5:d5:0c:e5:ce:8a:d1:50:b0:09:d8: cb:71:d6:9c:68:ad:1e:2d:93:9c:69:75:ec:16:df:b1: 5b:8a:c9:b7:20:4d:6d:e3:54:4d:4e:19:4f:4b:8a:7b: e0:25:bf:ef:d2:c0:5a:47:d3:80:db:b4:14:32:f2:94: 1c:f2:29:24:1b:fc:70:aa:9f:50:11:a0:5c:f9:a4:bc: b3:50:fa:72:cd:a4:6a:d3:2e:42:e3:b3:77:e3:dd:8c: 51:0b:f7:35:9d:cd:54:09:83:cc:40:c8:15:ee:f6:3a: 01:ad:67:77:b0:04:a6:6b:d7:a6:43:84:24:45:be:2f: d1:f3:4a:f9:bb:3c:bd:ad:6f:d2:de:17:c7:d6:65:75: 82:4e:b8:b8:e8:3d:94:24:71:4f:11:16:8b:c0:75:83 Fingerprint (SHA-256): E7:41:CA:56:64:A3:9D:27:3A:59:13:40:53:FA:93:0D:82:94:FC:C8:7E:32:17:FF:0E:6B:25:1D:23:58:F8:B8 Fingerprint (SHA1): 25:C1:B8:50:28:DE:A9:91:63:08:B8:14:28:92:B9:F0:5D:04:B9:5F Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6345: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:07:59 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 10:41:34 2016 Not After : Fri Apr 08 10:41:34 2016 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:ed:e1:b3:ba:62:38:8e:b1:91:0d:d7:83:b6:63:93: d9:08:20:c2:23:58:6e:07:03:60:fb:f8:41:09:4d:4c: db:e2:e6:3b:b5:ee:72:bc:26:a3:fc:58:2e:b5:bf:e4: 21:d1:56:b4:18:53:de:c4:53:7d:d0:cf:95:9c:d5:77: 28:56:eb:f4:53:fe:42:a2:92:49:41:0e:ad:62:b0:69: 0f:71:91:e8:eb:f3:af:18:f7:1d:10:5f:a3:bf:ee:85: 08:d1:de:9a:8c:b2:0e:43:01:8b:2c:97:7f:8e:9a:aa: 15:b0:9a:47:07:c5:c1:31:99:ea:bc:4c:e7:ce:56:68: d8:b6:60:0f:44:aa:8a:14:94:23:89:13:21:a2:68:30: df:32:5c:08:e6:04:6a:6f:4b:bc:c9:1b:8b:d6:e4:ca: b3:ab:f4:60:d4:7e:83:56:ae:ed:25:05:5f:14:29:a4: 65:a8:69:3c:1d:48:ad:ac:5b:40:c2:d0:44:31:2b:03: 6e:36:e7:32:6b:67:55:d7:17:c3:53:84:d7:b8:fb:6c: 80:ba:11:cc:28:4a:29:4a:14:f7:ef:28:36:aa:30:67: 94:a7:dc:61:72:ba:b1:5b:9b:9c:43:4c:8a:71:48:88: 37:89:01:a5:d4:f5:c1:2b:ce:0a:ce:56:8d:d7:5c:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:e1:8d:cb:f5:e8:4f:68:c2:d6:85:7c:02:73:59:ef: a9:e3:10:63:27:af:cd:f6:4c:36:1b:f7:ca:1d:73:72: b3:d4:8e:27:7c:0c:bc:a9:7d:c3:f7:66:b1:11:f2:dc: b6:32:19:7c:39:2b:29:df:1d:03:78:d7:df:bd:91:dd: ce:27:91:23:c2:1c:73:ae:53:92:ea:40:62:ae:a6:49: f1:0f:28:b2:41:b3:88:1f:78:ea:64:0c:1f:bf:30:2e: 5d:be:82:a3:37:84:fa:8f:0b:44:3a:7a:5d:06:3e:49: 1b:b0:87:6f:57:cd:c4:08:f1:1b:9a:4b:33:66:8b:25: c1:f5:1d:1d:9f:73:cf:7c:a7:aa:10:4a:e1:63:3c:9c: 09:38:5f:29:0f:ca:e1:ef:bf:34:f0:ac:39:81:4f:a5: 36:4e:13:9e:70:0f:3f:8b:a2:f0:66:00:49:c5:18:84: 9d:44:44:24:a3:8b:ea:b0:ee:c2:a5:7d:76:a9:dc:b9: 0f:a1:38:6b:a3:c7:d4:c9:86:cb:4f:02:90:95:3e:d1: 26:8c:f0:d8:4e:da:31:39:7e:e0:12:47:5b:a9:6b:9a: a5:94:79:36:fa:1e:12:58:29:67:7a:e5:ba:fe:28:3c: d6:cf:d6:d0:cb:ae:e2:1b:a9:02:f8:dc:c2:1b:d5:65 Fingerprint (SHA-256): AD:D4:93:38:65:D7:D8:89:A9:5A:00:0C:67:80:09:C4:9F:A8:59:96:18:7D:EF:59:60:9E:D5:40:45:87:E3:AB Fingerprint (SHA1): 7C:6D:D5:37:95:F7:98:7F:5F:9C:7B:4C:83:01:6E:B2:C7:09:76:EF Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6346: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:07:67 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 10:41:46 2016 Not After : Fri Apr 08 10:41:46 2016 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:bb:93:ea:7d:9c:08:37:b6:5b:c0:38:e4:50:7e:ed: 73:af:96:41:98:c2:7a:5b:f3:ba:cc:29:9c:f2:36:1c: 36:74:ed:59:b7:ad:b3:a7:2f:b5:fd:12:c0:3f:bb:88: 80:0b:b3:98:aa:a1:dc:ab:ac:13:42:56:90:f2:a6:88: 67:a8:9e:75:7e:fe:c3:a2:ef:0f:1f:b5:e1:10:df:72: a2:7f:f0:c4:fe:13:7c:95:02:b5:64:e0:7d:e5:90:67: 69:36:c6:95:86:10:9f:eb:41:0e:12:99:bc:51:b0:a7: b2:f4:eb:7c:b4:b6:12:d3:52:ac:b3:11:c1:93:1e:6b: 38:a8:28:0b:01:b6:a1:57:40:e8:31:69:58:fb:ba:3b: 90:dc:82:cf:c9:12:91:ce:ab:8b:87:64:21:d3:e3:67: 60:82:8f:e8:03:dc:00:5e:6d:41:8d:f8:91:b6:b0:42: 19:31:7a:7e:32:cd:82:dc:71:7d:bb:a3:69:70:11:3e: 81:d1:de:25:47:1e:36:a5:82:8e:a5:57:bd:92:5d:8f: 92:fe:89:8a:67:d2:d5:17:7f:b3:72:83:ea:a8:2c:e8: cf:da:44:0e:6d:6e:91:7a:b6:62:13:4a:a0:0e:e6:38: 37:85:18:70:88:e9:08:f8:04:5e:f8:50:48:0e:f7:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:72:7c:a2:fd:8d:71:65:4d:72:a9:8b:b6:0c:65:9f: e2:3c:eb:fd:03:68:36:74:7b:ef:25:65:b9:98:4c:a2: 81:0e:2e:16:b2:df:0c:11:17:b7:15:ce:9c:78:4c:3d: dd:7c:54:36:78:ef:fd:36:f6:4f:e5:99:97:5d:08:26: b6:70:c2:31:2e:2c:4a:a0:8c:f4:69:6d:83:3c:f4:58: 24:2d:95:c2:ae:53:07:ba:e9:62:32:a7:a9:62:7e:3f: 03:0c:37:2b:7c:11:15:84:9b:af:e4:48:7f:11:fb:42: 96:f4:20:31:ce:67:44:10:5d:ea:cd:a5:d6:db:30:e9: 3c:4a:20:65:da:94:ba:89:25:a4:f3:0d:b0:77:33:c1: e3:ff:72:6d:25:d3:1e:f9:59:79:6f:8c:54:6d:8c:da: b3:d3:22:86:49:6b:ab:2b:f9:fe:8f:0a:8c:88:19:c4: 7b:6b:0f:5f:63:6c:85:6b:2a:0c:68:d0:5a:26:dd:4a: ae:f8:8a:5e:13:ad:f4:c7:f4:c4:79:d7:86:b6:76:ed: 37:d8:37:9f:61:63:c3:e2:c2:ab:9d:5e:a3:82:ba:21: 0d:f0:09:f7:ee:58:d3:65:c0:74:e0:f1:fa:f4:24:55: b4:89:55:b6:f3:8f:a0:54:e7:b0:f1:03:b2:17:f8:70 Fingerprint (SHA-256): 92:B6:1D:6B:B0:46:78:32:7D:95:19:FE:F3:85:47:E5:46:63:80:B9:A6:3A:F8:22:FF:38:46:71:99:2A:94:48 Fingerprint (SHA1): 66:40:47:BE:26:67:88:88:2C:1B:52:88:30:C7:A1:9E:04:09:91:07 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6347: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:07:7f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 10:41:52 2016 Not After : Fri Apr 08 10:41:52 2016 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:08:a1:11:38:61:b2:8a:8e:da:12:9a:fd:41:36:b4: 43:cd:ab:ac:9e:6c:69:5c:88:43:90:9c:69:1e:72:ac: 6d:02:12:41:65:f7:59:79:e3:e0:5a:b7:c3:38:cc:f0: eb:3d:60:58:9d:08:83:28:6c:29:ce:c1:0a:d0:c7:be: fe:8f:b0:25:97:b6:95:b6:8c:5b:3b:5e:d3:04:6b:05: 76:0b:9d:57:41:ad:43:01:ef:f5:d9:90:da:56:8f:94: 96:9e:5d:e3:46:04:95:89:06:bb:b5:3e:39:d9:3c:76: a6:0e:1d:4c:cb:d3:1b:3f:58:bd:ae:6c:94:b6:a3:95: 8f:2b:87:7c:b9:df:b0:f3:bf:13:0c:fb:88:9d:69:14: 82:1a:04:e7:51:dc:dd:c0:d1:1c:ec:20:59:ae:7c:d6: 21:cc:9b:9f:f2:86:99:fc:65:fa:d3:4d:6a:12:7c:3c: f7:f0:5a:4a:da:d9:36:4a:62:3b:00:75:f7:b4:ac:81: bd:45:e7:69:2d:8b:c4:2f:4d:18:de:65:7b:92:70:6b: a2:e8:f9:6f:25:86:6f:dc:12:09:1b:93:22:5a:44:48: fe:83:f1:96:75:07:c8:6b:f5:25:f4:20:51:d1:96:48: 66:9d:8a:4a:0c:71:90:39:21:87:ae:e2:73:76:67:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:63:48:06:5c:0b:d3:90:6f:4d:fe:d2:bb:e5:15:09: 46:1c:09:f2:3b:e7:a5:95:83:f2:ca:d7:d0:f4:8d:83: 2e:91:da:9b:7c:cf:6a:00:6f:2b:5b:4b:71:e1:1d:99: 3b:cf:3d:c5:93:bc:70:71:cc:b0:a9:29:2a:3b:9d:e9: bd:a5:32:36:7f:7f:99:04:59:c9:0b:b6:94:01:5d:97: 76:c6:59:34:19:5c:b1:f0:6f:f1:3e:c2:57:2d:ff:e4: c5:0a:aa:c8:22:bd:6a:d5:f1:1b:6e:c3:54:3f:1f:ca: c8:37:9f:dc:58:26:d9:7d:21:86:7d:e5:68:4a:03:40: af:0a:e5:34:eb:8d:45:e5:80:d7:ab:ce:44:3b:96:d8: 45:df:7a:75:cf:e3:19:15:9b:e0:4c:e8:26:91:f7:c4: 46:a5:fc:bf:d4:6f:ec:6f:17:80:a5:13:6e:e7:5e:4c: 56:90:79:85:57:c5:5d:e2:50:ac:9f:f7:88:ec:a3:c7: cc:45:c1:fa:da:27:8b:53:11:cb:7b:b8:33:01:88:5d: c7:7e:2b:fd:85:8b:b4:22:61:a5:88:37:13:25:d4:76: ea:68:07:04:c7:d5:21:f9:24:62:e4:6d:c5:9f:d6:5e: 55:2d:91:72:bd:8b:7b:cc:f8:12:6a:9c:6f:5d:06:78 Fingerprint (SHA-256): 99:CC:17:B5:0E:1B:56:7D:A4:58:AB:F8:A6:23:20:9E:4D:6A:30:2C:AD:5E:40:F8:4D:EB:BC:42:98:28:2A:32 Fingerprint (SHA1): 09:B9:89:1A:CB:CA:64:B9:8F:B6:A8:3B:07:F9:F4:8F:97:F0:CA:B7 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6348: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:07:89 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 10:42:04 2016 Not After : Fri Apr 08 10:42:04 2016 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:bd:d2:24:6b:e6:eb:5d:7b:63:64:5b:55:ef:7c:e8: cf:ae:75:40:56:9e:79:c1:cd:97:ff:bf:af:33:df:60: de:67:a6:13:42:df:ca:17:db:b2:06:c9:4e:72:c1:74: 55:fd:03:53:0e:c2:1c:c7:ec:e8:29:70:26:03:b0:50: 60:a1:8d:0e:4a:33:72:3f:23:11:c5:87:5b:27:9b:5e: 61:ae:5b:93:fa:1e:fe:f4:58:42:a6:8d:1a:ae:d4:55: 7b:f5:73:43:1d:78:99:ee:45:5d:d5:4a:32:c8:df:7b: 88:e6:bd:9d:62:4a:dc:1c:56:ea:4a:ad:97:bf:2d:81: e4:33:1f:25:6a:f1:58:4a:24:34:87:59:e5:9d:83:9e: 39:ee:39:5c:d2:2d:bf:2b:b1:8b:91:95:34:a6:d1:e6: dd:a6:09:13:e3:e1:4e:e4:92:ed:c3:9a:24:35:bd:78: 53:f9:c1:28:f0:1c:1d:8d:c3:7d:ba:d5:b1:18:ff:7a: 46:41:d6:b7:5a:dc:27:bf:5a:70:ad:e2:3c:2e:bf:d5: b7:21:7a:71:4f:63:0e:0b:49:7e:d0:9e:2a:58:8a:42: 60:fe:b8:4e:23:73:0a:85:13:7c:e2:01:9b:a4:7c:50: b7:7b:fa:99:b2:1f:5f:5c:d2:e0:73:ff:64:d0:34:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:c4:2e:bf:0e:48:1c:70:0e:b7:98:46:10:b3:52:5f: e0:b3:49:2e:8c:cf:7c:f7:4f:24:ab:0c:35:a9:62:fe: 0d:9f:70:83:6b:fe:66:59:9f:4f:7e:db:f7:51:db:7a: 85:5a:55:c0:81:57:49:69:ab:fd:c0:b3:26:20:3e:01: b7:0f:f8:3c:20:e1:b1:05:20:ac:15:66:5c:b8:46:a5: b7:31:17:f0:e4:76:6c:fb:60:f3:bf:f1:f7:a5:0f:8f: 7c:1c:17:a3:88:9a:a0:21:75:af:ab:32:a3:9b:58:bc: 5e:a1:f3:08:bd:50:a8:87:8d:d9:3b:4c:3e:de:08:d4: d5:d4:21:b7:32:46:9b:7f:76:6b:67:ac:cf:36:f6:83: 8c:07:3c:1e:ef:d3:9d:c1:b6:c8:54:cf:ff:d0:98:3d: 25:48:83:90:24:b1:23:11:c9:f2:8b:76:a8:b5:e0:48: 5f:1e:ae:41:34:ea:9c:74:28:a7:22:a2:cf:5e:9b:8d: be:0e:71:89:f2:16:d2:97:06:eb:61:ea:d7:58:2a:24: 4f:e3:19:ed:90:5d:7c:fb:43:95:44:2e:d7:f7:08:f1: ce:92:a4:b1:0b:2f:78:81:18:d7:bc:ae:2d:7b:7e:74: 9e:74:a8:d3:71:0e:b9:f4:c1:e2:97:e6:9c:34:d4:06 Fingerprint (SHA-256): 9A:2E:E7:49:19:DE:9C:7C:E7:E8:39:3D:BE:43:0D:F7:8B:B8:EF:5A:CF:75:02:4E:37:4A:5D:15:74:67:87:58 Fingerprint (SHA1): 70:3F:77:F8:62:8D:45:A5:EC:2E:17:8A:5A:2C:D7:FD:5C:95:E0:05 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6349: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:07:a0 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 10:42:12 2016 Not After : Fri Apr 08 10:42:12 2016 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:83:b5:a0:59:31:7c:5f:2e:3d:e6:29:74:ba:5f: 79:eb:cd:97:17:27:b7:c9:1b:31:fd:7a:e2:4a:bf:3f: d4:d9:38:d6:c1:ef:c7:22:2f:a2:78:85:c1:9c:2a:fb: 82:f2:21:66:29:68:85:d9:49:b8:a7:12:d1:67:4a:89: 67:d4:08:02:6c:ad:64:c2:48:c3:90:1a:e4:af:48:c5: 68:08:37:ed:a7:55:77:d3:ed:f6:bb:2a:a5:72:27:28: 5c:1f:77:fd:20:c4:c7:24:75:be:03:64:2e:d9:c2:7d: d9:3d:e2:d6:96:74:7c:2e:5e:34:16:6c:96:73:e0:ac: 23:e6:c9:46:92:e1:e2:e4:84:92:b0:9e:91:84:28:f5: 98:b3:37:91:6e:3d:e7:2a:7c:27:33:89:35:b3:79:58: a6:d4:00:3f:eb:08:3b:84:a2:71:8c:20:13:50:a9:96: 2d:a3:c4:04:86:b6:ca:e1:5c:9a:43:bd:1d:0e:a2:15: ce:29:1f:31:f1:50:66:c7:2d:14:40:5b:5b:dd:d5:fd: 42:a6:a8:12:b5:fb:d6:5d:76:d8:c3:9b:b3:17:43:b0: ed:74:80:6f:2a:d1:34:31:1d:96:35:3c:9a:a5:0a:fc: f1:07:9b:a9:2a:17:ab:e8:fd:1f:ad:0d:51:c5:2f:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:75:f7:5d:cd:11:70:78:59:c6:df:d9:1f:ad:80:b5: 16:33:0b:bd:72:e8:d7:2e:69:71:8f:77:2c:95:9e:a8: 0a:2c:2e:ae:74:77:4c:65:c2:ba:a6:eb:7c:a4:8b:e9: e0:13:22:a7:24:73:bf:c8:96:86:ab:98:e7:cd:f3:c2: c5:f5:6e:15:ee:e7:bf:6d:c9:0b:f7:1a:42:8c:aa:a1: c0:b1:14:96:9b:02:60:c7:bb:0a:42:4e:44:11:0d:f3: 32:88:6d:4f:39:2f:58:72:aa:c3:c7:b7:73:e3:67:11: 8f:9a:56:76:13:46:6e:70:7d:8a:bf:33:14:12:2a:1a: 57:ee:38:d8:4e:23:a9:6d:dd:d8:4f:f4:a8:17:1f:64: 19:c6:39:5d:d5:2c:f5:03:78:b2:b3:64:7d:d9:7c:cf: 6d:ab:c6:15:b8:a3:92:46:83:22:f6:a1:0b:ca:d4:4e: bb:2f:99:fe:78:a3:7b:4b:d8:33:ae:78:bc:b9:6f:f6: 09:3e:85:f0:31:d2:ff:b3:d7:0a:1e:7b:f7:73:e4:79: b1:bd:de:d0:a0:49:4f:9f:a5:34:de:0a:89:6b:29:9c: 5a:be:d6:da:aa:4e:59:b5:c9:bb:e2:bd:da:11:bc:aa: 51:a8:78:49:63:78:22:f3:5e:93:8e:4a:61:73:a1:18 Fingerprint (SHA-256): 88:2B:96:9F:B6:FE:E1:CF:D2:90:8D:B9:7D:5D:05:ED:C2:00:BF:0E:F6:7A:B7:22:A5:1F:A0:84:91:42:79:30 Fingerprint (SHA1): 09:2A:A5:40:83:12:C5:AB:16:E2:64:16:65:8D:FB:61:A5:FC:86:72 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6350: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:07:af Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Jan 08 10:42:24 2016 Not After : Fri Apr 08 10:42:24 2016 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:b3:4b:ad:28:53:14:d6:7f:e1:16:c9:1e:8d:a4:0c: 7b:40:22:34:8c:a6:f1:90:c8:16:75:c3:fb:68:16:c7: 02:7b:2e:c3:4d:59:d6:fa:e3:01:37:4d:bb:05:22:76: 1d:85:20:53:68:9a:21:22:76:4e:bf:c0:e6:46:fb:ae: 11:04:17:1a:d3:fc:e5:44:35:88:e1:15:a3:4a:07:90: 7a:8a:1f:12:14:4a:c5:d7:f4:1a:ba:9a:72:22:5a:c9: 77:c6:01:e9:0b:8d:a8:0c:11:a5:26:ad:f6:be:9b:f7: 18:e2:13:ee:ce:23:d0:bb:4b:a0:79:fd:5a:6e:0d:33: a9:f6:4c:03:04:e3:6d:45:e0:4f:e0:9c:d6:33:84:ce: 66:59:86:54:ae:16:c1:a1:ef:12:de:c1:3e:62:e3:2e: b4:e0:c5:1f:b3:f9:33:f8:fe:d7:18:06:a0:87:41:1e: 4a:66:81:e5:f6:c3:de:6e:af:9a:a0:8b:52:2d:6c:f5: ed:39:d2:98:7a:27:7f:6c:4f:98:e5:61:c4:c9:20:4e: 41:c9:62:b2:b0:92:a7:62:a6:8a:6a:bc:6d:0f:da:3b: 88:f2:93:e3:6b:18:89:a5:43:32:cd:8f:d4:89:a6:0b: dc:97:93:6b:be:af:33:29:ce:8a:6c:55:3c:29:01:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:d1:8e:e5:d8:21:77:3a:7a:76:8e:c6:ee:d0:5a:ff: 4e:7c:01:cc:77:bf:5a:0b:df:e6:3b:5d:16:f8:1d:bf: e4:9e:4b:31:23:57:6a:05:3c:ac:0e:a1:d6:d1:4e:79: 92:61:2a:a3:89:44:ea:ee:90:3f:ef:36:28:31:07:12: 61:ac:69:36:4a:7e:ee:5d:44:14:fd:1a:80:62:f0:14: 16:6b:fc:bf:64:64:b3:52:05:28:60:f6:86:81:ca:b7: 8b:c9:9e:c0:fb:b7:5f:9d:98:11:d8:c0:64:a6:d4:ff: 21:c9:1a:2d:68:0d:c4:6e:10:fc:f9:be:c0:63:3a:33: ce:82:a1:58:f3:bb:f8:b7:23:9f:12:28:95:04:59:15: 45:bf:16:db:c6:e5:c0:3b:84:68:aa:92:76:b7:55:41: 8f:d0:0b:e5:82:c8:58:ee:1c:52:ed:0e:30:2a:7b:db: 61:1c:78:dc:6a:67:95:af:81:ea:ba:f9:88:ac:51:21: 02:91:7c:a1:92:41:8c:78:43:38:a3:0f:4d:5f:38:f0: 4f:ff:b6:78:fc:03:9c:1a:01:3e:6f:05:56:33:78:9f: 27:31:61:f7:06:be:17:c1:60:b1:80:5c:20:53:98:3c: 62:a4:33:79:0d:0e:89:cb:4b:e7:2d:dc:93:98:58:68 Fingerprint (SHA-256): F6:A0:FC:C2:11:3B:D7:05:16:29:A0:14:9D:46:A0:84:2F:9D:97:A0:99:5B:89:73:92:CA:7A:8A:54:CF:2D:98 Fingerprint (SHA1): 97:4D:8D:1D:6D:17:EF:D7:59:86:07:E6:70:3E:A1:26:FB:64:DC:EF Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6351: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:07:c8 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Jan 08 10:42:39 2016 Not After : Fri Apr 08 10:42:39 2016 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:e7:f6:36:59:9f:0f:0c:22:49:5e:cf:d2:bb:e1:cf: 21:7a:44:66:9e:f7:92:57:62:c0:92:38:49:3c:be:a1: 08:8d:29:ea:33:de:c3:99:88:0d:d2:04:52:30:ee:61: 4b:60:92:8c:a6:c6:3b:77:d5:13:4a:96:93:dd:d5:03: 0d:71:14:fe:f0:81:6e:37:52:1a:0f:09:c1:56:5a:74: 17:71:de:a9:97:c0:3a:26:8b:a9:41:8d:5e:6c:59:fb: 0c:73:72:78:d6:ce:42:39:01:c7:69:da:0c:26:d6:09: a2:4e:af:c2:4e:12:95:bb:5c:c3:56:2c:39:d0:0f:73: 12:65:38:20:7f:8e:3d:45:20:f2:63:76:40:7a:c4:e5: f4:7e:9a:a3:08:0b:c3:ff:e1:0d:c7:8a:ed:2b:24:10: 43:25:40:9c:e3:8d:55:03:ca:75:03:99:e2:ed:5a:44: 23:57:cb:9c:54:49:90:c9:af:e0:41:54:a9:ea:9c:b8: c9:01:c2:64:90:32:29:9e:a5:4f:1f:aa:24:95:73:39: c6:75:d3:48:9a:78:e1:b4:0c:e5:e0:a6:d6:ac:19:56: ef:2b:40:b4:c5:8c:35:5a:2b:bd:81:b5:d0:5a:03:ea: 22:94:a2:6c:93:43:9a:9d:ee:e3:4d:79:d4:cc:da:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:3c:fc:33:98:a6:0e:00:7d:5f:b4:b6:90:39:f4:b9: dc:93:2a:e9:ea:a1:c0:2e:88:2b:7c:dc:17:29:12:23: b8:3d:f9:9a:62:92:6e:ab:6a:8b:2b:2a:17:68:21:3c: 99:ea:01:d5:81:e3:c1:f8:0f:4b:e3:32:a0:18:20:f6: 48:6c:a7:85:8f:21:b2:31:55:05:fc:16:b4:77:ce:ac: 7d:7a:f3:65:b9:1a:06:57:b2:4b:61:db:7b:5c:72:01: 18:4a:80:8c:f2:cd:c3:83:83:25:50:0f:5f:96:63:68: d5:e7:b2:70:93:e3:59:78:ba:9f:af:8d:f0:af:94:70: df:f9:ea:5e:ce:6a:de:fc:dc:4c:4c:10:44:b7:0d:07: 03:e2:f1:60:3c:17:9c:7d:60:fd:29:88:a8:6f:f2:98: 56:4f:22:76:b4:8b:c7:ae:12:bb:2d:29:75:01:7b:5a: b1:71:76:a1:f4:a5:6d:64:72:c3:9b:7c:17:02:32:45: d0:12:61:aa:b7:ce:fb:94:83:3f:93:9c:d7:1e:b7:61: 5a:84:c7:ef:63:3f:32:c2:db:a1:0a:36:87:d2:82:93: e1:ba:2a:3f:98:a9:d4:44:cf:91:e5:27:4d:a1:9a:55: a8:af:8a:95:04:bc:a4:57:f2:20:33:99:5f:e4:73:7e Fingerprint (SHA-256): 99:4B:DD:65:03:B9:D0:20:0F:8D:6D:F9:8D:A2:1B:0E:54:FF:90:BC:8F:99:15:62:1F:2B:A5:66:61:50:B3:71 Fingerprint (SHA1): C1:64:41:EE:25:08:92:E2:7D:72:8E:84:4C:A9:F5:FF:29:C0:54:A2 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6352: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #6353: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #6354: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #6355: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:08:1a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Jan 08 10:43:13 2016 Not After : Fri Apr 08 10:43:13 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:d0:d0:ba:8f:91:01:f7:63:61:da:18:86:9a:bf:fd: 28:87:c8:ec:1b:53:57:d0:3c:8c:14:b7:40:9d:ca:f6: 82:10:15:f1:67:6b:e9:37:5c:3e:16:85:3e:8f:20:73: 53:0d:65:2b:ca:a4:d2:f8:2a:49:0a:cb:b3:a9:52:9e: 18:5f:c7:65:5b:58:64:24:e5:0d:2d:5e:8c:31:7d:3f: 4d:38:f1:e0:1a:7d:d7:98:a5:41:ae:02:e1:7c:f7:cf: 7a:40:f2:91:21:ea:8d:55:8b:39:23:aa:f2:8f:10:94: c9:79:5b:fe:f8:31:0d:be:e4:07:b9:71:e4:a5:19:88: 9b:76:d3:d3:7c:42:82:21:ae:c4:92:15:ee:8d:fb:81: 3c:59:f4:cd:cf:37:6f:a4:ae:de:76:77:b4:a9:c5:5a: 3d:82:49:d7:b5:0e:d4:fb:a9:de:e6:5e:c6:00:82:6a: 46:a5:be:fa:18:8b:b3:ee:39:81:5a:ae:2e:bf:61:c0: d0:9a:13:8a:1a:64:3d:61:e9:a1:1c:4f:76:6e:2f:96: e5:58:ae:26:8a:7e:1a:43:26:97:a1:31:6d:0b:7d:89: 74:99:ca:71:8e:32:3d:d7:0e:81:f8:59:15:fc:2b:b5: 0c:55:bd:8d:2a:bb:ec:d6:0a:bd:af:ee:31:2b:57:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:93:5d:8f:2a:c6:9d:66:72:a0:a2:c6:6e:76:f3:cf: 17:ca:46:5f:d2:4d:30:e2:47:ad:87:dd:f7:03:d2:33: 30:07:94:f7:a3:4c:65:40:05:d6:b8:8a:09:bd:d7:20: c9:b2:7d:ea:7e:3d:10:46:b6:e9:d6:f3:a6:43:d7:9b: c5:f3:56:0a:4d:5d:f2:fd:d0:d6:5e:13:64:dc:13:34: ff:97:1c:d5:02:40:5a:61:6c:34:c6:49:d4:41:00:d2: df:1f:db:10:f3:08:bd:71:d8:72:c2:83:80:47:c1:e1: 1e:41:32:cf:35:7b:3f:03:90:ca:19:ca:0b:93:c7:f7: db:89:92:75:08:f2:35:07:87:e8:d1:7e:3b:ac:3e:38: ab:1e:48:b0:e2:e4:fc:c2:5b:e9:e2:ac:83:06:59:1b: 70:47:db:57:e3:f2:66:eb:28:09:34:ef:2c:ab:b4:30: 55:a4:3d:4c:b2:75:3e:5c:f7:a6:03:ef:6c:0b:8d:ad: 4e:b7:df:85:07:38:ea:e3:53:2b:ee:3d:a6:8b:95:2c: 13:31:ea:4b:71:50:83:7a:7f:c1:d3:32:cb:33:4b:a1: 88:98:68:72:fa:04:97:eb:99:88:ae:20:7a:39:82:33: 3f:a8:fe:40:ed:ec:1b:39:e3:6f:28:d1:5c:52:c7:ac Fingerprint (SHA-256): 4D:54:65:83:9B:4A:67:D9:69:CE:C4:98:2E:64:3C:69:61:F1:6F:DB:6E:A1:3A:86:40:81:B0:78:D9:9D:D4:62 Fingerprint (SHA1): 3A:D6:34:3F:CE:30:E2:E8:4E:F5:AC:CA:28:38:64:46:5A:3B:19:AF Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6356: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der cert.sh: #6357: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #6358: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #6359: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #6360: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #6361: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #6362: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #6363: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:08:6e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Jan 08 10:44:01 2016 Not After : Fri Apr 08 10:44:01 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:8b:72:8d:ad:8b:1e:94:98:e5:cd:a2:ba:17:1c:40: 0b:e6:ae:94:2d:5d:a3:0b:23:e2:bd:2a:72:cb:46:79: cb:ec:e2:f6:49:37:47:b3:ae:f2:f3:76:39:37:0a:6f: 07:55:89:a6:5c:64:55:59:e3:0c:d4:32:6f:0e:bc:6e: a8:50:31:83:af:72:45:e0:fb:73:d9:f7:14:32:46:5c: 67:6c:61:5e:15:b0:af:9c:8e:43:0c:cf:8e:3c:b6:56: c1:f7:b1:22:dd:bd:63:6d:f0:82:76:da:b7:72:b0:9d: 5c:49:94:b1:81:30:01:d3:78:a6:96:99:d0:08:fe:9b: b3:86:4a:8d:8d:97:74:56:5a:ec:4d:16:d8:1d:eb:4a: e7:03:be:5c:2e:d1:a2:30:f4:af:6a:c6:2d:b0:b8:65: 60:d1:14:c9:e9:41:28:e4:c4:8f:7d:b1:3e:b5:1e:ff: cf:09:64:b7:db:20:c7:5e:2a:f8:07:13:7c:0a:db:1f: 2f:3f:c1:ac:b1:09:25:95:e8:10:21:76:08:2c:d6:b9: d2:d6:65:4a:b3:04:ec:b1:17:08:da:0f:fb:6c:b1:e3: a1:b9:2c:b9:14:5d:f8:25:0d:c8:e1:a5:ca:03:0b:2f: 21:12:6f:0c:e7:37:83:42:5b:0a:6c:5c:b6:51:f0:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:16:60:a4:72:d2:a2:c2:e3:1e:2a:31:31:b2:f1:d5: 40:80:82:67:f7:12:1d:4e:64:94:03:05:17:69:e3:55: 55:78:bc:c1:f9:81:35:22:db:eb:78:38:02:01:25:3c: 9a:dd:b9:53:3e:ff:74:15:e8:1b:a1:1e:38:51:d4:3d: f1:09:57:c3:2b:e4:44:14:9c:5a:61:9d:5d:59:ca:fd: 99:8e:70:39:65:64:79:b2:85:6b:10:fe:84:c2:b1:9b: 7e:d3:bc:98:e4:39:bf:15:ce:d0:31:4d:20:12:d2:05: 21:db:69:0a:3e:00:f0:29:04:b1:b7:4b:7f:c4:f3:fb: 79:4b:e7:7c:b5:e9:a7:7d:8e:15:b9:aa:87:f9:71:21: 76:a4:71:e9:ce:22:97:bb:73:6d:15:2f:19:00:f9:14: 18:57:e9:9a:3f:63:cb:b3:a4:64:a6:8c:5c:95:56:69: fc:fe:30:31:a5:0e:2f:67:13:7a:d3:1b:29:ac:57:ae: f0:b0:fe:00:73:73:32:46:38:cd:24:5f:5a:cf:de:8b: 03:55:6f:ff:6b:25:8c:3a:bc:26:af:37:e0:4d:52:a7: 4e:29:d1:b6:b0:1e:7a:65:38:26:81:c2:bd:d7:c6:51: 50:af:b8:e6:c9:e7:73:dc:51:e8:a2:4d:f9:a8:12:2b Fingerprint (SHA-256): 8B:D7:5A:88:26:1D:E7:FA:F5:13:A2:53:2C:6C:E3:29:53:18:D5:7D:61:DA:6C:58:B6:32:61:69:8E:D6:12:76 Fingerprint (SHA1): 14:B8:99:D3:9A:71:7F:7F:93:3D:48:07:23:25:A9:6E:93:FB:4C:BF Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6364: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #6365: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #6366: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw cert.sh: #6367: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6368: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6369: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass -o root.cert cert.sh: #6370: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #6371: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6372: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #6373: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #6374: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6375: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert cert.sh: #6376: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #6377: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #6378: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6379: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #6380: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6381: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6382: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #6383: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6384: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6385: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #6386: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6387: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6388: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #6389: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6390: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6391: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #6392: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6393: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #6394: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #6395: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #6396: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #6397: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6398: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #6399: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6400: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6401: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6402: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6403: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6404: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #6405: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #6406: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6407: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6408: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6409: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6410: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #6411: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6412: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #6413: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6414: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #6415: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6416: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6417: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #6418: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6419: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6420: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #6421: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6422: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6423: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #6424: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6425: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6426: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #6427: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6428: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6429: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #6430: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6431: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6432: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #6433: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6434: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6435: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #6436: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6437: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6438: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #6439: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6440: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6441: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #6442: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6443: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6444: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #6445: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6446: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6447: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #6448: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6449: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6450: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #6451: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6452: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6453: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #6454: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6455: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6456: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #6457: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6458: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6459: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #6460: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6461: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6462: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #6463: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6464: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6465: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #6466: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6467: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6468: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #6469: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6470: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6471: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #6472: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6473: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6474: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #6475: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6476: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6477: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #6478: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6479: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6480: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #6481: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6482: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6483: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #6484: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6485: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6486: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #6487: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6488: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6489: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #6490: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6491: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6492: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #6493: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6494: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6495: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #6496: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6497: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6498: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #6499: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6500: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6501: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #6502: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6503: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6504: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #6505: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6506: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6507: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #6508: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6509: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6510: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #6511: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6512: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6513: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #6514: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6515: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6516: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #6517: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6518: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6519: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #6520: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6521: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6522: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #6523: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6524: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6525: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #6526: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6527: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6528: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #6529: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6530: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6531: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #6532: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6533: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6534: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #6535: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6536: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6537: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #6538: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6539: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6540: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #6541: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6542: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6543: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #6544: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6545: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6546: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #6547: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6548: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6549: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #6550: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6551: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6552: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #6553: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6554: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6555: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #6556: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6557: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6558: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #6559: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6560: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6561: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #6562: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6563: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6564: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #6565: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6566: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6567: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #6568: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6569: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6570: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #6571: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6572: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6573: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #6574: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6575: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6576: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #6577: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6578: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6579: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #6580: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6581: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6582: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #6583: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6584: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6585: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #6586: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6587: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6588: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #6589: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6590: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6591: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #6592: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6593: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6594: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #6595: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6596: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6597: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #6598: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6599: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6600: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #6601: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6602: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6603: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #6604: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6605: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6606: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #6607: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6608: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #6609: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #6610: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #6611: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #6612: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #6613: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #6614: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #6615: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #6616: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #6617: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #6618: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #6619: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #6620: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #6621: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #6622: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #6623: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #6624: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #6625: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Fri Jan 8 05:50:13 EST 2016 Running tests for tools TIMESTAMP tools BEGIN: Fri Jan 8 05:50:13 EST 2016 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6626: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 80:5e:51:cb:1f:a3:f3:50:5e:09:01:2e:45:81:5d:03 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6627: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6628: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6629: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6630: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7a:37:81:db:08:93:d7:d0:1c:8e:2b:13:17:41:2f:ea Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 10:36:51 2016 Not After : Fri Jan 08 10:36:51 2066 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:3d:3b:2b:ea:24:40:92:0f:26:c4:28:f9:3e:83: 83:c8:f7:f8:7b:e9:95:e8:0e:1c:d2:33:06:c2:d3:34: 42:01:8c:9a:b6:82:bf:c2:d8:ed:5a:7e:0d:0d:f9:a8: dd:77:3d:e5:19:48:5e:3b:ae:6f:b7:1f:95:43:94:58: 75:cf:54:00:17:9d:be:62:54:22:2c:e3:31:01:2e:1f: 01:ba:5b:be:ca:18:99:29:c4:14:0f:a2:38:ac:d9:e7: d6:cb:41:6a:8a:50:fd:66:01:1b:b8:a1:07:cd:25:d2: 59:4d:7a:90:95:fe:ad:a1:63:9c:7c:a1:34:dd:15:d6: 78:32:5f:06:89 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:00:97:e3:e6:a5:e2:0e:d4:41:49:5d: f6:d5:4c:e3:50:2e:45:da:89:67:b2:4d:db:b6:3a:02: 77:44:10:06:2d:1a:98:ae:05:f2:2c:8f:bd:fa:a6:34: e5:26:c2:da:11:5c:d0:8c:30:0f:53:91:7b:ba:fc:dd: a0:79:c1:63:c6:89:3d:02:42:01:69:d5:9b:e1:5d:79: 6a:a9:f4:df:ec:7c:0b:0f:71:96:04:9f:62:7b:c6:04: 8b:4c:7b:de:e9:50:61:bd:ad:f4:7f:6d:45:1d:3b:46: f6:9b:a8:76:6c:1a:8b:46:d6:11:28:8e:4d:3f:59:a0: 63:16:ef:68:f1:62:67:2e:3c:6c:0f Fingerprint (SHA-256): 27:FB:A2:88:67:0F:5B:00:1F:89:71:A7:58:50:94:04:00:F6:3E:AE:E0:68:2D:59:02:B6:5A:F2:82:12:D3:23 Fingerprint (SHA1): 32:5E:52:6C:9C:5A:D3:87:9C:4A:07:3F:33:7B:87:84:14:E1:BF:44 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 10:39:26 2016 Not After : Fri Jan 08 10:39:26 2021 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:c2:a8:53:7c:45:64:65:c8:08:7d:31:58:fe:e0:51: a2:ae:19:61:81:60:d4:b0:55:81:f3:90:a8:a6:f2:d2: 60:cc:9f:ca:07:59:ca:3a:1e:65:b9:77:51:f2:e3:34: 35:4d:7d:17:cd:6a:fd:1f:0c:f0:bc:fb:5d:e6:de:9e: c1:df:0b:f5:38:23:31:23:7e:b6:c3:73:ac:ce:01:e9: 8c:3b:74:8e:1e:08:40:15:f4:6a:11:2d:ba:fd:ba:a7: a6 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:86:02:41:60:dd:b0:4a:04:26:b0:40:b1:2f:dd: ce:ab:e8:1b:4a:01:27:5e:f6:2e:3b:fc:50:b6:26:f2: 24:23:63:15:4d:ce:a4:25:b4:8b:c6:38:e3:cf:3f:5f: 99:87:ba:c1:d1:e5:09:ad:e8:ab:cc:8f:09:70:16:aa: cc:b5:0f:48:c5:e0:02:41:3d:84:12:40:dc:ff:b6:5e: 11:82:57:64:84:4d:11:0b:2a:7e:db:ef:29:5f:79:d3: cf:f7:b1:91:97:16:5c:53:4e:73:35:e3:8e:49:c0:4f: 80:57:00:c7:b5:94:2b:ce:3b:04:5b:c0:c3:e8:02:d6: 6f:0b:14:11:9f:51:96:3d:8c Fingerprint (SHA-256): 4D:1C:91:37:19:0D:46:35:8D:A6:45:C5:02:33:9C:83:35:C6:DA:53:D4:6C:A8:A6:E6:06:3A:D0:EE:F9:AE:79 Fingerprint (SHA1): 9C:74:07:F9:A6:19:BC:43:FC:C4:42:37:44:0D:91:5A:A1:50:FD:6A Friendly Name: Alice-ec tools.sh: #6631: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6632: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: f1:93:c3:08:5e:73:b5:4c:5a:eb:9e:bd:3e:ae:1f:53 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6633: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6634: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6635: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 40:68:1d:1d:21:88:94:e5:a1:0c:0d:1e:1f:b1:a0:94 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6636: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6637: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6638: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a5:b5:b8:95:e1:b6:c6:57:80:e4:cf:e9:b3:20:85:c4 Iteration Count: 2000 (0x7d0) tools.sh: #6639: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6640: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6641: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 88:44:8b:f2:37:76:5b:e5:77:aa:a1:66:4d:3b:ed:20 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6642: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6643: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6644: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 43:45:ad:ba:68:88:33:e0:53:95:8e:29:73:1c:1b:e3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6645: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6646: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6647: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4b:d5:4c:70:64:a5:e0:ca:c8:7c:0f:b4:03:95:2a:5b Iteration Count: 2000 (0x7d0) tools.sh: #6648: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6649: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6650: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d5:2e:1d:66:85:5d:b0:5f:b9:84:6c:d3:93:f9:62:b6 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:70:f0:f2:a3:10:bd:55:83:db:89:fd:f8:36:55: a5:c1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6651: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6652: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6653: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ed:e8:71:89:9e:ee:d2:ce:ff:b8:0f:72:5c:5a:87:0c Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:2e:68:95:15:0f:c1:e4:1e:4f:2a:ae:de:6c:e3: 95:51 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6654: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6655: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6656: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: aa:51:14:e3:39:8a:ce:b9:66:4f:e7:af:c4:c1:45:18 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:a2:69:eb:bd:5c:f9:a3:fd:ee:e8:3a:36:cb:74: b5:b1 tools.sh: #6657: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6658: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6659: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 95:55:98:a4:3e:6a:52:06:82:4c:fd:fd:6a:d7:3b:b0 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:55:45:6e:a4:93:3e:f2:76:e8:6e:6b:69:38:f9: 3f:dd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6660: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6661: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6662: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c8:ad:1a:ca:96:e9:fa:e9:c8:de:52:99:d2:02:7a:cc Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:08:95:c8:09:66:6c:dc:ca:4e:81:f7:c9:9f:92: 02:2b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6663: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6664: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6665: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 13:69:fb:71:2f:fd:9d:fb:6d:e3:3f:44:83:1c:20:6e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:f1:d3:96:ca:6c:49:95:39:80:44:38:4d:65:e0: 12:bd tools.sh: #6666: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6667: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6668: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 01:18:c0:bf:5f:d7:9a:e4:7c:ac:c2:83:3d:43:6a:3a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e6:7f:c6:7c:8f:2e:b4:85:2f:3c:91:ac:f5:c2: 0a:77 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6669: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6670: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6671: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6a:3a:0f:71:d2:9a:dc:2b:81:c2:af:f2:01:cf:1f:74 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:88:44:c2:d7:bd:96:2d:03:64:8a:74:9d:57:b1: 0b:9b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6672: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6673: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6674: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6e:ba:d1:50:13:50:64:5d:96:f6:cb:75:de:38:4f:1f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:7a:c6:26:93:c5:d6:64:d4:52:3d:ab:3c:cd:fc: 6d:ff tools.sh: #6675: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6676: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6677: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:49:d6:21:de:35:e1:d8:d4:28:85:0c:ad:b4:d2:fe Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:15:92:ef:5a:e5:04:33:18:4a:47:af:b1:78:02: e4:db Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6678: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6679: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6680: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e4:87:01:4c:ec:cd:3b:04:77:e5:b6:d7:79:a6:f4:b9 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:d9:36:7b:96:4e:b1:a7:ec:66:92:ad:93:ad:a9: 36:13 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6681: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6682: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6683: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2f:f5:ea:f6:e2:94:91:08:ac:a5:87:a2:13:ae:a3:60 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:d0:83:74:2c:a6:91:31:d6:ba:3e:a0:c3:7b:4c: 19:69 tools.sh: #6684: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6685: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6686: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 24:96:7a:8d:21:e1:95:5d:d4:63:47:f4:56:d4:75:97 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:4f:fb:29:db:18:f2:d9:9c:5f:25:08:53:68:bb: 22:8a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6687: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6688: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6689: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e5:72:be:5d:a2:ef:a9:6d:10:10:7a:df:ed:30:f9:dd Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:95:14:f9:a2:c8:73:1c:24:51:8e:8e:b6:de:83: d8:93 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6690: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6691: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6692: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 01:f4:e0:d5:52:04:d3:0f:20:6a:f3:ac:52:8c:b5:d5 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:d5:1a:26:ea:fb:c9:64:30:d9:e5:47:66:35:06: d9:58 tools.sh: #6693: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6694: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6695: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 34:ac:f3:1c:18:b7:c5:fe:3a:48:c2:57:f6:48:b4:d4 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:8d:e6:2c:97:bd:bf:16:87:73:79:30:35:bc:56: 3e:c6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6696: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6697: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6698: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3b:cd:49:3d:b9:4d:88:2a:86:ca:9d:c8:7d:da:7a:c3 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:00:33:8e:24:55:5a:e2:37:95:fc:8c:7b:4a:7d: 96:2f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6699: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6700: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6701: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: aa:d2:cd:ce:9b:df:20:14:49:5c:24:68:fc:c3:87:ec Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:ee:df:9d:0b:ba:3c:92:11:93:9b:6d:0f:01:3e: 84:91 tools.sh: #6702: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6703: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6704: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 9f:ca:4b:5b:e2:bc:57:ce:1a:ac:1c:f2:bb:6e:c2:7d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6705: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6706: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6707: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 3d:d4:af:10:a1:dd:4a:13:c8:fa:02:22:48:c7:d6:14 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6708: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6709: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6710: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: c2:73:8e:13:fa:fc:69:74:45:78:08:1c:f8:b0:3f:a8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6711: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6712: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6713: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 48:d1:32:9a:32:4f:87:18:3a:c5:58:39:ec:01:1f:ed Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6714: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6715: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6716: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 3c:dd:0a:72:07:be:84:0a:3b:30:3b:0c:9c:26:58:84 Iteration Count: 2000 (0x7d0) tools.sh: #6717: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6718: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6719: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 58:df:8a:ce:a1:3c:05:50:bf:1f:e3:84:8b:4b:6e:69 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6720: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6721: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6722: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: d3:d5:ba:1c:29:b1:e6:ec:f3:d5:46:6b:ba:76:53:c8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6723: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6724: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6725: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: be:b8:27:88:75:3d:82:13:91:00:f5:81:ba:bf:72:41 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6726: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6727: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6728: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 40:96:e8:68:83:ec:ae:58:d7:7a:11:e9:aa:d4:bf:ca Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6729: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6730: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6731: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: aa:3c:58:a0:5e:95:a4:d5:88:00:f2:46:a2:ea:0d:97 Iteration Count: 2000 (0x7d0) tools.sh: #6732: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6733: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6734: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1d:ae:2b:fc:fd:dc:4e:a5:98:b5:9c:8f:57:6a:7a:58 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6735: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6736: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6737: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 76:1d:5e:0c:74:be:5c:b4:c8:bc:54:53:02:e4:30:6f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6738: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6739: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6740: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 77:91:93:5f:86:52:af:89:01:97:89:69:0f:6a:ca:16 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6741: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6742: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6743: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8c:df:02:d8:e3:f2:3a:1e:20:c4:0f:09:1d:07:8c:cb Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6744: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6745: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6746: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: dd:63:68:5f:0b:6f:a3:1a:64:2a:73:5c:f6:fa:98:5d Iteration Count: 2000 (0x7d0) tools.sh: #6747: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6748: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6749: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 19:62:b7:ef:64:38:a0:1c:b8:0d:c6:8c:45:b7:96:ca Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6750: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6751: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6752: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a8:89:e3:37:05:02:3c:5f:94:3e:6d:d4:97:fa:a2:47 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6753: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6754: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6755: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 80:46:9f:79:14:72:fe:11:e6:b7:f6:41:48:ae:15:e2 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6756: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6757: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6758: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 41:a8:1f:69:91:d8:82:2e:c9:3a:56:fc:d2:6a:52:47 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6759: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6760: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6761: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d1:10:5c:90:e5:13:ea:7d:d6:10:6f:00:b2:73:fd:19 Iteration Count: 2000 (0x7d0) tools.sh: #6762: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6763: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6764: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2f:4b:c6:eb:0f:b1:f1:e7:62:09:db:2f:60:ad:19:77 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6765: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6766: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6767: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4b:c8:93:0e:6c:77:c0:49:2a:e1:46:c7:5d:54:0d:05 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6768: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6769: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6770: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2e:22:c4:c4:4d:e9:6a:44:36:1b:ed:a7:06:42:29:1f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6771: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6772: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6773: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1d:28:e4:b7:4f:98:bf:ab:d5:20:39:ff:4c:04:4f:26 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6774: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6775: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6776: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 77:50:11:5f:2b:f4:43:61:ec:91:ae:1b:c5:7f:9a:a9 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6777: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6778: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6779: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 81:06:2f:3f:e6:a4:8a:a1:ba:09:0a:01:fb:6f:96:54 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6780: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6781: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6782: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c6:48:a9:b3:cf:a7:97:3d:4f:f1:30:53:e6:3b:4c:4d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6783: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6784: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6785: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e0:0e:83:ca:b1:12:5e:16:46:3e:9b:52:db:57:6d:0e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6786: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6787: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6788: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4a:c3:16:55:a1:95:3e:02:92:9f:9c:c1:b4:85:bb:a8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6789: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6790: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6791: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 93:08:e9:02:ed:d7:17:41:a8:2c:2a:a8:e8:67:7b:b5 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:35:11 2016 Not After : Fri Jan 08 10:35:11 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:37:6f:be:59:cf:23:d7:47:35:b4:7c:f3:69:68:9a: 75:fb:00:7a:74:c6:22:37:cb:54:e5:44:0a:26:a8:44: ea:a4:05:43:d5:44:89:a2:2d:f8:5e:51:a0:f7:e0:e1: 9e:1c:fe:d8:41:12:6c:bf:da:cf:89:2e:95:3c:87:06: fd:8c:1e:b5:c7:d7:9b:f1:d2:cf:48:8c:1e:84:a6:85: 49:f3:10:f4:3c:c0:21:9c:1f:4b:b4:f4:9b:5d:b8:81: 62:f2:29:85:3c:b9:71:9d:a8:3b:ab:d9:08:4c:fa:fe: 3b:83:90:0d:f6:af:4e:43:8f:40:05:3d:1d:78:3f:1a: 95:f1:d1:da:33:fa:0e:c7:3d:2b:4c:b5:b6:39:3f:bd: bb:ea:fb:dc:ed:66:98:f0:7d:f1:ad:7b:b1:c9:b7:f6: 11:cd:d6:62:f4:5a:0f:64:6f:68:66:93:61:05:41:c3: b1:ac:b6:b5:84:f8:78:d7:1a:9d:ed:c9:33:e2:9b:cf: 89:68:87:90:9b:92:b2:62:c7:c1:87:e0:ec:29:91:52: 69:29:8d:d8:a6:2f:71:14:d4:7d:3a:da:85:1a:0a:5e: d8:88:68:8d:af:28:6f:12:2d:f6:68:3e:03:c5:b6:eb: c6:2d:78:67:23:ed:eb:68:92:54:26:7b:d9:1d:58:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e4:b9:8e:cb:b2:2f:fa:e2:9c:4d:2a:63:ee:a6:89: 78:ca:f9:fb:84:e1:a0:78:1a:f7:28:ea:a1:c9:9b:15: ee:de:77:80:fa:42:72:43:da:d4:05:e7:87:22:d0:ab: a6:5b:32:b6:df:22:96:40:92:ce:ca:72:e9:dd:bc:49: a2:d0:b3:a7:bc:4d:b8:b4:4c:40:d2:a1:8e:8a:69:db: 2f:9f:34:9d:43:f4:30:29:78:38:72:d8:8a:d0:4c:76: 14:3b:dc:01:be:9f:58:17:99:aa:26:8c:1c:67:3a:48: 25:2f:c7:79:fe:6b:0c:08:5b:98:d7:78:1e:e3:04:c3: 6c:7a:18:43:03:bc:8e:f0:3d:53:74:3f:53:af:88:8d: 79:d2:e4:24:43:ff:76:a3:ec:72:f3:1e:a8:bf:ef:78: 9f:bb:87:c7:61:53:ef:92:5a:17:52:d5:ef:a5:ec:14: 5b:0d:10:ab:5e:3c:84:78:fc:fd:b9:9f:bd:bb:36:9a: d7:b4:85:6e:a2:53:a2:42:df:b7:99:0b:6e:2e:ee:91: 8e:25:2a:6d:27:9a:5c:0e:50:5f:6c:f1:7c:6b:c6:46: 09:0a:9c:b0:46:5d:49:e1:b1:06:7a:c9:0d:4f:7d:c1: 8a:f6:9b:22:ff:0c:ab:85:ba:5f:e3:66:31:1d:44:2f Fingerprint (SHA-256): A2:EE:A4:3E:5B:97:3A:5C:CB:ED:CB:47:3B:86:BD:97:D9:99:51:C6:89:49:F0:1A:A3:55:99:BD:25:1F:EC:59 Fingerprint (SHA1): A9:2D:0F:27:BF:C6:DE:2C:D5:76:1F:F9:BA:72:D7:07:4E:4B:B2:93 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 10:39:20 2016 Not After : Fri Jan 08 10:39:20 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:46:73:1b:6d:47:55:96:4a:83:7a:75:7f:44:17:06: 34:fc:a5:2b:88:34:85:eb:ce:87:41:5d:69:0f:bb:c5: db:dc:78:8e:8e:e2:5b:fa:84:71:5c:c2:cc:81:33:79: 19:9b:00:88:6a:18:c1:b0:65:ba:24:d4:4e:ec:6e:da: c1:6a:bc:11:60:5f:8b:60:92:4f:3e:c9:c6:c2:e1:ae: 6b:5c:5e:35:b6:38:c8:96:6a:3a:74:47:4d:3f:d1:0e: 10:10:33:9d:c9:15:f2:38:09:0c:c9:da:0a:8e:6f:6c: 5d:6a:c8:34:90:a6:70:a2:be:43:70:35:c6:3b:81:0c: 89:b9:92:fc:a5:46:1e:76:30:3e:91:ca:d3:ef:bb:8b: 26:8b:cb:0e:53:1b:a4:bb:22:0a:5b:cd:9d:54:4a:42: 36:b6:e6:a5:4d:b9:91:fc:13:17:4b:2b:a1:53:d6:4e: b7:77:74:77:ab:58:4a:d1:ab:e0:46:4a:50:0b:73:3e: 7f:fc:cd:8a:b6:d1:36:b6:e0:1d:4a:f6:a8:d9:e6:ab: 1b:dd:5e:75:e2:c2:ac:2a:e9:05:f7:d3:9c:df:ca:8f: fe:56:38:00:be:cb:a1:43:9e:51:95:4b:81:b2:e8:f2: ff:34:1f:97:73:b3:4c:bb:a9:97:7c:e3:63:6e:5d:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:3a:27:dc:56:a6:9c:17:7d:f2:e7:2f:34:c1:92:8f: 04:77:56:71:9c:87:e8:a1:0b:e3:e7:77:fd:d6:3f:94: 1f:26:23:18:46:03:1a:de:48:39:01:13:85:0b:7a:71: f8:27:25:c7:ae:e2:55:a5:65:c7:d3:c7:61:99:96:b7: e6:46:f8:69:a3:7b:9b:16:0d:e4:72:fa:36:d1:da:ca: 57:be:61:bb:c7:f7:35:70:39:3e:02:b4:7c:be:c3:85: 66:40:1d:6f:fe:e9:95:3f:ca:c8:6c:da:c5:bb:0d:a8: ea:5d:bc:d5:f6:4b:af:29:1d:ef:f6:1b:50:b8:db:aa: 83:86:bb:05:0a:77:b8:e0:3b:dc:ca:16:47:c4:8c:ac: 86:13:72:4c:73:ec:8a:67:de:b9:90:cb:21:5b:89:9d: d2:24:c6:71:ec:9c:f2:70:a0:23:11:81:35:0e:01:e2: 96:91:80:d7:6c:75:4d:96:e8:d4:63:7f:e2:17:39:51: 9c:58:46:3f:aa:22:29:29:6c:1d:8c:4b:45:96:4d:a1: 90:ab:67:be:86:e1:de:35:9b:74:ac:e9:08:3c:d2:1f: 8f:36:90:91:25:c9:10:a5:d0:d8:74:5e:8e:be:ec:91: 6f:1f:1a:b3:e7:02:c6:a0:11:cb:53:57:2a:53:9b:4f Fingerprint (SHA-256): 8B:3B:9C:BA:3D:86:7B:66:FB:C1:7E:5B:30:3D:99:59:2C:81:CE:29:B6:64:DD:99:C2:DE:0E:F7:A7:20:8B:24 Fingerprint (SHA1): 07:18:9F:B1:27:85:3E:A4:04:EF:DB:78:08:7D:7F:AC:DA:B6:8C:DC Friendly Name: Alice tools.sh: #6792: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6793: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #6794: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6795: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #6796: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #6797: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #6798: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #6799: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #6800: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #6801: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #6802: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Fri Jan 8 05:51:47 EST 2016 Running tests for fips TIMESTAMP fips BEGIN: Fri Jan 8 05:51:47 EST 2016 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #6803: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #6804: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 48b8706007381bb46b553088952521d0ea41cd56 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #6805: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #6806: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #6807: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6808: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #6809: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #6810: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #6811: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #6812: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #6813: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #6814: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #6815: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 48b8706007381bb46b553088952521d0ea41cd56 FIPS_PUB_140_Test_Certificate fips.sh: #6816: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #6817: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #6818: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #6819: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #6820: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 48b8706007381bb46b553088952521d0ea41cd56 FIPS_PUB_140_Test_Certificate fips.sh: #6821: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #6822: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #6823: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle Changing byte 0x00032fe4 (208868): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle dbtest -r -d ../fips fips.sh: #6824: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Fri Jan 8 05:53:12 EST 2016 Running tests for ssl TIMESTAMP ssl BEGIN: Fri Jan 8 05:53:12 EST 2016 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:53:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:53:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:53:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6825: Waiting for Server - FAILED kill -0 26178 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26178 found at Fri Jan 8 05:53:19 EST 2016 selfserv_9591 with PID 26178 started at Fri Jan 8 05:53:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6826: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26178 at Fri Jan 8 05:53:19 EST 2016 kill -USR1 26178 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26178 killed at Fri Jan 8 05:53:20 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:53:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:53:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:53:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6827: Waiting for Server - FAILED kill -0 26246 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26246 found at Fri Jan 8 05:53:26 EST 2016 selfserv_9591 with PID 26246 started at Fri Jan 8 05:53:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6828: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26246 at Fri Jan 8 05:53:26 EST 2016 kill -USR1 26246 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26246 killed at Fri Jan 8 05:53:26 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:53:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:53:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:53:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6829: Waiting for Server - FAILED kill -0 26315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26315 found at Fri Jan 8 05:53:32 EST 2016 selfserv_9591 with PID 26315 started at Fri Jan 8 05:53:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6830: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26315 at Fri Jan 8 05:53:33 EST 2016 kill -USR1 26315 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26315 killed at Fri Jan 8 05:53:33 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:53:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:53:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:53:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6831: Waiting for Server - FAILED kill -0 26395 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26395 found at Fri Jan 8 05:53:39 EST 2016 selfserv_9591 with PID 26395 started at Fri Jan 8 05:53:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6832: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26395 at Fri Jan 8 05:53:40 EST 2016 kill -USR1 26395 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26395 killed at Fri Jan 8 05:53:40 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:53:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:53:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:53:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6833: Waiting for Server - FAILED kill -0 26463 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26463 found at Fri Jan 8 05:53:46 EST 2016 selfserv_9591 with PID 26463 started at Fri Jan 8 05:53:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6834: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26463 at Fri Jan 8 05:53:47 EST 2016 kill -USR1 26463 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26463 killed at Fri Jan 8 05:53:47 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:53:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:53:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:53:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6835: Waiting for Server - FAILED kill -0 26532 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26532 found at Fri Jan 8 05:53:53 EST 2016 selfserv_9591 with PID 26532 started at Fri Jan 8 05:53:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6836: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26532 at Fri Jan 8 05:53:54 EST 2016 kill -USR1 26532 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26532 killed at Fri Jan 8 05:53:54 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:53:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:53:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:54:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6837: Waiting for Server - FAILED kill -0 26612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26612 found at Fri Jan 8 05:54:00 EST 2016 selfserv_9591 with PID 26612 started at Fri Jan 8 05:54:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6838: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 26612 at Fri Jan 8 05:54:01 EST 2016 kill -USR1 26612 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26612 killed at Fri Jan 8 05:54:01 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:54:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:54:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:54:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6839: Waiting for Server - FAILED kill -0 26680 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26680 found at Fri Jan 8 05:54:07 EST 2016 selfserv_9591 with PID 26680 started at Fri Jan 8 05:54:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6840: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26680 at Fri Jan 8 05:54:07 EST 2016 kill -USR1 26680 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26680 killed at Fri Jan 8 05:54:08 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:54:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:54:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:54:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6841: Waiting for Server - FAILED kill -0 26749 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26749 found at Fri Jan 8 05:54:14 EST 2016 selfserv_9591 with PID 26749 started at Fri Jan 8 05:54:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6842: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 26749 at Fri Jan 8 05:54:14 EST 2016 kill -USR1 26749 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26749 killed at Fri Jan 8 05:54:15 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:54:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:54:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:54:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6843: Waiting for Server - FAILED kill -0 26829 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26829 found at Fri Jan 8 05:54:21 EST 2016 selfserv_9591 with PID 26829 started at Fri Jan 8 05:54:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6844: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 26829 at Fri Jan 8 05:54:21 EST 2016 kill -USR1 26829 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26829 killed at Fri Jan 8 05:54:22 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:54:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:54:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:54:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6845: Waiting for Server - FAILED kill -0 26897 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26897 found at Fri Jan 8 05:54:28 EST 2016 selfserv_9591 with PID 26897 started at Fri Jan 8 05:54:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6846: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 26897 at Fri Jan 8 05:54:28 EST 2016 kill -USR1 26897 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26897 killed at Fri Jan 8 05:54:29 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:54:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:54:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:54:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6847: Waiting for Server - FAILED kill -0 26966 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26966 found at Fri Jan 8 05:54:35 EST 2016 selfserv_9591 with PID 26966 started at Fri Jan 8 05:54:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6848: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 26966 at Fri Jan 8 05:54:35 EST 2016 kill -USR1 26966 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26966 killed at Fri Jan 8 05:54:36 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:54:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:54:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:54:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6849: Waiting for Server - FAILED kill -0 27046 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27046 found at Fri Jan 8 05:54:42 EST 2016 selfserv_9591 with PID 27046 started at Fri Jan 8 05:54:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6850: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 27046 at Fri Jan 8 05:54:42 EST 2016 kill -USR1 27046 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27046 killed at Fri Jan 8 05:54:42 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:54:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:54:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:54:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6851: Waiting for Server - FAILED kill -0 27115 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27115 found at Fri Jan 8 05:54:48 EST 2016 selfserv_9591 with PID 27115 started at Fri Jan 8 05:54:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6852: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 27115 at Fri Jan 8 05:54:49 EST 2016 kill -USR1 27115 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27115 killed at Fri Jan 8 05:54:49 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:54:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:54:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:54:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6853: Waiting for Server - FAILED kill -0 27184 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27184 found at Fri Jan 8 05:54:55 EST 2016 selfserv_9591 with PID 27184 started at Fri Jan 8 05:54:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6854: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 27184 at Fri Jan 8 05:54:56 EST 2016 kill -USR1 27184 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27184 killed at Fri Jan 8 05:54:56 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:54:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:54:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:55:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6855: Waiting for Server - FAILED kill -0 27264 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27264 found at Fri Jan 8 05:55:02 EST 2016 selfserv_9591 with PID 27264 started at Fri Jan 8 05:55:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6856: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 27264 at Fri Jan 8 05:55:03 EST 2016 kill -USR1 27264 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27264 killed at Fri Jan 8 05:55:03 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:55:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:55:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:55:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6857: Waiting for Server - FAILED kill -0 27332 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27332 found at Fri Jan 8 05:55:09 EST 2016 selfserv_9591 with PID 27332 started at Fri Jan 8 05:55:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6858: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27332 at Fri Jan 8 05:55:10 EST 2016 kill -USR1 27332 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27332 killed at Fri Jan 8 05:55:10 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:55:10 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:55:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:55:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6859: Waiting for Server - FAILED kill -0 27401 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27401 found at Fri Jan 8 05:55:16 EST 2016 selfserv_9591 with PID 27401 started at Fri Jan 8 05:55:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6860: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 27401 at Fri Jan 8 05:55:17 EST 2016 kill -USR1 27401 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27401 killed at Fri Jan 8 05:55:17 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:55:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:55:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:55:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6861: Waiting for Server - FAILED kill -0 27481 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27481 found at Fri Jan 8 05:55:23 EST 2016 selfserv_9591 with PID 27481 started at Fri Jan 8 05:55:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6862: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27481 at Fri Jan 8 05:55:23 EST 2016 kill -USR1 27481 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27481 killed at Fri Jan 8 05:55:24 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:55:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:55:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:55:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6863: Waiting for Server - FAILED kill -0 27553 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27553 found at Fri Jan 8 05:55:30 EST 2016 selfserv_9591 with PID 27553 started at Fri Jan 8 05:55:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6864: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27553 at Fri Jan 8 05:55:30 EST 2016 kill -USR1 27553 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27553 killed at Fri Jan 8 05:55:31 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:55:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:55:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:55:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6865: Waiting for Server - FAILED kill -0 27622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27622 found at Fri Jan 8 05:55:37 EST 2016 selfserv_9591 with PID 27622 started at Fri Jan 8 05:55:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6866: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27622 at Fri Jan 8 05:55:37 EST 2016 kill -USR1 27622 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27622 killed at Fri Jan 8 05:55:38 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:55:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:55:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:55:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6867: Waiting for Server - FAILED kill -0 27702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27702 found at Fri Jan 8 05:55:44 EST 2016 selfserv_9591 with PID 27702 started at Fri Jan 8 05:55:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6868: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27702 at Fri Jan 8 05:55:44 EST 2016 kill -USR1 27702 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27702 killed at Fri Jan 8 05:55:45 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:55:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:55:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:55:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6869: Waiting for Server - FAILED kill -0 27770 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27770 found at Fri Jan 8 05:55:51 EST 2016 selfserv_9591 with PID 27770 started at Fri Jan 8 05:55:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6870: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27770 at Fri Jan 8 05:55:51 EST 2016 kill -USR1 27770 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27770 killed at Fri Jan 8 05:55:52 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:55:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:55:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:55:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6871: Waiting for Server - FAILED kill -0 27839 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27839 found at Fri Jan 8 05:55:58 EST 2016 selfserv_9591 with PID 27839 started at Fri Jan 8 05:55:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6872: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27839 at Fri Jan 8 05:55:58 EST 2016 kill -USR1 27839 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27839 killed at Fri Jan 8 05:55:58 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:55:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:55:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:56:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6873: Waiting for Server - FAILED kill -0 27919 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27919 found at Fri Jan 8 05:56:04 EST 2016 selfserv_9591 with PID 27919 started at Fri Jan 8 05:56:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6874: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 27919 at Fri Jan 8 05:56:05 EST 2016 kill -USR1 27919 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27919 killed at Fri Jan 8 05:56:05 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:56:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:56:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:56:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6875: Waiting for Server - FAILED kill -0 27988 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27988 found at Fri Jan 8 05:56:11 EST 2016 selfserv_9591 with PID 27988 started at Fri Jan 8 05:56:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6876: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27988 at Fri Jan 8 05:56:12 EST 2016 kill -USR1 27988 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27988 killed at Fri Jan 8 05:56:12 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:56:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:56:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:56:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6877: Waiting for Server - FAILED kill -0 28056 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28056 found at Fri Jan 8 05:56:18 EST 2016 selfserv_9591 with PID 28056 started at Fri Jan 8 05:56:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6878: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28056 at Fri Jan 8 05:56:19 EST 2016 kill -USR1 28056 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28056 killed at Fri Jan 8 05:56:19 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:56:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:56:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:56:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6879: Waiting for Server - FAILED kill -0 28136 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28136 found at Fri Jan 8 05:56:25 EST 2016 selfserv_9591 with PID 28136 started at Fri Jan 8 05:56:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6880: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28136 at Fri Jan 8 05:56:26 EST 2016 kill -USR1 28136 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28136 killed at Fri Jan 8 05:56:26 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:56:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:56:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:56:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6881: Waiting for Server - FAILED kill -0 28205 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28205 found at Fri Jan 8 05:56:32 EST 2016 selfserv_9591 with PID 28205 started at Fri Jan 8 05:56:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6882: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28205 at Fri Jan 8 05:56:33 EST 2016 kill -USR1 28205 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28205 killed at Fri Jan 8 05:56:33 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:56:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:56:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:56:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6883: Waiting for Server - FAILED kill -0 28273 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28273 found at Fri Jan 8 05:56:39 EST 2016 selfserv_9591 with PID 28273 started at Fri Jan 8 05:56:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6884: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28273 at Fri Jan 8 05:56:40 EST 2016 kill -USR1 28273 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28273 killed at Fri Jan 8 05:56:40 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:56:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:56:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:56:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6885: Waiting for Server - FAILED kill -0 28353 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28353 found at Fri Jan 8 05:56:46 EST 2016 selfserv_9591 with PID 28353 started at Fri Jan 8 05:56:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6886: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28353 at Fri Jan 8 05:56:46 EST 2016 kill -USR1 28353 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28353 killed at Fri Jan 8 05:56:47 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:56:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:56:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:56:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6887: Waiting for Server - FAILED kill -0 28422 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28422 found at Fri Jan 8 05:56:53 EST 2016 selfserv_9591 with PID 28422 started at Fri Jan 8 05:56:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6888: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28422 at Fri Jan 8 05:56:53 EST 2016 kill -USR1 28422 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28422 killed at Fri Jan 8 05:56:54 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:56:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:56:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:56:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6889: Waiting for Server - FAILED kill -0 28490 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28490 found at Fri Jan 8 05:57:00 EST 2016 selfserv_9591 with PID 28490 started at Fri Jan 8 05:57:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6890: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28490 at Fri Jan 8 05:57:00 EST 2016 kill -USR1 28490 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28490 killed at Fri Jan 8 05:57:01 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:57:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:57:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:57:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6891: Waiting for Server - FAILED kill -0 28570 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28570 found at Fri Jan 8 05:57:07 EST 2016 selfserv_9591 with PID 28570 started at Fri Jan 8 05:57:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6892: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28570 at Fri Jan 8 05:57:07 EST 2016 kill -USR1 28570 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28570 killed at Fri Jan 8 05:57:08 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:57:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:57:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:57:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6893: Waiting for Server - FAILED kill -0 28639 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28639 found at Fri Jan 8 05:57:14 EST 2016 selfserv_9591 with PID 28639 started at Fri Jan 8 05:57:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6894: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28639 at Fri Jan 8 05:57:14 EST 2016 kill -USR1 28639 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28639 killed at Fri Jan 8 05:57:15 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:57:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:57:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:57:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6895: Waiting for Server - FAILED kill -0 28707 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28707 found at Fri Jan 8 05:57:20 EST 2016 selfserv_9591 with PID 28707 started at Fri Jan 8 05:57:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6896: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28707 at Fri Jan 8 05:57:21 EST 2016 kill -USR1 28707 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28707 killed at Fri Jan 8 05:57:21 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:57:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:57:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:57:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6897: Waiting for Server - FAILED kill -0 28787 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28787 found at Fri Jan 8 05:57:27 EST 2016 selfserv_9591 with PID 28787 started at Fri Jan 8 05:57:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6898: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28787 at Fri Jan 8 05:57:28 EST 2016 kill -USR1 28787 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28787 killed at Fri Jan 8 05:57:28 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:57:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:57:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:57:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6899: Waiting for Server - FAILED kill -0 28856 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28856 found at Fri Jan 8 05:57:34 EST 2016 selfserv_9591 with PID 28856 started at Fri Jan 8 05:57:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6900: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28856 at Fri Jan 8 05:57:35 EST 2016 kill -USR1 28856 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28856 killed at Fri Jan 8 05:57:35 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:57:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:57:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:57:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6901: Waiting for Server - FAILED kill -0 28924 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28924 found at Fri Jan 8 05:57:41 EST 2016 selfserv_9591 with PID 28924 started at Fri Jan 8 05:57:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6902: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28924 at Fri Jan 8 05:57:42 EST 2016 kill -USR1 28924 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28924 killed at Fri Jan 8 05:57:42 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:57:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:57:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:57:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6903: Waiting for Server - FAILED kill -0 29004 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29004 found at Fri Jan 8 05:57:48 EST 2016 selfserv_9591 with PID 29004 started at Fri Jan 8 05:57:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6904: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29004 at Fri Jan 8 05:57:49 EST 2016 kill -USR1 29004 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29004 killed at Fri Jan 8 05:57:49 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:57:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:57:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:57:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6905: Waiting for Server - FAILED kill -0 29073 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29073 found at Fri Jan 8 05:57:55 EST 2016 selfserv_9591 with PID 29073 started at Fri Jan 8 05:57:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6906: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29073 at Fri Jan 8 05:57:56 EST 2016 kill -USR1 29073 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29073 killed at Fri Jan 8 05:57:56 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:57:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:57:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:58:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6907: Waiting for Server - FAILED kill -0 29141 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29141 found at Fri Jan 8 05:58:02 EST 2016 selfserv_9591 with PID 29141 started at Fri Jan 8 05:58:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6908: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29141 at Fri Jan 8 05:58:02 EST 2016 kill -USR1 29141 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29141 killed at Fri Jan 8 05:58:03 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:58:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:58:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:58:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6909: Waiting for Server - FAILED kill -0 29221 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29221 found at Fri Jan 8 05:58:09 EST 2016 selfserv_9591 with PID 29221 started at Fri Jan 8 05:58:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6910: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 29221 at Fri Jan 8 05:58:09 EST 2016 kill -USR1 29221 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29221 killed at Fri Jan 8 05:58:10 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:58:10 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:58:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:58:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6911: Waiting for Server - FAILED kill -0 29290 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29290 found at Fri Jan 8 05:58:16 EST 2016 selfserv_9591 with PID 29290 started at Fri Jan 8 05:58:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6912: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29290 at Fri Jan 8 05:58:16 EST 2016 kill -USR1 29290 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29290 killed at Fri Jan 8 05:58:17 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:58:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:58:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:58:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6913: Waiting for Server - FAILED kill -0 29358 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29358 found at Fri Jan 8 05:58:23 EST 2016 selfserv_9591 with PID 29358 started at Fri Jan 8 05:58:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6914: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 29358 at Fri Jan 8 05:58:23 EST 2016 kill -USR1 29358 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29358 killed at Fri Jan 8 05:58:24 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:58:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:58:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:58:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6915: Waiting for Server - FAILED kill -0 29438 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29438 found at Fri Jan 8 05:58:30 EST 2016 selfserv_9591 with PID 29438 started at Fri Jan 8 05:58:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6916: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 29438 at Fri Jan 8 05:58:30 EST 2016 kill -USR1 29438 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29438 killed at Fri Jan 8 05:58:31 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:58:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:58:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:58:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6917: Waiting for Server - FAILED kill -0 29507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29507 found at Fri Jan 8 05:58:37 EST 2016 selfserv_9591 with PID 29507 started at Fri Jan 8 05:58:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6918: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 29507 at Fri Jan 8 05:58:37 EST 2016 kill -USR1 29507 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29507 killed at Fri Jan 8 05:58:37 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:58:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:58:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:58:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6919: Waiting for Server - FAILED kill -0 29575 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29575 found at Fri Jan 8 05:58:43 EST 2016 selfserv_9591 with PID 29575 started at Fri Jan 8 05:58:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6920: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 29575 at Fri Jan 8 05:58:44 EST 2016 kill -USR1 29575 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29575 killed at Fri Jan 8 05:58:44 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:58:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:58:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:58:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6921: Waiting for Server - FAILED kill -0 29655 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29655 found at Fri Jan 8 05:58:50 EST 2016 selfserv_9591 with PID 29655 started at Fri Jan 8 05:58:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6922: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 29655 at Fri Jan 8 05:58:51 EST 2016 kill -USR1 29655 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29655 killed at Fri Jan 8 05:58:51 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:58:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:58:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:58:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6923: Waiting for Server - FAILED kill -0 29724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29724 found at Fri Jan 8 05:58:57 EST 2016 selfserv_9591 with PID 29724 started at Fri Jan 8 05:58:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6924: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 29724 at Fri Jan 8 05:58:58 EST 2016 kill -USR1 29724 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29724 killed at Fri Jan 8 05:58:58 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:58:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:58:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:59:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6925: Waiting for Server - FAILED kill -0 29792 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29792 found at Fri Jan 8 05:59:04 EST 2016 selfserv_9591 with PID 29792 started at Fri Jan 8 05:59:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6926: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 29792 at Fri Jan 8 05:59:05 EST 2016 kill -USR1 29792 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29792 killed at Fri Jan 8 05:59:05 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:59:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:59:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:59:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6927: Waiting for Server - FAILED kill -0 29872 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29872 found at Fri Jan 8 05:59:11 EST 2016 selfserv_9591 with PID 29872 started at Fri Jan 8 05:59:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6928: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 29872 at Fri Jan 8 05:59:12 EST 2016 kill -USR1 29872 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29872 killed at Fri Jan 8 05:59:12 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:59:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:59:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:59:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6929: Waiting for Server - FAILED kill -0 29941 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29941 found at Fri Jan 8 05:59:18 EST 2016 selfserv_9591 with PID 29941 started at Fri Jan 8 05:59:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6930: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29941 at Fri Jan 8 05:59:19 EST 2016 kill -USR1 29941 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29941 killed at Fri Jan 8 05:59:19 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 05:59:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:59:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:59:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6931: Waiting for Server - FAILED kill -0 30009 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30009 found at Fri Jan 8 05:59:25 EST 2016 selfserv_9591 with PID 30009 started at Fri Jan 8 05:59:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6932: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30009 at Fri Jan 8 05:59:25 EST 2016 kill -USR1 30009 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30009 killed at Fri Jan 8 05:59:26 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:59:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:59:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:59:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6933: Waiting for Server - FAILED kill -0 30089 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30089 found at Fri Jan 8 05:59:32 EST 2016 selfserv_9591 with PID 30089 started at Fri Jan 8 05:59:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6934: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30089 at Fri Jan 8 05:59:32 EST 2016 kill -USR1 30089 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30089 killed at Fri Jan 8 05:59:33 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:59:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:59:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:59:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6935: Waiting for Server - FAILED kill -0 30158 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30158 found at Fri Jan 8 05:59:39 EST 2016 selfserv_9591 with PID 30158 started at Fri Jan 8 05:59:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6936: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30158 at Fri Jan 8 05:59:39 EST 2016 kill -USR1 30158 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30158 killed at Fri Jan 8 05:59:40 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 05:59:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:59:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:59:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6937: Waiting for Server - FAILED kill -0 30226 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30226 found at Fri Jan 8 05:59:46 EST 2016 selfserv_9591 with PID 30226 started at Fri Jan 8 05:59:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6938: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30226 at Fri Jan 8 05:59:46 EST 2016 kill -USR1 30226 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30226 killed at Fri Jan 8 05:59:47 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:59:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:59:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:59:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6939: Waiting for Server - FAILED kill -0 30306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30306 found at Fri Jan 8 05:59:53 EST 2016 selfserv_9591 with PID 30306 started at Fri Jan 8 05:59:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6940: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30306 at Fri Jan 8 05:59:53 EST 2016 kill -USR1 30306 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30306 killed at Fri Jan 8 05:59:54 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 05:59:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 05:59:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 05:59:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6941: Waiting for Server - FAILED kill -0 30375 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30375 found at Fri Jan 8 06:00:00 EST 2016 selfserv_9591 with PID 30375 started at Fri Jan 8 06:00:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6942: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30375 at Fri Jan 8 06:00:00 EST 2016 kill -USR1 30375 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30375 killed at Fri Jan 8 06:00:00 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:00:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:00:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:00:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6943: Waiting for Server - FAILED kill -0 30445 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30445 found at Fri Jan 8 06:00:06 EST 2016 selfserv_9591 with PID 30445 started at Fri Jan 8 06:00:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6944: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30445 at Fri Jan 8 06:00:07 EST 2016 kill -USR1 30445 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30445 killed at Fri Jan 8 06:00:07 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:00:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:00:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:00:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6945: Waiting for Server - FAILED kill -0 30525 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30525 found at Fri Jan 8 06:00:13 EST 2016 selfserv_9591 with PID 30525 started at Fri Jan 8 06:00:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6946: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30525 at Fri Jan 8 06:00:14 EST 2016 kill -USR1 30525 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30525 killed at Fri Jan 8 06:00:14 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:00:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:00:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:00:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6947: Waiting for Server - FAILED kill -0 30594 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30594 found at Fri Jan 8 06:00:20 EST 2016 selfserv_9591 with PID 30594 started at Fri Jan 8 06:00:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6948: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30594 at Fri Jan 8 06:00:21 EST 2016 kill -USR1 30594 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30594 killed at Fri Jan 8 06:00:21 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:00:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:00:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:00:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6949: Waiting for Server - FAILED kill -0 30662 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30662 found at Fri Jan 8 06:00:27 EST 2016 selfserv_9591 with PID 30662 started at Fri Jan 8 06:00:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6950: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30662 at Fri Jan 8 06:00:28 EST 2016 kill -USR1 30662 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30662 killed at Fri Jan 8 06:00:28 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:00:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:00:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:00:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6951: Waiting for Server - FAILED kill -0 30742 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30742 found at Fri Jan 8 06:00:34 EST 2016 selfserv_9591 with PID 30742 started at Fri Jan 8 06:00:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6952: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30742 at Fri Jan 8 06:00:35 EST 2016 kill -USR1 30742 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30742 killed at Fri Jan 8 06:00:35 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:00:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:00:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:00:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6953: Waiting for Server - FAILED kill -0 30811 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30811 found at Fri Jan 8 06:00:41 EST 2016 selfserv_9591 with PID 30811 started at Fri Jan 8 06:00:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6954: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30811 at Fri Jan 8 06:00:41 EST 2016 kill -USR1 30811 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30811 killed at Fri Jan 8 06:00:42 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:00:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:00:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:00:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6955: Waiting for Server - FAILED kill -0 30879 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30879 found at Fri Jan 8 06:00:48 EST 2016 selfserv_9591 with PID 30879 started at Fri Jan 8 06:00:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6956: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30879 at Fri Jan 8 06:00:48 EST 2016 kill -USR1 30879 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30879 killed at Fri Jan 8 06:00:49 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:00:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:00:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:00:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6957: Waiting for Server - FAILED kill -0 30959 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30959 found at Fri Jan 8 06:00:55 EST 2016 selfserv_9591 with PID 30959 started at Fri Jan 8 06:00:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6958: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30959 at Fri Jan 8 06:00:55 EST 2016 kill -USR1 30959 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30959 killed at Fri Jan 8 06:00:56 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:00:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:00:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:01:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6959: Waiting for Server - FAILED kill -0 31028 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31028 found at Fri Jan 8 06:01:02 EST 2016 selfserv_9591 with PID 31028 started at Fri Jan 8 06:01:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6960: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31028 at Fri Jan 8 06:01:02 EST 2016 kill -USR1 31028 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31028 killed at Fri Jan 8 06:01:03 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:01:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:01:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:01:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6961: Waiting for Server - FAILED kill -0 31119 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31119 found at Fri Jan 8 06:01:09 EST 2016 selfserv_9591 with PID 31119 started at Fri Jan 8 06:01:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6962: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31119 at Fri Jan 8 06:01:09 EST 2016 kill -USR1 31119 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31119 killed at Fri Jan 8 06:01:10 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:01:10 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:01:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:01:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6963: Waiting for Server - FAILED kill -0 31199 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31199 found at Fri Jan 8 06:01:16 EST 2016 selfserv_9591 with PID 31199 started at Fri Jan 8 06:01:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6964: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31199 at Fri Jan 8 06:01:16 EST 2016 kill -USR1 31199 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31199 killed at Fri Jan 8 06:01:17 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:01:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:01:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:01:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6965: Waiting for Server - FAILED kill -0 31268 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31268 found at Fri Jan 8 06:01:23 EST 2016 selfserv_9591 with PID 31268 started at Fri Jan 8 06:01:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6966: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31268 at Fri Jan 8 06:01:23 EST 2016 kill -USR1 31268 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31268 killed at Fri Jan 8 06:01:23 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:01:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:01:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:01:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6967: Waiting for Server - FAILED kill -0 31336 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31336 found at Fri Jan 8 06:01:29 EST 2016 selfserv_9591 with PID 31336 started at Fri Jan 8 06:01:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6968: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31336 at Fri Jan 8 06:01:30 EST 2016 kill -USR1 31336 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31336 killed at Fri Jan 8 06:01:30 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:01:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:01:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:01:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6969: Waiting for Server - FAILED kill -0 31416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31416 found at Fri Jan 8 06:01:36 EST 2016 selfserv_9591 with PID 31416 started at Fri Jan 8 06:01:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6970: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31416 at Fri Jan 8 06:01:37 EST 2016 kill -USR1 31416 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31416 killed at Fri Jan 8 06:01:37 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:01:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:01:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:01:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6971: Waiting for Server - FAILED kill -0 31485 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31485 found at Fri Jan 8 06:01:43 EST 2016 selfserv_9591 with PID 31485 started at Fri Jan 8 06:01:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6972: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31485 at Fri Jan 8 06:01:44 EST 2016 kill -USR1 31485 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31485 killed at Fri Jan 8 06:01:44 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:01:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:01:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:01:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6973: Waiting for Server - FAILED kill -0 31553 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31553 found at Fri Jan 8 06:01:50 EST 2016 selfserv_9591 with PID 31553 started at Fri Jan 8 06:01:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6974: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31553 at Fri Jan 8 06:01:51 EST 2016 kill -USR1 31553 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31553 killed at Fri Jan 8 06:01:51 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:01:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:01:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:01:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6975: Waiting for Server - FAILED kill -0 31633 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31633 found at Fri Jan 8 06:01:57 EST 2016 selfserv_9591 with PID 31633 started at Fri Jan 8 06:01:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6976: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31633 at Fri Jan 8 06:01:58 EST 2016 kill -USR1 31633 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31633 killed at Fri Jan 8 06:01:58 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:01:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:01:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:02:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6977: Waiting for Server - FAILED kill -0 31705 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31705 found at Fri Jan 8 06:02:04 EST 2016 selfserv_9591 with PID 31705 started at Fri Jan 8 06:02:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6978: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31705 at Fri Jan 8 06:02:04 EST 2016 kill -USR1 31705 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31705 killed at Fri Jan 8 06:02:05 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:02:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:02:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:02:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6979: Waiting for Server - FAILED kill -0 31773 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31773 found at Fri Jan 8 06:02:11 EST 2016 selfserv_9591 with PID 31773 started at Fri Jan 8 06:02:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6980: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31773 at Fri Jan 8 06:02:11 EST 2016 kill -USR1 31773 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31773 killed at Fri Jan 8 06:02:12 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:02:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:02:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:02:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6981: Waiting for Server - FAILED kill -0 31853 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31853 found at Fri Jan 8 06:02:18 EST 2016 selfserv_9591 with PID 31853 started at Fri Jan 8 06:02:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6982: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31853 at Fri Jan 8 06:02:18 EST 2016 kill -USR1 31853 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31853 killed at Fri Jan 8 06:02:19 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:02:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:02:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:02:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6983: Waiting for Server - FAILED kill -0 31922 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31922 found at Fri Jan 8 06:02:25 EST 2016 selfserv_9591 with PID 31922 started at Fri Jan 8 06:02:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6984: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31922 at Fri Jan 8 06:02:25 EST 2016 kill -USR1 31922 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31922 killed at Fri Jan 8 06:02:26 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:02:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:02:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:02:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6985: Waiting for Server - FAILED kill -0 31991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31991 found at Fri Jan 8 06:02:32 EST 2016 selfserv_9591 with PID 31991 started at Fri Jan 8 06:02:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6986: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31991 at Fri Jan 8 06:02:32 EST 2016 kill -USR1 31991 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31991 killed at Fri Jan 8 06:02:33 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:02:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:02:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:02:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6987: Waiting for Server - FAILED kill -0 32073 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32073 found at Fri Jan 8 06:02:39 EST 2016 selfserv_9591 with PID 32073 started at Fri Jan 8 06:02:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6988: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32073 at Fri Jan 8 06:02:39 EST 2016 kill -USR1 32073 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32073 killed at Fri Jan 8 06:02:39 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:02:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:02:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:02:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6989: Waiting for Server - FAILED kill -0 32143 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32143 found at Fri Jan 8 06:02:45 EST 2016 selfserv_9591 with PID 32143 started at Fri Jan 8 06:02:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6990: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32143 at Fri Jan 8 06:02:46 EST 2016 kill -USR1 32143 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32143 killed at Fri Jan 8 06:02:46 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:02:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:02:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:02:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6991: Waiting for Server - FAILED kill -0 32211 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32211 found at Fri Jan 8 06:02:52 EST 2016 selfserv_9591 with PID 32211 started at Fri Jan 8 06:02:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6992: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32211 at Fri Jan 8 06:02:53 EST 2016 kill -USR1 32211 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32211 killed at Fri Jan 8 06:02:53 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:02:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:02:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:02:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6993: Waiting for Server - FAILED kill -0 32291 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32291 found at Fri Jan 8 06:02:59 EST 2016 selfserv_9591 with PID 32291 started at Fri Jan 8 06:02:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6994: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32291 at Fri Jan 8 06:03:00 EST 2016 kill -USR1 32291 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32291 killed at Fri Jan 8 06:03:00 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:03:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:03:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:03:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6995: Waiting for Server - FAILED kill -0 32360 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32360 found at Fri Jan 8 06:03:06 EST 2016 selfserv_9591 with PID 32360 started at Fri Jan 8 06:03:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6996: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32360 at Fri Jan 8 06:03:07 EST 2016 kill -USR1 32360 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32360 killed at Fri Jan 8 06:03:07 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:03:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:03:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:03:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6997: Waiting for Server - FAILED kill -0 32428 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32428 found at Fri Jan 8 06:03:13 EST 2016 selfserv_9591 with PID 32428 started at Fri Jan 8 06:03:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6998: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32428 at Fri Jan 8 06:03:14 EST 2016 kill -USR1 32428 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32428 killed at Fri Jan 8 06:03:14 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:03:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:03:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:03:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6999: Waiting for Server - FAILED kill -0 32508 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32508 found at Fri Jan 8 06:03:20 EST 2016 selfserv_9591 with PID 32508 started at Fri Jan 8 06:03:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7000: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32508 at Fri Jan 8 06:03:21 EST 2016 kill -USR1 32508 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32508 killed at Fri Jan 8 06:03:21 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:03:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:03:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:03:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7001: Waiting for Server - FAILED kill -0 32577 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32577 found at Fri Jan 8 06:03:27 EST 2016 selfserv_9591 with PID 32577 started at Fri Jan 8 06:03:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7002: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32577 at Fri Jan 8 06:03:27 EST 2016 kill -USR1 32577 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32577 killed at Fri Jan 8 06:03:28 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:03:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:03:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:03:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7003: Waiting for Server - FAILED kill -0 32645 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32645 found at Fri Jan 8 06:03:34 EST 2016 selfserv_9591 with PID 32645 started at Fri Jan 8 06:03:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7004: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32645 at Fri Jan 8 06:03:34 EST 2016 kill -USR1 32645 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32645 killed at Fri Jan 8 06:03:35 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:03:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:03:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:03:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7005: Waiting for Server - FAILED kill -0 32734 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32734 found at Fri Jan 8 06:03:41 EST 2016 selfserv_9591 with PID 32734 started at Fri Jan 8 06:03:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7006: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32734 at Fri Jan 8 06:03:41 EST 2016 kill -USR1 32734 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32734 killed at Fri Jan 8 06:03:42 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:03:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:03:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:03:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7007: Waiting for Server - FAILED kill -0 335 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 335 found at Fri Jan 8 06:03:48 EST 2016 selfserv_9591 with PID 335 started at Fri Jan 8 06:03:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7008: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 335 at Fri Jan 8 06:03:48 EST 2016 kill -USR1 335 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 335 killed at Fri Jan 8 06:03:49 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:03:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:03:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:03:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7009: Waiting for Server - FAILED kill -0 406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 406 found at Fri Jan 8 06:03:55 EST 2016 selfserv_9591 with PID 406 started at Fri Jan 8 06:03:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7010: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 406 at Fri Jan 8 06:03:55 EST 2016 kill -USR1 406 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 406 killed at Fri Jan 8 06:03:56 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:03:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:03:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:04:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7011: Waiting for Server - FAILED kill -0 501 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 501 found at Fri Jan 8 06:04:02 EST 2016 selfserv_9591 with PID 501 started at Fri Jan 8 06:04:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7012: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 501 at Fri Jan 8 06:04:02 EST 2016 kill -USR1 501 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 501 killed at Fri Jan 8 06:04:02 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:04:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:04:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:04:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7013: Waiting for Server - FAILED kill -0 576 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 576 found at Fri Jan 8 06:04:08 EST 2016 selfserv_9591 with PID 576 started at Fri Jan 8 06:04:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7014: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 576 at Fri Jan 8 06:04:09 EST 2016 kill -USR1 576 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 576 killed at Fri Jan 8 06:04:09 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:04:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:04:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:04:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7015: Waiting for Server - FAILED kill -0 649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 649 found at Fri Jan 8 06:04:15 EST 2016 selfserv_9591 with PID 649 started at Fri Jan 8 06:04:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7016: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 649 at Fri Jan 8 06:04:16 EST 2016 kill -USR1 649 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 649 killed at Fri Jan 8 06:04:16 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:04:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:04:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:04:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7017: Waiting for Server - FAILED kill -0 729 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 729 found at Fri Jan 8 06:04:22 EST 2016 selfserv_9591 with PID 729 started at Fri Jan 8 06:04:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7018: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 729 at Fri Jan 8 06:04:23 EST 2016 kill -USR1 729 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 729 killed at Fri Jan 8 06:04:23 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:04:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:04:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:04:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7019: Waiting for Server - FAILED kill -0 798 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 798 found at Fri Jan 8 06:04:29 EST 2016 selfserv_9591 with PID 798 started at Fri Jan 8 06:04:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7020: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 798 at Fri Jan 8 06:04:30 EST 2016 kill -USR1 798 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 798 killed at Fri Jan 8 06:04:30 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:04:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:04:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:04:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7021: Waiting for Server - FAILED kill -0 866 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 866 found at Fri Jan 8 06:04:36 EST 2016 selfserv_9591 with PID 866 started at Fri Jan 8 06:04:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7022: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 866 at Fri Jan 8 06:04:37 EST 2016 kill -USR1 866 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 866 killed at Fri Jan 8 06:04:37 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:04:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:04:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:04:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7023: Waiting for Server - FAILED kill -0 946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 946 found at Fri Jan 8 06:04:43 EST 2016 selfserv_9591 with PID 946 started at Fri Jan 8 06:04:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7024: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 946 at Fri Jan 8 06:04:44 EST 2016 kill -USR1 946 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 946 killed at Fri Jan 8 06:04:44 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:04:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:04:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:04:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7025: Waiting for Server - FAILED kill -0 1015 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1015 found at Fri Jan 8 06:04:50 EST 2016 selfserv_9591 with PID 1015 started at Fri Jan 8 06:04:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7026: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1015 at Fri Jan 8 06:04:50 EST 2016 kill -USR1 1015 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1015 killed at Fri Jan 8 06:04:51 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:04:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:04:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:04:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7027: Waiting for Server - FAILED kill -0 1083 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1083 found at Fri Jan 8 06:04:57 EST 2016 selfserv_9591 with PID 1083 started at Fri Jan 8 06:04:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7028: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 1083 at Fri Jan 8 06:04:57 EST 2016 kill -USR1 1083 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1083 killed at Fri Jan 8 06:04:58 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:04:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:04:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:05:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7029: Waiting for Server - FAILED kill -0 1166 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1166 found at Fri Jan 8 06:05:04 EST 2016 selfserv_9591 with PID 1166 started at Fri Jan 8 06:05:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7030: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1166 at Fri Jan 8 06:05:04 EST 2016 kill -USR1 1166 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1166 killed at Fri Jan 8 06:05:05 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:05:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:05:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:05:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7031: Waiting for Server - FAILED kill -0 1235 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1235 found at Fri Jan 8 06:05:11 EST 2016 selfserv_9591 with PID 1235 started at Fri Jan 8 06:05:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7032: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1235 at Fri Jan 8 06:05:11 EST 2016 kill -USR1 1235 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1235 killed at Fri Jan 8 06:05:12 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:05:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:05:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:05:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7033: Waiting for Server - FAILED kill -0 1303 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1303 found at Fri Jan 8 06:05:18 EST 2016 selfserv_9591 with PID 1303 started at Fri Jan 8 06:05:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7034: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1303 at Fri Jan 8 06:05:18 EST 2016 kill -USR1 1303 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1303 killed at Fri Jan 8 06:05:18 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:05:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:05:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:05:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7035: Waiting for Server - FAILED kill -0 1383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1383 found at Fri Jan 8 06:05:25 EST 2016 selfserv_9591 with PID 1383 started at Fri Jan 8 06:05:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7036: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 1383 at Fri Jan 8 06:05:25 EST 2016 kill -USR1 1383 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1383 killed at Fri Jan 8 06:05:25 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:05:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:05:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:05:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7037: Waiting for Server - FAILED kill -0 1452 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1452 found at Fri Jan 8 06:05:31 EST 2016 selfserv_9591 with PID 1452 started at Fri Jan 8 06:05:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7038: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1452 at Fri Jan 8 06:05:32 EST 2016 kill -USR1 1452 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1452 killed at Fri Jan 8 06:05:32 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:05:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:05:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:05:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7039: Waiting for Server - FAILED kill -0 1520 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1520 found at Fri Jan 8 06:05:38 EST 2016 selfserv_9591 with PID 1520 started at Fri Jan 8 06:05:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7040: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 1520 at Fri Jan 8 06:05:39 EST 2016 kill -USR1 1520 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1520 killed at Fri Jan 8 06:05:39 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:05:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:05:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:05:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7041: Waiting for Server - FAILED kill -0 1600 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1600 found at Fri Jan 8 06:05:45 EST 2016 selfserv_9591 with PID 1600 started at Fri Jan 8 06:05:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7042: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 1600 at Fri Jan 8 06:05:46 EST 2016 kill -USR1 1600 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1600 killed at Fri Jan 8 06:05:46 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:05:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:05:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:05:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7043: Waiting for Server - FAILED kill -0 1669 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1669 found at Fri Jan 8 06:05:52 EST 2016 selfserv_9591 with PID 1669 started at Fri Jan 8 06:05:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7044: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 1669 at Fri Jan 8 06:05:53 EST 2016 kill -USR1 1669 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1669 killed at Fri Jan 8 06:05:53 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:05:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:05:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:05:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7045: Waiting for Server - FAILED kill -0 1737 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1737 found at Fri Jan 8 06:05:59 EST 2016 selfserv_9591 with PID 1737 started at Fri Jan 8 06:05:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7046: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 1737 at Fri Jan 8 06:06:00 EST 2016 kill -USR1 1737 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1737 killed at Fri Jan 8 06:06:00 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:06:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:06:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:06:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7047: Waiting for Server - FAILED kill -0 1817 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1817 found at Fri Jan 8 06:06:06 EST 2016 selfserv_9591 with PID 1817 started at Fri Jan 8 06:06:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7048: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 1817 at Fri Jan 8 06:06:07 EST 2016 kill -USR1 1817 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1817 killed at Fri Jan 8 06:06:07 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:06:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:06:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:06:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7049: Waiting for Server - FAILED kill -0 1893 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1893 found at Fri Jan 8 06:06:13 EST 2016 selfserv_9591 with PID 1893 started at Fri Jan 8 06:06:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7050: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1893 at Fri Jan 8 06:06:13 EST 2016 kill -USR1 1893 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1893 killed at Fri Jan 8 06:06:14 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:06:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:06:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:06:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7051: Waiting for Server - FAILED kill -0 1961 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1961 found at Fri Jan 8 06:06:20 EST 2016 selfserv_9591 with PID 1961 started at Fri Jan 8 06:06:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7052: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 1961 at Fri Jan 8 06:06:20 EST 2016 kill -USR1 1961 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1961 killed at Fri Jan 8 06:06:21 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:06:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:06:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:06:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7053: Waiting for Server - FAILED kill -0 2041 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2041 found at Fri Jan 8 06:06:27 EST 2016 selfserv_9591 with PID 2041 started at Fri Jan 8 06:06:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7054: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2041 at Fri Jan 8 06:06:27 EST 2016 kill -USR1 2041 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2041 killed at Fri Jan 8 06:06:28 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:06:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:06:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:06:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7055: Waiting for Server - FAILED kill -0 2110 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2110 found at Fri Jan 8 06:06:34 EST 2016 selfserv_9591 with PID 2110 started at Fri Jan 8 06:06:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7056: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2110 at Fri Jan 8 06:06:34 EST 2016 kill -USR1 2110 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2110 killed at Fri Jan 8 06:06:35 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:06:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:06:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:06:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7057: Waiting for Server - FAILED kill -0 2179 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2179 found at Fri Jan 8 06:06:41 EST 2016 selfserv_9591 with PID 2179 started at Fri Jan 8 06:06:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7058: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2179 at Fri Jan 8 06:06:41 EST 2016 kill -USR1 2179 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2179 killed at Fri Jan 8 06:06:41 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:06:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:06:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:06:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7059: Waiting for Server - FAILED kill -0 2259 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2259 found at Fri Jan 8 06:06:47 EST 2016 selfserv_9591 with PID 2259 started at Fri Jan 8 06:06:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7060: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2259 at Fri Jan 8 06:06:48 EST 2016 kill -USR1 2259 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2259 killed at Fri Jan 8 06:06:48 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:06:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:06:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:06:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7061: Waiting for Server - FAILED kill -0 2328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2328 found at Fri Jan 8 06:06:54 EST 2016 selfserv_9591 with PID 2328 started at Fri Jan 8 06:06:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7062: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2328 at Fri Jan 8 06:06:55 EST 2016 kill -USR1 2328 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2328 killed at Fri Jan 8 06:06:55 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:06:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:06:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:07:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7063: Waiting for Server - FAILED kill -0 2396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2396 found at Fri Jan 8 06:07:01 EST 2016 selfserv_9591 with PID 2396 started at Fri Jan 8 06:07:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7064: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2396 at Fri Jan 8 06:07:02 EST 2016 kill -USR1 2396 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2396 killed at Fri Jan 8 06:07:02 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:07:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:07:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:07:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7065: Waiting for Server - FAILED kill -0 2476 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2476 found at Fri Jan 8 06:07:08 EST 2016 selfserv_9591 with PID 2476 started at Fri Jan 8 06:07:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7066: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2476 at Fri Jan 8 06:07:09 EST 2016 kill -USR1 2476 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2476 killed at Fri Jan 8 06:07:09 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:07:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:07:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:07:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7067: Waiting for Server - FAILED kill -0 2545 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2545 found at Fri Jan 8 06:07:15 EST 2016 selfserv_9591 with PID 2545 started at Fri Jan 8 06:07:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7068: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2545 at Fri Jan 8 06:07:16 EST 2016 kill -USR1 2545 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2545 killed at Fri Jan 8 06:07:16 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:07:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:07:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:07:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7069: Waiting for Server - FAILED kill -0 2613 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2613 found at Fri Jan 8 06:07:22 EST 2016 selfserv_9591 with PID 2613 started at Fri Jan 8 06:07:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7070: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2613 at Fri Jan 8 06:07:23 EST 2016 kill -USR1 2613 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2613 killed at Fri Jan 8 06:07:23 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:07:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:07:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:07:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7071: Waiting for Server - FAILED kill -0 2693 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2693 found at Fri Jan 8 06:07:29 EST 2016 selfserv_9591 with PID 2693 started at Fri Jan 8 06:07:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7072: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2693 at Fri Jan 8 06:07:30 EST 2016 kill -USR1 2693 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2693 killed at Fri Jan 8 06:07:30 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:07:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:07:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:07:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7073: Waiting for Server - FAILED kill -0 2762 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2762 found at Fri Jan 8 06:07:36 EST 2016 selfserv_9591 with PID 2762 started at Fri Jan 8 06:07:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7074: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2762 at Fri Jan 8 06:07:36 EST 2016 kill -USR1 2762 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2762 killed at Fri Jan 8 06:07:37 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:07:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:07:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:07:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7075: Waiting for Server - FAILED kill -0 2830 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2830 found at Fri Jan 8 06:07:43 EST 2016 selfserv_9591 with PID 2830 started at Fri Jan 8 06:07:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7076: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2830 at Fri Jan 8 06:07:43 EST 2016 kill -USR1 2830 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2830 killed at Fri Jan 8 06:07:44 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:07:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:07:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:07:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7077: Waiting for Server - FAILED kill -0 2910 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2910 found at Fri Jan 8 06:07:50 EST 2016 selfserv_9591 with PID 2910 started at Fri Jan 8 06:07:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7078: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2910 at Fri Jan 8 06:07:50 EST 2016 kill -USR1 2910 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2910 killed at Fri Jan 8 06:07:51 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:07:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:07:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:07:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7079: Waiting for Server - FAILED kill -0 2979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2979 found at Fri Jan 8 06:07:57 EST 2016 selfserv_9591 with PID 2979 started at Fri Jan 8 06:07:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7080: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2979 at Fri Jan 8 06:07:57 EST 2016 kill -USR1 2979 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2979 killed at Fri Jan 8 06:07:58 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:07:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:07:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:08:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7081: Waiting for Server - FAILED kill -0 3047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3047 found at Fri Jan 8 06:08:04 EST 2016 selfserv_9591 with PID 3047 started at Fri Jan 8 06:08:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7082: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3047 at Fri Jan 8 06:08:04 EST 2016 kill -USR1 3047 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3047 killed at Fri Jan 8 06:08:04 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:08:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:08:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:08:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7083: Waiting for Server - FAILED kill -0 3127 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3127 found at Fri Jan 8 06:08:10 EST 2016 selfserv_9591 with PID 3127 started at Fri Jan 8 06:08:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7084: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3127 at Fri Jan 8 06:08:11 EST 2016 kill -USR1 3127 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3127 killed at Fri Jan 8 06:08:11 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:08:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:08:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:08:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7085: Waiting for Server - FAILED kill -0 3196 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3196 found at Fri Jan 8 06:08:17 EST 2016 selfserv_9591 with PID 3196 started at Fri Jan 8 06:08:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7086: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3196 at Fri Jan 8 06:08:18 EST 2016 kill -USR1 3196 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3196 killed at Fri Jan 8 06:08:18 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:08:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:08:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:08:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7087: Waiting for Server - FAILED kill -0 3264 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3264 found at Fri Jan 8 06:08:24 EST 2016 selfserv_9591 with PID 3264 started at Fri Jan 8 06:08:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7088: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3264 at Fri Jan 8 06:08:25 EST 2016 kill -USR1 3264 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3264 killed at Fri Jan 8 06:08:25 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:08:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:08:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:08:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7089: Waiting for Server - FAILED kill -0 3344 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3344 found at Fri Jan 8 06:08:31 EST 2016 selfserv_9591 with PID 3344 started at Fri Jan 8 06:08:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7090: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3344 at Fri Jan 8 06:08:32 EST 2016 kill -USR1 3344 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3344 killed at Fri Jan 8 06:08:32 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:08:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:08:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:08:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7091: Waiting for Server - FAILED kill -0 3413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3413 found at Fri Jan 8 06:08:38 EST 2016 selfserv_9591 with PID 3413 started at Fri Jan 8 06:08:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7092: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3413 at Fri Jan 8 06:08:39 EST 2016 kill -USR1 3413 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3413 killed at Fri Jan 8 06:08:39 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:08:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:08:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:08:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7093: Waiting for Server - FAILED kill -0 3481 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3481 found at Fri Jan 8 06:08:45 EST 2016 selfserv_9591 with PID 3481 started at Fri Jan 8 06:08:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7094: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3481 at Fri Jan 8 06:08:46 EST 2016 kill -USR1 3481 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3481 killed at Fri Jan 8 06:08:46 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:08:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:08:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:08:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7095: Waiting for Server - FAILED kill -0 3561 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3561 found at Fri Jan 8 06:08:52 EST 2016 selfserv_9591 with PID 3561 started at Fri Jan 8 06:08:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7096: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3561 at Fri Jan 8 06:08:52 EST 2016 kill -USR1 3561 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3561 killed at Fri Jan 8 06:08:53 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:08:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:08:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:08:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7097: Waiting for Server - FAILED kill -0 3630 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3630 found at Fri Jan 8 06:08:59 EST 2016 selfserv_9591 with PID 3630 started at Fri Jan 8 06:08:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7098: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3630 at Fri Jan 8 06:08:59 EST 2016 kill -USR1 3630 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3630 killed at Fri Jan 8 06:09:00 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:09:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:09:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:09:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7099: Waiting for Server - FAILED kill -0 3698 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3698 found at Fri Jan 8 06:09:06 EST 2016 selfserv_9591 with PID 3698 started at Fri Jan 8 06:09:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7100: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3698 at Fri Jan 8 06:09:06 EST 2016 kill -USR1 3698 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3698 killed at Fri Jan 8 06:09:07 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:09:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:09:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:09:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7101: Waiting for Server - FAILED kill -0 3779 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3779 found at Fri Jan 8 06:09:13 EST 2016 selfserv_9591 with PID 3779 started at Fri Jan 8 06:09:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7102: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3779 at Fri Jan 8 06:09:13 EST 2016 kill -USR1 3779 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3779 killed at Fri Jan 8 06:09:14 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:09:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:09:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:09:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7103: Waiting for Server - FAILED kill -0 3847 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3847 found at Fri Jan 8 06:09:20 EST 2016 selfserv_9591 with PID 3847 started at Fri Jan 8 06:09:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7104: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3847 at Fri Jan 8 06:09:20 EST 2016 kill -USR1 3847 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3847 killed at Fri Jan 8 06:09:21 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:09:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:09:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:09:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7105: Waiting for Server - FAILED kill -0 3915 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3915 found at Fri Jan 8 06:09:27 EST 2016 selfserv_9591 with PID 3915 started at Fri Jan 8 06:09:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7106: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3915 at Fri Jan 8 06:09:27 EST 2016 kill -USR1 3915 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3915 killed at Fri Jan 8 06:09:27 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:09:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:09:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:09:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7107: Waiting for Server - FAILED kill -0 3996 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3996 found at Fri Jan 8 06:09:33 EST 2016 selfserv_9591 with PID 3996 started at Fri Jan 8 06:09:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7108: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3996 at Fri Jan 8 06:09:34 EST 2016 kill -USR1 3996 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3996 killed at Fri Jan 8 06:09:34 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:09:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:09:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:09:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7109: Waiting for Server - FAILED kill -0 4064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4064 found at Fri Jan 8 06:09:40 EST 2016 selfserv_9591 with PID 4064 started at Fri Jan 8 06:09:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7110: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4064 at Fri Jan 8 06:09:41 EST 2016 kill -USR1 4064 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4064 killed at Fri Jan 8 06:09:41 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:09:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:09:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:09:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7111: Waiting for Server - FAILED kill -0 4132 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4132 found at Fri Jan 8 06:09:47 EST 2016 selfserv_9591 with PID 4132 started at Fri Jan 8 06:09:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7112: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4132 at Fri Jan 8 06:09:48 EST 2016 kill -USR1 4132 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4132 killed at Fri Jan 8 06:09:48 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:09:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:09:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:09:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7113: Waiting for Server - FAILED kill -0 4213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4213 found at Fri Jan 8 06:09:54 EST 2016 selfserv_9591 with PID 4213 started at Fri Jan 8 06:09:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7114: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4213 at Fri Jan 8 06:09:55 EST 2016 kill -USR1 4213 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4213 killed at Fri Jan 8 06:09:55 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:09:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:09:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:10:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7115: Waiting for Server - FAILED kill -0 4281 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4281 found at Fri Jan 8 06:10:01 EST 2016 selfserv_9591 with PID 4281 started at Fri Jan 8 06:10:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7116: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4281 at Fri Jan 8 06:10:02 EST 2016 kill -USR1 4281 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4281 killed at Fri Jan 8 06:10:02 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:10:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:10:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:10:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7117: Waiting for Server - FAILED kill -0 4349 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4349 found at Fri Jan 8 06:10:08 EST 2016 selfserv_9591 with PID 4349 started at Fri Jan 8 06:10:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7118: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4349 at Fri Jan 8 06:10:08 EST 2016 kill -USR1 4349 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4349 killed at Fri Jan 8 06:10:09 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:10:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:10:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:10:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7119: Waiting for Server - FAILED kill -0 4430 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4430 found at Fri Jan 8 06:10:15 EST 2016 selfserv_9591 with PID 4430 started at Fri Jan 8 06:10:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7120: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4430 at Fri Jan 8 06:10:15 EST 2016 kill -USR1 4430 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4430 killed at Fri Jan 8 06:10:16 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:10:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:10:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:10:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7121: Waiting for Server - FAILED kill -0 4498 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4498 found at Fri Jan 8 06:10:22 EST 2016 selfserv_9591 with PID 4498 started at Fri Jan 8 06:10:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7122: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 4498 at Fri Jan 8 06:10:22 EST 2016 kill -USR1 4498 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4498 killed at Fri Jan 8 06:10:23 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:10:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:10:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:10:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7123: Waiting for Server - FAILED kill -0 4566 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4566 found at Fri Jan 8 06:10:29 EST 2016 selfserv_9591 with PID 4566 started at Fri Jan 8 06:10:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7124: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4566 at Fri Jan 8 06:10:29 EST 2016 kill -USR1 4566 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4566 killed at Fri Jan 8 06:10:30 EST 2016 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/authin.tl.tmp 0 selfserv_9591 starting at Fri Jan 8 06:10:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:10:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:10:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7125: Waiting for Server - FAILED kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:36 EST 2016 selfserv_9591 with PID 4642 started at Fri Jan 8 06:10:36 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:36 EST 2016 ssl.sh: #7126: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:37 EST 2016 ssl.sh: #7127: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:37 EST 2016 ssl.sh: #7128: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:38 EST 2016 ssl.sh: #7129: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:38 EST 2016 ssl.sh: #7130: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:39 EST 2016 ssl.sh: #7131: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:39 EST 2016 ssl.sh: #7132: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:40 EST 2016 ssl.sh: #7133: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:41 EST 2016 ssl.sh: #7134: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:41 EST 2016 ssl.sh: #7135: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:42 EST 2016 ssl.sh: #7136: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:42 EST 2016 ssl.sh: #7137: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:43 EST 2016 ssl.sh: #7138: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:43 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7139: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:44 EST 2016 ssl.sh: #7140: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:44 EST 2016 ssl.sh: #7141: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:45 EST 2016 ssl.sh: #7142: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:46 EST 2016 ssl.sh: #7143: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:46 EST 2016 ssl.sh: #7144: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:47 EST 2016 ssl.sh: #7145: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:47 EST 2016 ssl.sh: #7146: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:48 EST 2016 ssl.sh: #7147: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:48 EST 2016 ssl.sh: #7148: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:49 EST 2016 ssl.sh: #7149: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:50 EST 2016 ssl.sh: #7150: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:50 EST 2016 ssl.sh: #7151: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:51 EST 2016 ssl.sh: #7152: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:51 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7153: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:52 EST 2016 ssl.sh: #7154: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:52 EST 2016 ssl.sh: #7155: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:53 EST 2016 ssl.sh: #7156: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:53 EST 2016 ssl.sh: #7157: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:54 EST 2016 ssl.sh: #7158: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:54 EST 2016 ssl.sh: #7159: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:55 EST 2016 ssl.sh: #7160: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:56 EST 2016 ssl.sh: #7161: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:56 EST 2016 ssl.sh: #7162: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:57 EST 2016 ssl.sh: #7163: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:57 EST 2016 ssl.sh: #7164: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:58 EST 2016 ssl.sh: #7165: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4642 found at Fri Jan 8 06:10:58 EST 2016 ssl.sh: #7166: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 4642 at Fri Jan 8 06:10:59 EST 2016 kill -USR1 4642 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4642 killed at Fri Jan 8 06:10:59 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:10:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:10:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:11:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7167: Waiting for Server - FAILED kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:05 EST 2016 selfserv_9591 with PID 6077 started at Fri Jan 8 06:11:05 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:05 EST 2016 ssl.sh: #7168: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:06 EST 2016 ssl.sh: #7169: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:07 EST 2016 ssl.sh: #7170: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:07 EST 2016 ssl.sh: #7171: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:08 EST 2016 ssl.sh: #7172: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:08 EST 2016 ssl.sh: #7173: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:09 EST 2016 ssl.sh: #7174: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:09 EST 2016 ssl.sh: #7175: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:10 EST 2016 ssl.sh: #7176: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:10 EST 2016 ssl.sh: #7177: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:11 EST 2016 ssl.sh: #7178: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:12 EST 2016 ssl.sh: #7179: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:12 EST 2016 ssl.sh: #7180: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:13 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7181: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:13 EST 2016 ssl.sh: #7182: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:14 EST 2016 ssl.sh: #7183: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:14 EST 2016 ssl.sh: #7184: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:15 EST 2016 ssl.sh: #7185: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:15 EST 2016 ssl.sh: #7186: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:16 EST 2016 ssl.sh: #7187: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:17 EST 2016 ssl.sh: #7188: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:17 EST 2016 ssl.sh: #7189: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:18 EST 2016 ssl.sh: #7190: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:18 EST 2016 ssl.sh: #7191: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:19 EST 2016 ssl.sh: #7192: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:19 EST 2016 ssl.sh: #7193: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:20 EST 2016 ssl.sh: #7194: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:20 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7195: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:21 EST 2016 ssl.sh: #7196: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:22 EST 2016 ssl.sh: #7197: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:22 EST 2016 ssl.sh: #7198: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:23 EST 2016 ssl.sh: #7199: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:23 EST 2016 ssl.sh: #7200: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:24 EST 2016 ssl.sh: #7201: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:24 EST 2016 ssl.sh: #7202: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:25 EST 2016 ssl.sh: #7203: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:25 EST 2016 ssl.sh: #7204: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:26 EST 2016 ssl.sh: #7205: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:27 EST 2016 ssl.sh: #7206: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:27 EST 2016 ssl.sh: #7207: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6077 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 6077 found at Fri Jan 8 06:11:28 EST 2016 ssl.sh: #7208: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 6077 at Fri Jan 8 06:11:28 EST 2016 kill -USR1 6077 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6077 killed at Fri Jan 8 06:11:28 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:11:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:11:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:11:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7209: Waiting for Server - FAILED kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:34 EST 2016 selfserv_9591 with PID 7512 started at Fri Jan 8 06:11:34 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:35 EST 2016 ssl.sh: #7210: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:35 EST 2016 ssl.sh: #7211: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:36 EST 2016 ssl.sh: #7212: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:36 EST 2016 ssl.sh: #7213: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:37 EST 2016 ssl.sh: #7214: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:37 EST 2016 ssl.sh: #7215: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:38 EST 2016 ssl.sh: #7216: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:39 EST 2016 ssl.sh: #7217: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:39 EST 2016 ssl.sh: #7218: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:40 EST 2016 ssl.sh: #7219: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:40 EST 2016 ssl.sh: #7220: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:41 EST 2016 ssl.sh: #7221: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:41 EST 2016 ssl.sh: #7222: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:42 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7223: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:43 EST 2016 ssl.sh: #7224: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:43 EST 2016 ssl.sh: #7225: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:44 EST 2016 ssl.sh: #7226: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:44 EST 2016 ssl.sh: #7227: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:45 EST 2016 ssl.sh: #7228: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:45 EST 2016 ssl.sh: #7229: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:46 EST 2016 ssl.sh: #7230: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:46 EST 2016 ssl.sh: #7231: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:47 EST 2016 ssl.sh: #7232: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:48 EST 2016 ssl.sh: #7233: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:48 EST 2016 ssl.sh: #7234: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:49 EST 2016 ssl.sh: #7235: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:49 EST 2016 ssl.sh: #7236: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:50 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7237: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:50 EST 2016 ssl.sh: #7238: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:51 EST 2016 ssl.sh: #7239: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:51 EST 2016 ssl.sh: #7240: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:52 EST 2016 ssl.sh: #7241: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:52 EST 2016 ssl.sh: #7242: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:53 EST 2016 ssl.sh: #7243: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:54 EST 2016 ssl.sh: #7244: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:54 EST 2016 ssl.sh: #7245: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:55 EST 2016 ssl.sh: #7246: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:55 EST 2016 ssl.sh: #7247: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:56 EST 2016 ssl.sh: #7248: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:56 EST 2016 ssl.sh: #7249: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7512 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7512 found at Fri Jan 8 06:11:57 EST 2016 ssl.sh: #7250: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 7512 at Fri Jan 8 06:11:57 EST 2016 kill -USR1 7512 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7512 killed at Fri Jan 8 06:11:58 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:11:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:11:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:12:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7251: Waiting for Server - FAILED kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:03 EST 2016 selfserv_9591 with PID 8951 started at Fri Jan 8 06:12:03 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:04 EST 2016 ssl.sh: #7252: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:05 EST 2016 ssl.sh: #7253: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:05 EST 2016 ssl.sh: #7254: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:06 EST 2016 ssl.sh: #7255: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:06 EST 2016 ssl.sh: #7256: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:07 EST 2016 ssl.sh: #7257: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:07 EST 2016 ssl.sh: #7258: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:08 EST 2016 ssl.sh: #7259: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:08 EST 2016 ssl.sh: #7260: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:09 EST 2016 ssl.sh: #7261: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:10 EST 2016 ssl.sh: #7262: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:10 EST 2016 ssl.sh: #7263: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:11 EST 2016 ssl.sh: #7264: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:11 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7265: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:12 EST 2016 ssl.sh: #7266: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:12 EST 2016 ssl.sh: #7267: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:13 EST 2016 ssl.sh: #7268: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:13 EST 2016 ssl.sh: #7269: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:14 EST 2016 ssl.sh: #7270: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:14 EST 2016 ssl.sh: #7271: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:15 EST 2016 ssl.sh: #7272: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:16 EST 2016 ssl.sh: #7273: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:16 EST 2016 ssl.sh: #7274: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:17 EST 2016 ssl.sh: #7275: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:17 EST 2016 ssl.sh: #7276: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:18 EST 2016 ssl.sh: #7277: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:18 EST 2016 ssl.sh: #7278: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:19 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7279: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:20 EST 2016 ssl.sh: #7280: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:20 EST 2016 ssl.sh: #7281: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:21 EST 2016 ssl.sh: #7282: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:21 EST 2016 ssl.sh: #7283: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:22 EST 2016 ssl.sh: #7284: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:22 EST 2016 ssl.sh: #7285: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:23 EST 2016 ssl.sh: #7286: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:23 EST 2016 ssl.sh: #7287: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:24 EST 2016 ssl.sh: #7288: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:25 EST 2016 ssl.sh: #7289: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:25 EST 2016 ssl.sh: #7290: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:26 EST 2016 ssl.sh: #7291: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8951 found at Fri Jan 8 06:12:26 EST 2016 ssl.sh: #7292: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 8951 at Fri Jan 8 06:12:26 EST 2016 kill -USR1 8951 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8951 killed at Fri Jan 8 06:12:27 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:12:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:12:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:12:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7293: Waiting for Server - FAILED kill -0 10386 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10386 found at Fri Jan 8 06:12:33 EST 2016 selfserv_9591 with PID 10386 started at Fri Jan 8 06:12:33 EST 2016 trying to kill selfserv_9591 with PID 10386 at Fri Jan 8 06:12:33 EST 2016 kill -USR1 10386 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10386 killed at Fri Jan 8 06:12:33 EST 2016 selfserv_9591 starting at Fri Jan 8 06:12:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:12:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:12:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7294: Waiting for Server - FAILED kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:39 EST 2016 selfserv_9591 with PID 10441 started at Fri Jan 8 06:12:39 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:40 EST 2016 ssl.sh: #7295: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:40 EST 2016 ssl.sh: #7296: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:41 EST 2016 ssl.sh: #7297: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:41 EST 2016 ssl.sh: #7298: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:42 EST 2016 ssl.sh: #7299: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:42 EST 2016 ssl.sh: #7300: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:43 EST 2016 ssl.sh: #7301: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:44 EST 2016 ssl.sh: #7302: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:44 EST 2016 ssl.sh: #7303: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:45 EST 2016 ssl.sh: #7304: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:45 EST 2016 ssl.sh: #7305: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:46 EST 2016 ssl.sh: #7306: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:46 EST 2016 ssl.sh: #7307: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:47 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7308: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:47 EST 2016 ssl.sh: #7309: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:48 EST 2016 ssl.sh: #7310: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:48 EST 2016 ssl.sh: #7311: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:49 EST 2016 ssl.sh: #7312: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:50 EST 2016 ssl.sh: #7313: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:50 EST 2016 ssl.sh: #7314: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:51 EST 2016 ssl.sh: #7315: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:51 EST 2016 ssl.sh: #7316: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:52 EST 2016 ssl.sh: #7317: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:52 EST 2016 ssl.sh: #7318: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:53 EST 2016 ssl.sh: #7319: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:54 EST 2016 ssl.sh: #7320: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:54 EST 2016 ssl.sh: #7321: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:55 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7322: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:55 EST 2016 ssl.sh: #7323: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:56 EST 2016 ssl.sh: #7324: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:56 EST 2016 ssl.sh: #7325: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:57 EST 2016 ssl.sh: #7326: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:57 EST 2016 ssl.sh: #7327: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:58 EST 2016 ssl.sh: #7328: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:59 EST 2016 ssl.sh: #7329: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:12:59 EST 2016 ssl.sh: #7330: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:13:00 EST 2016 ssl.sh: #7331: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:13:00 EST 2016 ssl.sh: #7332: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:13:01 EST 2016 ssl.sh: #7333: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:13:01 EST 2016 ssl.sh: #7334: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10441 found at Fri Jan 8 06:13:02 EST 2016 ssl.sh: #7335: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 10441 at Fri Jan 8 06:13:02 EST 2016 kill -USR1 10441 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10441 killed at Fri Jan 8 06:13:02 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:13:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:13:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:13:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7336: Waiting for Server - FAILED kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:08 EST 2016 selfserv_9591 with PID 11880 started at Fri Jan 8 06:13:08 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:09 EST 2016 ssl.sh: #7337: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:09 EST 2016 ssl.sh: #7338: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:10 EST 2016 ssl.sh: #7339: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:11 EST 2016 ssl.sh: #7340: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:11 EST 2016 ssl.sh: #7341: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:12 EST 2016 ssl.sh: #7342: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:12 EST 2016 ssl.sh: #7343: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:13 EST 2016 ssl.sh: #7344: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:13 EST 2016 ssl.sh: #7345: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:14 EST 2016 ssl.sh: #7346: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:15 EST 2016 ssl.sh: #7347: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:15 EST 2016 ssl.sh: #7348: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:16 EST 2016 ssl.sh: #7349: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:16 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7350: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:17 EST 2016 ssl.sh: #7351: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:17 EST 2016 ssl.sh: #7352: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:18 EST 2016 ssl.sh: #7353: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:18 EST 2016 ssl.sh: #7354: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:19 EST 2016 ssl.sh: #7355: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:19 EST 2016 ssl.sh: #7356: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:20 EST 2016 ssl.sh: #7357: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:21 EST 2016 ssl.sh: #7358: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:21 EST 2016 ssl.sh: #7359: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:22 EST 2016 ssl.sh: #7360: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:22 EST 2016 ssl.sh: #7361: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:23 EST 2016 ssl.sh: #7362: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:23 EST 2016 ssl.sh: #7363: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:24 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7364: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:25 EST 2016 ssl.sh: #7365: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:25 EST 2016 ssl.sh: #7366: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:26 EST 2016 ssl.sh: #7367: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:26 EST 2016 ssl.sh: #7368: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:27 EST 2016 ssl.sh: #7369: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:27 EST 2016 ssl.sh: #7370: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:28 EST 2016 ssl.sh: #7371: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:28 EST 2016 ssl.sh: #7372: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:29 EST 2016 ssl.sh: #7373: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:30 EST 2016 ssl.sh: #7374: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:30 EST 2016 ssl.sh: #7375: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:31 EST 2016 ssl.sh: #7376: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11880 found at Fri Jan 8 06:13:31 EST 2016 ssl.sh: #7377: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 11880 at Fri Jan 8 06:13:31 EST 2016 kill -USR1 11880 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11880 killed at Fri Jan 8 06:13:32 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:13:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:13:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:13:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7378: Waiting for Server - FAILED kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:38 EST 2016 selfserv_9591 with PID 13315 started at Fri Jan 8 06:13:38 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:38 EST 2016 ssl.sh: #7379: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:39 EST 2016 ssl.sh: #7380: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:39 EST 2016 ssl.sh: #7381: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:40 EST 2016 ssl.sh: #7382: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:40 EST 2016 ssl.sh: #7383: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:41 EST 2016 ssl.sh: #7384: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:42 EST 2016 ssl.sh: #7385: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:42 EST 2016 ssl.sh: #7386: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:43 EST 2016 ssl.sh: #7387: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:43 EST 2016 ssl.sh: #7388: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:44 EST 2016 ssl.sh: #7389: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:44 EST 2016 ssl.sh: #7390: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:45 EST 2016 ssl.sh: #7391: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:46 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7392: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:46 EST 2016 ssl.sh: #7393: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:47 EST 2016 ssl.sh: #7394: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:47 EST 2016 ssl.sh: #7395: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:48 EST 2016 ssl.sh: #7396: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:48 EST 2016 ssl.sh: #7397: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:49 EST 2016 ssl.sh: #7398: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:49 EST 2016 ssl.sh: #7399: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:50 EST 2016 ssl.sh: #7400: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:50 EST 2016 ssl.sh: #7401: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:51 EST 2016 ssl.sh: #7402: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:52 EST 2016 ssl.sh: #7403: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:52 EST 2016 ssl.sh: #7404: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:53 EST 2016 ssl.sh: #7405: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:53 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7406: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:54 EST 2016 ssl.sh: #7407: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:54 EST 2016 ssl.sh: #7408: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:55 EST 2016 ssl.sh: #7409: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:55 EST 2016 ssl.sh: #7410: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:56 EST 2016 ssl.sh: #7411: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:57 EST 2016 ssl.sh: #7412: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:57 EST 2016 ssl.sh: #7413: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:58 EST 2016 ssl.sh: #7414: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:58 EST 2016 ssl.sh: #7415: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:59 EST 2016 ssl.sh: #7416: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:13:59 EST 2016 ssl.sh: #7417: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:14:00 EST 2016 ssl.sh: #7418: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13315 found at Fri Jan 8 06:14:01 EST 2016 ssl.sh: #7419: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13315 at Fri Jan 8 06:14:01 EST 2016 kill -USR1 13315 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13315 killed at Fri Jan 8 06:14:01 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:14:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:14:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:14:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7420: Waiting for Server - FAILED kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:07 EST 2016 selfserv_9591 with PID 14752 started at Fri Jan 8 06:14:07 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:08 EST 2016 ssl.sh: #7421: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:08 EST 2016 ssl.sh: #7422: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:09 EST 2016 ssl.sh: #7423: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:09 EST 2016 ssl.sh: #7424: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:10 EST 2016 ssl.sh: #7425: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:10 EST 2016 ssl.sh: #7426: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:11 EST 2016 ssl.sh: #7427: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:11 EST 2016 ssl.sh: #7428: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:12 EST 2016 ssl.sh: #7429: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:13 EST 2016 ssl.sh: #7430: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:13 EST 2016 ssl.sh: #7431: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:14 EST 2016 ssl.sh: #7432: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:14 EST 2016 ssl.sh: #7433: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:15 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7434: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:15 EST 2016 ssl.sh: #7435: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:16 EST 2016 ssl.sh: #7436: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:16 EST 2016 ssl.sh: #7437: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:17 EST 2016 ssl.sh: #7438: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:18 EST 2016 ssl.sh: #7439: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:18 EST 2016 ssl.sh: #7440: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:19 EST 2016 ssl.sh: #7441: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:19 EST 2016 ssl.sh: #7442: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:20 EST 2016 ssl.sh: #7443: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:20 EST 2016 ssl.sh: #7444: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:21 EST 2016 ssl.sh: #7445: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:22 EST 2016 ssl.sh: #7446: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:22 EST 2016 ssl.sh: #7447: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:23 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7448: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:23 EST 2016 ssl.sh: #7449: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:24 EST 2016 ssl.sh: #7450: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:24 EST 2016 ssl.sh: #7451: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:25 EST 2016 ssl.sh: #7452: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:25 EST 2016 ssl.sh: #7453: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:26 EST 2016 ssl.sh: #7454: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:26 EST 2016 ssl.sh: #7455: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:27 EST 2016 ssl.sh: #7456: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:28 EST 2016 ssl.sh: #7457: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:28 EST 2016 ssl.sh: #7458: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:29 EST 2016 ssl.sh: #7459: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:29 EST 2016 ssl.sh: #7460: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14752 found at Fri Jan 8 06:14:30 EST 2016 ssl.sh: #7461: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14752 at Fri Jan 8 06:14:30 EST 2016 kill -USR1 14752 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14752 killed at Fri Jan 8 06:14:30 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:14:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:14:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:14:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7462: Waiting for Server - FAILED kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:36 EST 2016 selfserv_9591 with PID 16188 started at Fri Jan 8 06:14:36 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:37 EST 2016 ssl.sh: #7463: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:37 EST 2016 ssl.sh: #7464: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:38 EST 2016 ssl.sh: #7465: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:39 EST 2016 ssl.sh: #7466: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:39 EST 2016 ssl.sh: #7467: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:40 EST 2016 ssl.sh: #7468: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:40 EST 2016 ssl.sh: #7469: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:41 EST 2016 ssl.sh: #7470: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:41 EST 2016 ssl.sh: #7471: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:42 EST 2016 ssl.sh: #7472: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:42 EST 2016 ssl.sh: #7473: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:43 EST 2016 ssl.sh: #7474: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:44 EST 2016 ssl.sh: #7475: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:44 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7476: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:45 EST 2016 ssl.sh: #7477: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:45 EST 2016 ssl.sh: #7478: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:46 EST 2016 ssl.sh: #7479: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:46 EST 2016 ssl.sh: #7480: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:47 EST 2016 ssl.sh: #7481: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:47 EST 2016 ssl.sh: #7482: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:48 EST 2016 ssl.sh: #7483: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:49 EST 2016 ssl.sh: #7484: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:49 EST 2016 ssl.sh: #7485: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:50 EST 2016 ssl.sh: #7486: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:50 EST 2016 ssl.sh: #7487: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:51 EST 2016 ssl.sh: #7488: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:51 EST 2016 ssl.sh: #7489: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:52 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7490: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:53 EST 2016 ssl.sh: #7491: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:53 EST 2016 ssl.sh: #7492: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:54 EST 2016 ssl.sh: #7493: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:54 EST 2016 ssl.sh: #7494: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:55 EST 2016 ssl.sh: #7495: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:55 EST 2016 ssl.sh: #7496: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:56 EST 2016 ssl.sh: #7497: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:56 EST 2016 ssl.sh: #7498: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:57 EST 2016 ssl.sh: #7499: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:58 EST 2016 ssl.sh: #7500: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:58 EST 2016 ssl.sh: #7501: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:59 EST 2016 ssl.sh: #7502: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16188 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16188 found at Fri Jan 8 06:14:59 EST 2016 ssl.sh: #7503: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 16188 at Fri Jan 8 06:14:59 EST 2016 kill -USR1 16188 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16188 killed at Fri Jan 8 06:15:00 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:15:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:15:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:15:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7504: Waiting for Server - FAILED kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:06 EST 2016 selfserv_9591 with PID 17624 started at Fri Jan 8 06:15:06 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:06 EST 2016 ssl.sh: #7505: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:07 EST 2016 ssl.sh: #7506: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:07 EST 2016 ssl.sh: #7507: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:08 EST 2016 ssl.sh: #7508: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:08 EST 2016 ssl.sh: #7509: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:09 EST 2016 ssl.sh: #7510: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:10 EST 2016 ssl.sh: #7511: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:10 EST 2016 ssl.sh: #7512: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:11 EST 2016 ssl.sh: #7513: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:11 EST 2016 ssl.sh: #7514: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:12 EST 2016 ssl.sh: #7515: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:12 EST 2016 ssl.sh: #7516: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:13 EST 2016 ssl.sh: #7517: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:14 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7518: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:14 EST 2016 ssl.sh: #7519: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:15 EST 2016 ssl.sh: #7520: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:15 EST 2016 ssl.sh: #7521: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:16 EST 2016 ssl.sh: #7522: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:16 EST 2016 ssl.sh: #7523: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:17 EST 2016 ssl.sh: #7524: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:17 EST 2016 ssl.sh: #7525: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:18 EST 2016 ssl.sh: #7526: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:19 EST 2016 ssl.sh: #7527: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:19 EST 2016 ssl.sh: #7528: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:20 EST 2016 ssl.sh: #7529: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:20 EST 2016 ssl.sh: #7530: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:21 EST 2016 ssl.sh: #7531: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:21 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7532: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:22 EST 2016 ssl.sh: #7533: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:22 EST 2016 ssl.sh: #7534: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:23 EST 2016 ssl.sh: #7535: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:24 EST 2016 ssl.sh: #7536: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:24 EST 2016 ssl.sh: #7537: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:25 EST 2016 ssl.sh: #7538: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:25 EST 2016 ssl.sh: #7539: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:26 EST 2016 ssl.sh: #7540: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:26 EST 2016 ssl.sh: #7541: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:27 EST 2016 ssl.sh: #7542: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:28 EST 2016 ssl.sh: #7543: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:28 EST 2016 ssl.sh: #7544: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17624 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17624 found at Fri Jan 8 06:15:29 EST 2016 ssl.sh: #7545: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17624 at Fri Jan 8 06:15:29 EST 2016 kill -USR1 17624 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17624 killed at Fri Jan 8 06:15:29 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:15:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:15:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:15:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7546: Waiting for Server - FAILED kill -0 19063 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19063 found at Fri Jan 8 06:15:35 EST 2016 selfserv_9591 with PID 19063 started at Fri Jan 8 06:15:35 EST 2016 trying to kill selfserv_9591 with PID 19063 at Fri Jan 8 06:15:35 EST 2016 kill -USR1 19063 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19063 killed at Fri Jan 8 06:15:36 EST 2016 selfserv_9591 starting at Fri Jan 8 06:15:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:15:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:15:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7547: Waiting for Server - FAILED kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:42 EST 2016 selfserv_9591 with PID 19117 started at Fri Jan 8 06:15:42 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:42 EST 2016 ssl.sh: #7548: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:43 EST 2016 ssl.sh: #7549: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:43 EST 2016 ssl.sh: #7550: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:44 EST 2016 ssl.sh: #7551: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:44 EST 2016 ssl.sh: #7552: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:45 EST 2016 ssl.sh: #7553: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:45 EST 2016 ssl.sh: #7554: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:46 EST 2016 ssl.sh: #7555: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:47 EST 2016 ssl.sh: #7556: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:47 EST 2016 ssl.sh: #7557: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:48 EST 2016 ssl.sh: #7558: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:48 EST 2016 ssl.sh: #7559: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:49 EST 2016 ssl.sh: #7560: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:49 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7561: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:50 EST 2016 ssl.sh: #7562: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:50 EST 2016 ssl.sh: #7563: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:51 EST 2016 ssl.sh: #7564: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:52 EST 2016 ssl.sh: #7565: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:52 EST 2016 ssl.sh: #7566: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:53 EST 2016 ssl.sh: #7567: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:53 EST 2016 ssl.sh: #7568: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:54 EST 2016 ssl.sh: #7569: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:54 EST 2016 ssl.sh: #7570: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:55 EST 2016 ssl.sh: #7571: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:55 EST 2016 ssl.sh: #7572: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:56 EST 2016 ssl.sh: #7573: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:57 EST 2016 ssl.sh: #7574: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:57 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7575: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:58 EST 2016 ssl.sh: #7576: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:58 EST 2016 ssl.sh: #7577: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:59 EST 2016 ssl.sh: #7578: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:15:59 EST 2016 ssl.sh: #7579: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:16:00 EST 2016 ssl.sh: #7580: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:16:00 EST 2016 ssl.sh: #7581: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:16:01 EST 2016 ssl.sh: #7582: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:16:02 EST 2016 ssl.sh: #7583: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:16:02 EST 2016 ssl.sh: #7584: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:16:03 EST 2016 ssl.sh: #7585: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:16:03 EST 2016 ssl.sh: #7586: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:16:04 EST 2016 ssl.sh: #7587: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19117 found at Fri Jan 8 06:16:04 EST 2016 ssl.sh: #7588: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 19117 at Fri Jan 8 06:16:05 EST 2016 kill -USR1 19117 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19117 killed at Fri Jan 8 06:16:05 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:16:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:16:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:16:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7589: Waiting for Server - FAILED kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:11 EST 2016 selfserv_9591 with PID 20555 started at Fri Jan 8 06:16:11 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:11 EST 2016 ssl.sh: #7590: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:12 EST 2016 ssl.sh: #7591: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:13 EST 2016 ssl.sh: #7592: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:13 EST 2016 ssl.sh: #7593: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:14 EST 2016 ssl.sh: #7594: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:14 EST 2016 ssl.sh: #7595: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:15 EST 2016 ssl.sh: #7596: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:15 EST 2016 ssl.sh: #7597: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:16 EST 2016 ssl.sh: #7598: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:16 EST 2016 ssl.sh: #7599: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:17 EST 2016 ssl.sh: #7600: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:18 EST 2016 ssl.sh: #7601: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:18 EST 2016 ssl.sh: #7602: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:19 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7603: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:19 EST 2016 ssl.sh: #7604: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:20 EST 2016 ssl.sh: #7605: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:20 EST 2016 ssl.sh: #7606: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:21 EST 2016 ssl.sh: #7607: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:21 EST 2016 ssl.sh: #7608: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:22 EST 2016 ssl.sh: #7609: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:23 EST 2016 ssl.sh: #7610: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:23 EST 2016 ssl.sh: #7611: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:24 EST 2016 ssl.sh: #7612: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:24 EST 2016 ssl.sh: #7613: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:25 EST 2016 ssl.sh: #7614: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:25 EST 2016 ssl.sh: #7615: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:26 EST 2016 ssl.sh: #7616: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:27 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7617: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:27 EST 2016 ssl.sh: #7618: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:28 EST 2016 ssl.sh: #7619: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:28 EST 2016 ssl.sh: #7620: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:29 EST 2016 ssl.sh: #7621: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:29 EST 2016 ssl.sh: #7622: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:30 EST 2016 ssl.sh: #7623: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:30 EST 2016 ssl.sh: #7624: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:31 EST 2016 ssl.sh: #7625: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:32 EST 2016 ssl.sh: #7626: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:32 EST 2016 ssl.sh: #7627: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:33 EST 2016 ssl.sh: #7628: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:33 EST 2016 ssl.sh: #7629: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20555 found at Fri Jan 8 06:16:34 EST 2016 ssl.sh: #7630: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 20555 at Fri Jan 8 06:16:34 EST 2016 kill -USR1 20555 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20555 killed at Fri Jan 8 06:16:34 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:16:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:16:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:16:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7631: Waiting for Server - FAILED kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:40 EST 2016 selfserv_9591 with PID 21991 started at Fri Jan 8 06:16:40 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:41 EST 2016 ssl.sh: #7632: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:41 EST 2016 ssl.sh: #7633: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:42 EST 2016 ssl.sh: #7634: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:42 EST 2016 ssl.sh: #7635: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:43 EST 2016 ssl.sh: #7636: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:44 EST 2016 ssl.sh: #7637: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:44 EST 2016 ssl.sh: #7638: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:45 EST 2016 ssl.sh: #7639: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:45 EST 2016 ssl.sh: #7640: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:46 EST 2016 ssl.sh: #7641: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:46 EST 2016 ssl.sh: #7642: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:47 EST 2016 ssl.sh: #7643: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:48 EST 2016 ssl.sh: #7644: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:48 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7645: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:49 EST 2016 ssl.sh: #7646: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:49 EST 2016 ssl.sh: #7647: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:50 EST 2016 ssl.sh: #7648: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:50 EST 2016 ssl.sh: #7649: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:51 EST 2016 ssl.sh: #7650: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:51 EST 2016 ssl.sh: #7651: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:52 EST 2016 ssl.sh: #7652: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:53 EST 2016 ssl.sh: #7653: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:53 EST 2016 ssl.sh: #7654: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:54 EST 2016 ssl.sh: #7655: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:54 EST 2016 ssl.sh: #7656: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:55 EST 2016 ssl.sh: #7657: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:55 EST 2016 ssl.sh: #7658: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:56 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7659: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:56 EST 2016 ssl.sh: #7660: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:57 EST 2016 ssl.sh: #7661: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:58 EST 2016 ssl.sh: #7662: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:58 EST 2016 ssl.sh: #7663: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:59 EST 2016 ssl.sh: #7664: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:16:59 EST 2016 ssl.sh: #7665: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:17:00 EST 2016 ssl.sh: #7666: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:17:00 EST 2016 ssl.sh: #7667: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:17:01 EST 2016 ssl.sh: #7668: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:17:01 EST 2016 ssl.sh: #7669: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:17:02 EST 2016 ssl.sh: #7670: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:17:03 EST 2016 ssl.sh: #7671: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21991 found at Fri Jan 8 06:17:03 EST 2016 ssl.sh: #7672: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 21991 at Fri Jan 8 06:17:03 EST 2016 kill -USR1 21991 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21991 killed at Fri Jan 8 06:17:04 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:17:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:17:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:17:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7673: Waiting for Server - FAILED kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:10 EST 2016 selfserv_9591 with PID 23427 started at Fri Jan 8 06:17:10 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:10 EST 2016 ssl.sh: #7674: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:11 EST 2016 ssl.sh: #7675: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:11 EST 2016 ssl.sh: #7676: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:12 EST 2016 ssl.sh: #7677: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:12 EST 2016 ssl.sh: #7678: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:13 EST 2016 ssl.sh: #7679: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:14 EST 2016 ssl.sh: #7680: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:14 EST 2016 ssl.sh: #7681: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:15 EST 2016 ssl.sh: #7682: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:15 EST 2016 ssl.sh: #7683: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:16 EST 2016 ssl.sh: #7684: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:16 EST 2016 ssl.sh: #7685: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:17 EST 2016 ssl.sh: #7686: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:18 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7687: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:18 EST 2016 ssl.sh: #7688: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:19 EST 2016 ssl.sh: #7689: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:19 EST 2016 ssl.sh: #7690: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:20 EST 2016 ssl.sh: #7691: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:20 EST 2016 ssl.sh: #7692: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:21 EST 2016 ssl.sh: #7693: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:21 EST 2016 ssl.sh: #7694: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:22 EST 2016 ssl.sh: #7695: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:22 EST 2016 ssl.sh: #7696: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:23 EST 2016 ssl.sh: #7697: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:24 EST 2016 ssl.sh: #7698: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:24 EST 2016 ssl.sh: #7699: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:25 EST 2016 ssl.sh: #7700: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:25 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7701: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:26 EST 2016 ssl.sh: #7702: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:26 EST 2016 ssl.sh: #7703: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:27 EST 2016 ssl.sh: #7704: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:28 EST 2016 ssl.sh: #7705: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:28 EST 2016 ssl.sh: #7706: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:29 EST 2016 ssl.sh: #7707: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:29 EST 2016 ssl.sh: #7708: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:30 EST 2016 ssl.sh: #7709: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:30 EST 2016 ssl.sh: #7710: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:31 EST 2016 ssl.sh: #7711: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:31 EST 2016 ssl.sh: #7712: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:32 EST 2016 ssl.sh: #7713: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23427 found at Fri Jan 8 06:17:33 EST 2016 ssl.sh: #7714: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 23427 at Fri Jan 8 06:17:33 EST 2016 kill -USR1 23427 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23427 killed at Fri Jan 8 06:17:33 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:17:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:17:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:17:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7715: Waiting for Server - FAILED kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:39 EST 2016 selfserv_9591 with PID 24868 started at Fri Jan 8 06:17:39 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:40 EST 2016 ssl.sh: #7716: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:40 EST 2016 ssl.sh: #7717: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:41 EST 2016 ssl.sh: #7718: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:41 EST 2016 ssl.sh: #7719: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:42 EST 2016 ssl.sh: #7720: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:42 EST 2016 ssl.sh: #7721: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:43 EST 2016 ssl.sh: #7722: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:44 EST 2016 ssl.sh: #7723: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:44 EST 2016 ssl.sh: #7724: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:45 EST 2016 ssl.sh: #7725: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:45 EST 2016 ssl.sh: #7726: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:46 EST 2016 ssl.sh: #7727: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:46 EST 2016 ssl.sh: #7728: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:47 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7729: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:47 EST 2016 ssl.sh: #7730: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:48 EST 2016 ssl.sh: #7731: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:48 EST 2016 ssl.sh: #7732: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:49 EST 2016 ssl.sh: #7733: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:50 EST 2016 ssl.sh: #7734: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:50 EST 2016 ssl.sh: #7735: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:51 EST 2016 ssl.sh: #7736: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:51 EST 2016 ssl.sh: #7737: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:52 EST 2016 ssl.sh: #7738: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:52 EST 2016 ssl.sh: #7739: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:53 EST 2016 ssl.sh: #7740: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:54 EST 2016 ssl.sh: #7741: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:54 EST 2016 ssl.sh: #7742: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:55 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7743: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:55 EST 2016 ssl.sh: #7744: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:56 EST 2016 ssl.sh: #7745: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:56 EST 2016 ssl.sh: #7746: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:57 EST 2016 ssl.sh: #7747: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:57 EST 2016 ssl.sh: #7748: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:58 EST 2016 ssl.sh: #7749: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:59 EST 2016 ssl.sh: #7750: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:17:59 EST 2016 ssl.sh: #7751: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:18:00 EST 2016 ssl.sh: #7752: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:18:00 EST 2016 ssl.sh: #7753: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:18:01 EST 2016 ssl.sh: #7754: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:18:01 EST 2016 ssl.sh: #7755: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24868 found at Fri Jan 8 06:18:02 EST 2016 ssl.sh: #7756: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 24868 at Fri Jan 8 06:18:02 EST 2016 kill -USR1 24868 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24868 killed at Fri Jan 8 06:18:03 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:18:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:18:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:18:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7757: Waiting for Server - FAILED kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:08 EST 2016 selfserv_9591 with PID 26306 started at Fri Jan 8 06:18:09 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:09 EST 2016 ssl.sh: #7758: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:10 EST 2016 ssl.sh: #7759: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:10 EST 2016 ssl.sh: #7760: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:11 EST 2016 ssl.sh: #7761: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:11 EST 2016 ssl.sh: #7762: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:12 EST 2016 ssl.sh: #7763: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:12 EST 2016 ssl.sh: #7764: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:13 EST 2016 ssl.sh: #7765: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:13 EST 2016 ssl.sh: #7766: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:14 EST 2016 ssl.sh: #7767: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:15 EST 2016 ssl.sh: #7768: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:15 EST 2016 ssl.sh: #7769: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:16 EST 2016 ssl.sh: #7770: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:16 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7771: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:17 EST 2016 ssl.sh: #7772: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:17 EST 2016 ssl.sh: #7773: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:18 EST 2016 ssl.sh: #7774: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:18 EST 2016 ssl.sh: #7775: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:19 EST 2016 ssl.sh: #7776: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:20 EST 2016 ssl.sh: #7777: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:20 EST 2016 ssl.sh: #7778: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:21 EST 2016 ssl.sh: #7779: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:21 EST 2016 ssl.sh: #7780: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:22 EST 2016 ssl.sh: #7781: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:22 EST 2016 ssl.sh: #7782: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:23 EST 2016 ssl.sh: #7783: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:24 EST 2016 ssl.sh: #7784: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:24 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7785: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:25 EST 2016 ssl.sh: #7786: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:25 EST 2016 ssl.sh: #7787: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:26 EST 2016 ssl.sh: #7788: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:26 EST 2016 ssl.sh: #7789: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:27 EST 2016 ssl.sh: #7790: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:27 EST 2016 ssl.sh: #7791: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:28 EST 2016 ssl.sh: #7792: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:29 EST 2016 ssl.sh: #7793: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:29 EST 2016 ssl.sh: #7794: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:30 EST 2016 ssl.sh: #7795: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:30 EST 2016 ssl.sh: #7796: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:31 EST 2016 ssl.sh: #7797: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26306 found at Fri Jan 8 06:18:31 EST 2016 ssl.sh: #7798: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26306 at Fri Jan 8 06:18:31 EST 2016 kill -USR1 26306 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26306 killed at Fri Jan 8 06:18:32 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:18:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:18:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:18:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7799: Waiting for Server - FAILED kill -0 27746 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27746 found at Fri Jan 8 06:18:38 EST 2016 selfserv_9591 with PID 27746 started at Fri Jan 8 06:18:38 EST 2016 trying to kill selfserv_9591 with PID 27746 at Fri Jan 8 06:18:38 EST 2016 kill -USR1 27746 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27746 killed at Fri Jan 8 06:18:38 EST 2016 ssl.sh: SSL Cipher Coverage - server bypass/client bypass - with ECC =============================== selfserv_9591 starting at Fri Jan 8 06:18:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:18:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:18:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7800: Waiting for Server - FAILED kill -0 27806 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:44 EST 2016 selfserv_9591 with PID 27806 started at Fri Jan 8 06:18:44 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7801: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7802: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7803: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7804: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7805: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7806: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7807: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7808: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7809: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7810: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7811: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7812: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7813: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7814: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7815: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7816: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7817: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7818: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7819: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7820: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7821: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7822: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7823: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7824: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7825: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7826: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:18:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7827: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7828: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7829: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7830: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7831: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7832: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7833: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7834: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7835: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7836: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7837: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7838: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7839: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7840: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7841: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7842: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7843: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7844: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7845: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7846: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7847: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7848: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7849: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7850: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7851: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7852: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7853: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7854: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7855: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7856: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7857: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7858: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7859: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7860: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7861: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7862: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7863: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7864: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7865: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7866: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7867: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 27806 >/dev/null 2>/dev/null selfserv_9591 with PID 27806 found at Fri Jan 8 06:19:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7868: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 27806 at Fri Jan 8 06:19:21 EST 2016 kill -USR1 27806 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27806 killed at Fri Jan 8 06:19:21 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 06:19:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:19:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:19:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7869: Waiting for Server - FAILED kill -0 29905 >/dev/null 2>/dev/null selfserv_9591 with PID 29905 found at Fri Jan 8 06:19:27 EST 2016 selfserv_9591 with PID 29905 started at Fri Jan 8 06:19:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7870: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29905 >/dev/null 2>/dev/null selfserv_9591 with PID 29905 found at Fri Jan 8 06:19:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7871: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29905 >/dev/null 2>/dev/null selfserv_9591 with PID 29905 found at Fri Jan 8 06:19:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7872: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29905 >/dev/null 2>/dev/null selfserv_9591 with PID 29905 found at Fri Jan 8 06:19:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7873: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29905 >/dev/null 2>/dev/null selfserv_9591 with PID 29905 found at Fri Jan 8 06:19:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7874: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 29905 at Fri Jan 8 06:19:30 EST 2016 kill -USR1 29905 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29905 killed at Fri Jan 8 06:19:30 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 06:19:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:19:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:19:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7875: Waiting for Server - FAILED kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:36 EST 2016 selfserv_9591 with PID 30071 started at Fri Jan 8 06:19:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7876: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7877: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7878: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7879: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7880: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7881: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7882: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7883: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7884: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7885: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7886: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7887: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7888: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7889: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 30071 >/dev/null 2>/dev/null selfserv_9591 with PID 30071 found at Fri Jan 8 06:19:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7890: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 30071 at Fri Jan 8 06:19:44 EST 2016 kill -USR1 30071 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30071 killed at Fri Jan 8 06:19:45 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 06:19:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:19:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:19:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7891: Waiting for Server - FAILED kill -0 30486 >/dev/null 2>/dev/null selfserv_9591 with PID 30486 found at Fri Jan 8 06:19:51 EST 2016 selfserv_9591 with PID 30486 started at Fri Jan 8 06:19:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7892: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 30486 >/dev/null 2>/dev/null selfserv_9591 with PID 30486 found at Fri Jan 8 06:19:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7893: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30486 >/dev/null 2>/dev/null selfserv_9591 with PID 30486 found at Fri Jan 8 06:19:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7894: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 30486 >/dev/null 2>/dev/null selfserv_9591 with PID 30486 found at Fri Jan 8 06:19:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7895: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 30486 >/dev/null 2>/dev/null selfserv_9591 with PID 30486 found at Fri Jan 8 06:19:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7896: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 30486 at Fri Jan 8 06:19:53 EST 2016 kill -USR1 30486 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30486 killed at Fri Jan 8 06:19:54 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 06:19:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:19:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:19:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7897: Waiting for Server - FAILED kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:00 EST 2016 selfserv_9591 with PID 30651 started at Fri Jan 8 06:20:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7898: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7899: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7900: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7901: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7902: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7903: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7904: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7905: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7906: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7907: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7908: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7909: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7910: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7911: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 30651 >/dev/null 2>/dev/null selfserv_9591 with PID 30651 found at Fri Jan 8 06:20:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7912: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 30651 at Fri Jan 8 06:20:07 EST 2016 kill -USR1 30651 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30651 killed at Fri Jan 8 06:20:08 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 06:20:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:20:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:20:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7913: Waiting for Server - FAILED kill -0 31066 >/dev/null 2>/dev/null selfserv_9591 with PID 31066 found at Fri Jan 8 06:20:14 EST 2016 selfserv_9591 with PID 31066 started at Fri Jan 8 06:20:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7914: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 31066 >/dev/null 2>/dev/null selfserv_9591 with PID 31066 found at Fri Jan 8 06:20:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7915: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 31066 >/dev/null 2>/dev/null selfserv_9591 with PID 31066 found at Fri Jan 8 06:20:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7916: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 31066 >/dev/null 2>/dev/null selfserv_9591 with PID 31066 found at Fri Jan 8 06:20:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7917: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 31066 >/dev/null 2>/dev/null selfserv_9591 with PID 31066 found at Fri Jan 8 06:20:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7918: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 31066 at Fri Jan 8 06:20:16 EST 2016 kill -USR1 31066 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31066 killed at Fri Jan 8 06:20:17 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 06:20:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:20:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:20:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7919: Waiting for Server - FAILED kill -0 31232 >/dev/null 2>/dev/null selfserv_9591 with PID 31232 found at Fri Jan 8 06:20:23 EST 2016 selfserv_9591 with PID 31232 started at Fri Jan 8 06:20:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 31232 >/dev/null 2>/dev/null selfserv_9591 with PID 31232 found at Fri Jan 8 06:20:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 31232 >/dev/null 2>/dev/null selfserv_9591 with PID 31232 found at Fri Jan 8 06:20:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 31232 >/dev/null 2>/dev/null selfserv_9591 with PID 31232 found at Fri Jan 8 06:20:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 31232 >/dev/null 2>/dev/null selfserv_9591 with PID 31232 found at Fri Jan 8 06:20:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 31232 >/dev/null 2>/dev/null selfserv_9591 with PID 31232 found at Fri Jan 8 06:20:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 31232 >/dev/null 2>/dev/null selfserv_9591 with PID 31232 found at Fri Jan 8 06:20:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7926: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 31232 >/dev/null 2>/dev/null selfserv_9591 with PID 31232 found at Fri Jan 8 06:20:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 31232 >/dev/null 2>/dev/null selfserv_9591 with PID 31232 found at Fri Jan 8 06:20:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7928: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 31232 >/dev/null 2>/dev/null selfserv_9591 with PID 31232 found at Fri Jan 8 06:20:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 31232 >/dev/null 2>/dev/null selfserv_9591 with PID 31232 found at Fri Jan 8 06:20:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7930: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 31232 >/dev/null 2>/dev/null selfserv_9591 with PID 31232 found at Fri Jan 8 06:20:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 31232 >/dev/null 2>/dev/null selfserv_9591 with PID 31232 found at Fri Jan 8 06:20:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7932: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31232 at Fri Jan 8 06:20:29 EST 2016 kill -USR1 31232 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31232 killed at Fri Jan 8 06:20:30 EST 2016 ssl.sh: SSL Client Authentication - server bypass/client bypass - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:20:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:20:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:20:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7933: Waiting for Server - FAILED kill -0 31640 >/dev/null 2>/dev/null selfserv_9591 with PID 31640 found at Fri Jan 8 06:20:36 EST 2016 selfserv_9591 with PID 31640 started at Fri Jan 8 06:20:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7934: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31640 at Fri Jan 8 06:20:36 EST 2016 kill -USR1 31640 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31640 killed at Fri Jan 8 06:20:37 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:20:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:20:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:20:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7935: Waiting for Server - FAILED kill -0 31712 >/dev/null 2>/dev/null selfserv_9591 with PID 31712 found at Fri Jan 8 06:20:43 EST 2016 selfserv_9591 with PID 31712 started at Fri Jan 8 06:20:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7936: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31712 at Fri Jan 8 06:20:43 EST 2016 kill -USR1 31712 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31712 killed at Fri Jan 8 06:20:44 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:20:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:20:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:20:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7937: Waiting for Server - FAILED kill -0 31781 >/dev/null 2>/dev/null selfserv_9591 with PID 31781 found at Fri Jan 8 06:20:50 EST 2016 selfserv_9591 with PID 31781 started at Fri Jan 8 06:20:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7938: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31781 at Fri Jan 8 06:20:50 EST 2016 kill -USR1 31781 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31781 killed at Fri Jan 8 06:20:51 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:20:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:20:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:20:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7939: Waiting for Server - FAILED kill -0 31851 >/dev/null 2>/dev/null selfserv_9591 with PID 31851 found at Fri Jan 8 06:20:57 EST 2016 selfserv_9591 with PID 31851 started at Fri Jan 8 06:20:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7940: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31851 at Fri Jan 8 06:20:57 EST 2016 kill -USR1 31851 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31851 killed at Fri Jan 8 06:20:58 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:20:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:20:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:21:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7941: Waiting for Server - FAILED kill -0 31920 >/dev/null 2>/dev/null selfserv_9591 with PID 31920 found at Fri Jan 8 06:21:04 EST 2016 selfserv_9591 with PID 31920 started at Fri Jan 8 06:21:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31920 at Fri Jan 8 06:21:04 EST 2016 kill -USR1 31920 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31920 killed at Fri Jan 8 06:21:05 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:21:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:21:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:21:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7943: Waiting for Server - FAILED kill -0 31990 >/dev/null 2>/dev/null selfserv_9591 with PID 31990 found at Fri Jan 8 06:21:11 EST 2016 selfserv_9591 with PID 31990 started at Fri Jan 8 06:21:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7944: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31990 at Fri Jan 8 06:21:11 EST 2016 kill -USR1 31990 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31990 killed at Fri Jan 8 06:21:11 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:21:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:21:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:21:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7945: Waiting for Server - FAILED kill -0 32062 >/dev/null 2>/dev/null selfserv_9591 with PID 32062 found at Fri Jan 8 06:21:17 EST 2016 selfserv_9591 with PID 32062 started at Fri Jan 8 06:21:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7946: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32062 at Fri Jan 8 06:21:18 EST 2016 kill -USR1 32062 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32062 killed at Fri Jan 8 06:21:18 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:21:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:21:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:21:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7947: Waiting for Server - FAILED kill -0 32132 >/dev/null 2>/dev/null selfserv_9591 with PID 32132 found at Fri Jan 8 06:21:24 EST 2016 selfserv_9591 with PID 32132 started at Fri Jan 8 06:21:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7948: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32132 at Fri Jan 8 06:21:25 EST 2016 kill -USR1 32132 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32132 killed at Fri Jan 8 06:21:25 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:21:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:21:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:21:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7949: Waiting for Server - FAILED kill -0 32201 >/dev/null 2>/dev/null selfserv_9591 with PID 32201 found at Fri Jan 8 06:21:31 EST 2016 selfserv_9591 with PID 32201 started at Fri Jan 8 06:21:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7950: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32201 at Fri Jan 8 06:21:32 EST 2016 kill -USR1 32201 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32201 killed at Fri Jan 8 06:21:32 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:21:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:21:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:21:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7951: Waiting for Server - FAILED kill -0 32271 >/dev/null 2>/dev/null selfserv_9591 with PID 32271 found at Fri Jan 8 06:21:38 EST 2016 selfserv_9591 with PID 32271 started at Fri Jan 8 06:21:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7952: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32271 at Fri Jan 8 06:21:39 EST 2016 kill -USR1 32271 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32271 killed at Fri Jan 8 06:21:39 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:21:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:21:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:21:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7953: Waiting for Server - FAILED kill -0 32340 >/dev/null 2>/dev/null selfserv_9591 with PID 32340 found at Fri Jan 8 06:21:45 EST 2016 selfserv_9591 with PID 32340 started at Fri Jan 8 06:21:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7954: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32340 at Fri Jan 8 06:21:46 EST 2016 kill -USR1 32340 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32340 killed at Fri Jan 8 06:21:46 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:21:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:21:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:21:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7955: Waiting for Server - FAILED kill -0 32409 >/dev/null 2>/dev/null selfserv_9591 with PID 32409 found at Fri Jan 8 06:21:52 EST 2016 selfserv_9591 with PID 32409 started at Fri Jan 8 06:21:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7956: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32409 at Fri Jan 8 06:21:52 EST 2016 kill -USR1 32409 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32409 killed at Fri Jan 8 06:21:53 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:21:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:21:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:21:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7957: Waiting for Server - FAILED kill -0 32479 >/dev/null 2>/dev/null selfserv_9591 with PID 32479 found at Fri Jan 8 06:21:59 EST 2016 selfserv_9591 with PID 32479 started at Fri Jan 8 06:21:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7958: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32479 at Fri Jan 8 06:21:59 EST 2016 kill -USR1 32479 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32479 killed at Fri Jan 8 06:22:00 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:22:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:22:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:22:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7959: Waiting for Server - FAILED kill -0 32548 >/dev/null 2>/dev/null selfserv_9591 with PID 32548 found at Fri Jan 8 06:22:06 EST 2016 selfserv_9591 with PID 32548 started at Fri Jan 8 06:22:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7960: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32548 at Fri Jan 8 06:22:06 EST 2016 kill -USR1 32548 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32548 killed at Fri Jan 8 06:22:07 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:22:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:22:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:22:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7961: Waiting for Server - FAILED kill -0 32617 >/dev/null 2>/dev/null selfserv_9591 with PID 32617 found at Fri Jan 8 06:22:13 EST 2016 selfserv_9591 with PID 32617 started at Fri Jan 8 06:22:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7962: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32617 at Fri Jan 8 06:22:13 EST 2016 kill -USR1 32617 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32617 killed at Fri Jan 8 06:22:14 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:22:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:22:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:22:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7963: Waiting for Server - FAILED kill -0 32687 >/dev/null 2>/dev/null selfserv_9591 with PID 32687 found at Fri Jan 8 06:22:20 EST 2016 selfserv_9591 with PID 32687 started at Fri Jan 8 06:22:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7964: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32687 at Fri Jan 8 06:22:20 EST 2016 kill -USR1 32687 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32687 killed at Fri Jan 8 06:22:21 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:22:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:22:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:22:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7965: Waiting for Server - FAILED kill -0 32756 >/dev/null 2>/dev/null selfserv_9591 with PID 32756 found at Fri Jan 8 06:22:27 EST 2016 selfserv_9591 with PID 32756 started at Fri Jan 8 06:22:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7966: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32756 at Fri Jan 8 06:22:27 EST 2016 kill -USR1 32756 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32756 killed at Fri Jan 8 06:22:27 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:22:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:22:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:22:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7967: Waiting for Server - FAILED kill -0 358 >/dev/null 2>/dev/null selfserv_9591 with PID 358 found at Fri Jan 8 06:22:33 EST 2016 selfserv_9591 with PID 358 started at Fri Jan 8 06:22:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7968: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 358 at Fri Jan 8 06:22:34 EST 2016 kill -USR1 358 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 358 killed at Fri Jan 8 06:22:34 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:22:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:22:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:22:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7969: Waiting for Server - FAILED kill -0 431 >/dev/null 2>/dev/null selfserv_9591 with PID 431 found at Fri Jan 8 06:22:40 EST 2016 selfserv_9591 with PID 431 started at Fri Jan 8 06:22:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7970: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 431 at Fri Jan 8 06:22:41 EST 2016 kill -USR1 431 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 431 killed at Fri Jan 8 06:22:41 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:22:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:22:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:22:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7971: Waiting for Server - FAILED kill -0 520 >/dev/null 2>/dev/null selfserv_9591 with PID 520 found at Fri Jan 8 06:22:47 EST 2016 selfserv_9591 with PID 520 started at Fri Jan 8 06:22:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7972: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 520 at Fri Jan 8 06:22:48 EST 2016 kill -USR1 520 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 520 killed at Fri Jan 8 06:22:48 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:22:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:22:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:22:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7973: Waiting for Server - FAILED kill -0 591 >/dev/null 2>/dev/null selfserv_9591 with PID 591 found at Fri Jan 8 06:22:54 EST 2016 selfserv_9591 with PID 591 started at Fri Jan 8 06:22:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7974: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 591 at Fri Jan 8 06:22:55 EST 2016 kill -USR1 591 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 591 killed at Fri Jan 8 06:22:55 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:22:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:22:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:23:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7975: Waiting for Server - FAILED kill -0 664 >/dev/null 2>/dev/null selfserv_9591 with PID 664 found at Fri Jan 8 06:23:01 EST 2016 selfserv_9591 with PID 664 started at Fri Jan 8 06:23:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7976: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 664 at Fri Jan 8 06:23:02 EST 2016 kill -USR1 664 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 664 killed at Fri Jan 8 06:23:02 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:23:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:23:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:23:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7977: Waiting for Server - FAILED kill -0 733 >/dev/null 2>/dev/null selfserv_9591 with PID 733 found at Fri Jan 8 06:23:08 EST 2016 selfserv_9591 with PID 733 started at Fri Jan 8 06:23:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7978: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 733 at Fri Jan 8 06:23:09 EST 2016 kill -USR1 733 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 733 killed at Fri Jan 8 06:23:09 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:23:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:23:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:23:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7979: Waiting for Server - FAILED kill -0 803 >/dev/null 2>/dev/null selfserv_9591 with PID 803 found at Fri Jan 8 06:23:15 EST 2016 selfserv_9591 with PID 803 started at Fri Jan 8 06:23:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7980: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 803 at Fri Jan 8 06:23:15 EST 2016 kill -USR1 803 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 803 killed at Fri Jan 8 06:23:16 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:23:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:23:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:23:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7981: Waiting for Server - FAILED kill -0 872 >/dev/null 2>/dev/null selfserv_9591 with PID 872 found at Fri Jan 8 06:23:22 EST 2016 selfserv_9591 with PID 872 started at Fri Jan 8 06:23:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7982: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 872 at Fri Jan 8 06:23:22 EST 2016 kill -USR1 872 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 872 killed at Fri Jan 8 06:23:23 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:23:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:23:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:23:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7983: Waiting for Server - FAILED kill -0 941 >/dev/null 2>/dev/null selfserv_9591 with PID 941 found at Fri Jan 8 06:23:29 EST 2016 selfserv_9591 with PID 941 started at Fri Jan 8 06:23:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7984: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 941 at Fri Jan 8 06:23:29 EST 2016 kill -USR1 941 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 941 killed at Fri Jan 8 06:23:30 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:23:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:23:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:23:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7985: Waiting for Server - FAILED kill -0 1011 >/dev/null 2>/dev/null selfserv_9591 with PID 1011 found at Fri Jan 8 06:23:36 EST 2016 selfserv_9591 with PID 1011 started at Fri Jan 8 06:23:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7986: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1011 at Fri Jan 8 06:23:36 EST 2016 kill -USR1 1011 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1011 killed at Fri Jan 8 06:23:37 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:23:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:23:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:23:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7987: Waiting for Server - FAILED kill -0 1080 >/dev/null 2>/dev/null selfserv_9591 with PID 1080 found at Fri Jan 8 06:23:43 EST 2016 selfserv_9591 with PID 1080 started at Fri Jan 8 06:23:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7988: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1080 at Fri Jan 8 06:23:43 EST 2016 kill -USR1 1080 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1080 killed at Fri Jan 8 06:23:44 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:23:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:23:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:23:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7989: Waiting for Server - FAILED kill -0 1152 >/dev/null 2>/dev/null selfserv_9591 with PID 1152 found at Fri Jan 8 06:23:49 EST 2016 selfserv_9591 with PID 1152 started at Fri Jan 8 06:23:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7990: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1152 at Fri Jan 8 06:23:50 EST 2016 kill -USR1 1152 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1152 killed at Fri Jan 8 06:23:50 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:23:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:23:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:23:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7991: Waiting for Server - FAILED kill -0 1222 >/dev/null 2>/dev/null selfserv_9591 with PID 1222 found at Fri Jan 8 06:23:56 EST 2016 selfserv_9591 with PID 1222 started at Fri Jan 8 06:23:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7992: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1222 at Fri Jan 8 06:23:57 EST 2016 kill -USR1 1222 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1222 killed at Fri Jan 8 06:23:57 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:23:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:23:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:24:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7993: Waiting for Server - FAILED kill -0 1306 >/dev/null 2>/dev/null selfserv_9591 with PID 1306 found at Fri Jan 8 06:24:03 EST 2016 selfserv_9591 with PID 1306 started at Fri Jan 8 06:24:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7994: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1306 at Fri Jan 8 06:24:04 EST 2016 kill -USR1 1306 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1306 killed at Fri Jan 8 06:24:04 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:24:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:24:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:24:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7995: Waiting for Server - FAILED kill -0 1375 >/dev/null 2>/dev/null selfserv_9591 with PID 1375 found at Fri Jan 8 06:24:10 EST 2016 selfserv_9591 with PID 1375 started at Fri Jan 8 06:24:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7996: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1375 at Fri Jan 8 06:24:11 EST 2016 kill -USR1 1375 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1375 killed at Fri Jan 8 06:24:11 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:24:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:24:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:24:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7997: Waiting for Server - FAILED kill -0 1445 >/dev/null 2>/dev/null selfserv_9591 with PID 1445 found at Fri Jan 8 06:24:17 EST 2016 selfserv_9591 with PID 1445 started at Fri Jan 8 06:24:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7998: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1445 at Fri Jan 8 06:24:18 EST 2016 kill -USR1 1445 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1445 killed at Fri Jan 8 06:24:18 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:24:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:24:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:24:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7999: Waiting for Server - FAILED kill -0 1514 >/dev/null 2>/dev/null selfserv_9591 with PID 1514 found at Fri Jan 8 06:24:24 EST 2016 selfserv_9591 with PID 1514 started at Fri Jan 8 06:24:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8000: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1514 at Fri Jan 8 06:24:25 EST 2016 kill -USR1 1514 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1514 killed at Fri Jan 8 06:24:25 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:24:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:24:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:24:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8001: Waiting for Server - FAILED kill -0 1583 >/dev/null 2>/dev/null selfserv_9591 with PID 1583 found at Fri Jan 8 06:24:31 EST 2016 selfserv_9591 with PID 1583 started at Fri Jan 8 06:24:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8002: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1583 at Fri Jan 8 06:24:32 EST 2016 kill -USR1 1583 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1583 killed at Fri Jan 8 06:24:32 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:24:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:24:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:24:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8003: Waiting for Server - FAILED kill -0 1653 >/dev/null 2>/dev/null selfserv_9591 with PID 1653 found at Fri Jan 8 06:24:38 EST 2016 selfserv_9591 with PID 1653 started at Fri Jan 8 06:24:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8004: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1653 at Fri Jan 8 06:24:38 EST 2016 kill -USR1 1653 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1653 killed at Fri Jan 8 06:24:39 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:24:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:24:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:24:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8005: Waiting for Server - FAILED kill -0 1722 >/dev/null 2>/dev/null selfserv_9591 with PID 1722 found at Fri Jan 8 06:24:45 EST 2016 selfserv_9591 with PID 1722 started at Fri Jan 8 06:24:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8006: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1722 at Fri Jan 8 06:24:45 EST 2016 kill -USR1 1722 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1722 killed at Fri Jan 8 06:24:46 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:24:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:24:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:24:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8007: Waiting for Server - FAILED kill -0 1791 >/dev/null 2>/dev/null selfserv_9591 with PID 1791 found at Fri Jan 8 06:24:52 EST 2016 selfserv_9591 with PID 1791 started at Fri Jan 8 06:24:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8008: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1791 at Fri Jan 8 06:24:52 EST 2016 kill -USR1 1791 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1791 killed at Fri Jan 8 06:24:53 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:24:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:24:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:24:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8009: Waiting for Server - FAILED kill -0 1866 >/dev/null 2>/dev/null selfserv_9591 with PID 1866 found at Fri Jan 8 06:24:59 EST 2016 selfserv_9591 with PID 1866 started at Fri Jan 8 06:24:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8010: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1866 at Fri Jan 8 06:24:59 EST 2016 kill -USR1 1866 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1866 killed at Fri Jan 8 06:25:00 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:25:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:25:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:25:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8011: Waiting for Server - FAILED kill -0 1935 >/dev/null 2>/dev/null selfserv_9591 with PID 1935 found at Fri Jan 8 06:25:06 EST 2016 selfserv_9591 with PID 1935 started at Fri Jan 8 06:25:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8012: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 1935 at Fri Jan 8 06:25:06 EST 2016 kill -USR1 1935 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1935 killed at Fri Jan 8 06:25:07 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:25:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:25:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:25:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8013: Waiting for Server - FAILED kill -0 2004 >/dev/null 2>/dev/null selfserv_9591 with PID 2004 found at Fri Jan 8 06:25:12 EST 2016 selfserv_9591 with PID 2004 started at Fri Jan 8 06:25:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8014: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2004 at Fri Jan 8 06:25:13 EST 2016 kill -USR1 2004 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2004 killed at Fri Jan 8 06:25:13 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:25:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:25:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:25:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8015: Waiting for Server - FAILED kill -0 2074 >/dev/null 2>/dev/null selfserv_9591 with PID 2074 found at Fri Jan 8 06:25:19 EST 2016 selfserv_9591 with PID 2074 started at Fri Jan 8 06:25:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8016: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2074 at Fri Jan 8 06:25:20 EST 2016 kill -USR1 2074 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2074 killed at Fri Jan 8 06:25:20 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:25:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:25:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:25:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8017: Waiting for Server - FAILED kill -0 2144 >/dev/null 2>/dev/null selfserv_9591 with PID 2144 found at Fri Jan 8 06:25:26 EST 2016 selfserv_9591 with PID 2144 started at Fri Jan 8 06:25:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8018: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2144 at Fri Jan 8 06:25:27 EST 2016 kill -USR1 2144 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2144 killed at Fri Jan 8 06:25:27 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:25:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:25:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:25:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8019: Waiting for Server - FAILED kill -0 2213 >/dev/null 2>/dev/null selfserv_9591 with PID 2213 found at Fri Jan 8 06:25:33 EST 2016 selfserv_9591 with PID 2213 started at Fri Jan 8 06:25:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8020: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2213 at Fri Jan 8 06:25:34 EST 2016 kill -USR1 2213 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2213 killed at Fri Jan 8 06:25:34 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:25:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:25:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:25:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8021: Waiting for Server - FAILED kill -0 2283 >/dev/null 2>/dev/null selfserv_9591 with PID 2283 found at Fri Jan 8 06:25:40 EST 2016 selfserv_9591 with PID 2283 started at Fri Jan 8 06:25:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8022: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2283 at Fri Jan 8 06:25:41 EST 2016 kill -USR1 2283 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2283 killed at Fri Jan 8 06:25:41 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:25:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:25:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:25:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8023: Waiting for Server - FAILED kill -0 2352 >/dev/null 2>/dev/null selfserv_9591 with PID 2352 found at Fri Jan 8 06:25:47 EST 2016 selfserv_9591 with PID 2352 started at Fri Jan 8 06:25:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8024: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2352 at Fri Jan 8 06:25:48 EST 2016 kill -USR1 2352 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2352 killed at Fri Jan 8 06:25:48 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:25:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:25:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:25:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8025: Waiting for Server - FAILED kill -0 2421 >/dev/null 2>/dev/null selfserv_9591 with PID 2421 found at Fri Jan 8 06:25:54 EST 2016 selfserv_9591 with PID 2421 started at Fri Jan 8 06:25:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8026: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2421 at Fri Jan 8 06:25:54 EST 2016 kill -USR1 2421 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2421 killed at Fri Jan 8 06:25:55 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:25:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:25:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:26:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8027: Waiting for Server - FAILED kill -0 2491 >/dev/null 2>/dev/null selfserv_9591 with PID 2491 found at Fri Jan 8 06:26:01 EST 2016 selfserv_9591 with PID 2491 started at Fri Jan 8 06:26:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8028: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2491 at Fri Jan 8 06:26:01 EST 2016 kill -USR1 2491 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2491 killed at Fri Jan 8 06:26:02 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:26:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:26:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:26:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8029: Waiting for Server - FAILED kill -0 2560 >/dev/null 2>/dev/null selfserv_9591 with PID 2560 found at Fri Jan 8 06:26:08 EST 2016 selfserv_9591 with PID 2560 started at Fri Jan 8 06:26:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8030: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2560 at Fri Jan 8 06:26:08 EST 2016 kill -USR1 2560 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2560 killed at Fri Jan 8 06:26:09 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:26:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:26:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:26:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8031: Waiting for Server - FAILED kill -0 2629 >/dev/null 2>/dev/null selfserv_9591 with PID 2629 found at Fri Jan 8 06:26:15 EST 2016 selfserv_9591 with PID 2629 started at Fri Jan 8 06:26:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8032: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2629 at Fri Jan 8 06:26:15 EST 2016 kill -USR1 2629 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2629 killed at Fri Jan 8 06:26:16 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 06:26:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:26:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:26:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8033: Waiting for Server - FAILED kill -0 2720 >/dev/null 2>/dev/null selfserv_9591 with PID 2720 found at Fri Jan 8 06:26:22 EST 2016 selfserv_9591 with PID 2720 started at Fri Jan 8 06:26:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8034: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2720 at Fri Jan 8 06:26:22 EST 2016 kill -USR1 2720 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2720 killed at Fri Jan 8 06:26:23 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9591 starting at Fri Jan 8 06:26:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:26:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:26:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8035: Waiting for Server - FAILED kill -0 2795 >/dev/null 2>/dev/null selfserv_9591 with PID 2795 found at Fri Jan 8 06:26:29 EST 2016 selfserv_9591 with PID 2795 started at Fri Jan 8 06:26:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8036: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2795 at Fri Jan 8 06:26:29 EST 2016 kill -USR1 2795 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2795 killed at Fri Jan 8 06:26:30 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9591 starting at Fri Jan 8 06:26:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:26:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:26:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8037: Waiting for Server - FAILED kill -0 2870 >/dev/null 2>/dev/null selfserv_9591 with PID 2870 found at Fri Jan 8 06:26:36 EST 2016 selfserv_9591 with PID 2870 started at Fri Jan 8 06:26:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8038: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2870 at Fri Jan 8 06:26:36 EST 2016 kill -USR1 2870 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2870 killed at Fri Jan 8 06:26:37 EST 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 06:26:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:26:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:26:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8039: Waiting for Server - FAILED kill -0 2946 >/dev/null 2>/dev/null selfserv_9591 with PID 2946 found at Fri Jan 8 06:26:43 EST 2016 selfserv_9591 with PID 2946 started at Fri Jan 8 06:26:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8040: SSL3 Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 2946 at Fri Jan 8 06:26:43 EST 2016 kill -USR1 2946 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2946 killed at Fri Jan 8 06:26:43 EST 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9591 starting at Fri Jan 8 06:26:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:26:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:26:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8041: Waiting for Server - FAILED kill -0 3021 >/dev/null 2>/dev/null selfserv_9591 with PID 3021 found at Fri Jan 8 06:26:49 EST 2016 selfserv_9591 with PID 3021 started at Fri Jan 8 06:26:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c vssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8042: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3021 at Fri Jan 8 06:26:50 EST 2016 kill -USR1 3021 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3021 killed at Fri Jan 8 06:26:50 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9591 starting at Fri Jan 8 06:26:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:26:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:26:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8043: Waiting for Server - FAILED kill -0 3096 >/dev/null 2>/dev/null selfserv_9591 with PID 3096 found at Fri Jan 8 06:26:56 EST 2016 selfserv_9591 with PID 3096 started at Fri Jan 8 06:26:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8044: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3096 at Fri Jan 8 06:26:57 EST 2016 kill -USR1 3096 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3096 killed at Fri Jan 8 06:26:57 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9591 starting at Fri Jan 8 06:26:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:26:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:27:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8045: Waiting for Server - FAILED kill -0 3172 >/dev/null 2>/dev/null selfserv_9591 with PID 3172 found at Fri Jan 8 06:27:03 EST 2016 selfserv_9591 with PID 3172 started at Fri Jan 8 06:27:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8046: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3172 at Fri Jan 8 06:27:04 EST 2016 kill -USR1 3172 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3172 killed at Fri Jan 8 06:27:04 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9591 starting at Fri Jan 8 06:27:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:27:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:27:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8047: Waiting for Server - FAILED kill -0 3247 >/dev/null 2>/dev/null selfserv_9591 with PID 3247 found at Fri Jan 8 06:27:10 EST 2016 selfserv_9591 with PID 3247 started at Fri Jan 8 06:27:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8048: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3247 at Fri Jan 8 06:27:11 EST 2016 kill -USR1 3247 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3247 killed at Fri Jan 8 06:27:11 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9591 starting at Fri Jan 8 06:27:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:27:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:27:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8049: Waiting for Server - FAILED kill -0 3322 >/dev/null 2>/dev/null selfserv_9591 with PID 3322 found at Fri Jan 8 06:27:17 EST 2016 selfserv_9591 with PID 3322 started at Fri Jan 8 06:27:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8050: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3322 at Fri Jan 8 06:27:18 EST 2016 kill -USR1 3322 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3322 killed at Fri Jan 8 06:27:18 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9591 starting at Fri Jan 8 06:27:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:27:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:27:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8051: Waiting for Server - FAILED kill -0 3398 >/dev/null 2>/dev/null selfserv_9591 with PID 3398 found at Fri Jan 8 06:27:24 EST 2016 selfserv_9591 with PID 3398 started at Fri Jan 8 06:27:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8052: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 3398 at Fri Jan 8 06:27:25 EST 2016 kill -USR1 3398 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3398 killed at Fri Jan 8 06:27:25 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server bypass/client bypass - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9591 starting at Fri Jan 8 06:27:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:27:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:27:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8053: Waiting for Server - FAILED kill -0 3459 >/dev/null 2>/dev/null selfserv_9591 with PID 3459 found at Fri Jan 8 06:27:31 EST 2016 selfserv_9591 with PID 3459 started at Fri Jan 8 06:27:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8054: OCSP stapling, signed response, good status produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 3459 at Fri Jan 8 06:27:32 EST 2016 kill -USR1 3459 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3459 killed at Fri Jan 8 06:27:32 EST 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9591 starting at Fri Jan 8 06:27:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:27:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:27:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8055: Waiting for Server - FAILED kill -0 3522 >/dev/null 2>/dev/null selfserv_9591 with PID 3522 found at Fri Jan 8 06:27:38 EST 2016 selfserv_9591 with PID 3522 started at Fri Jan 8 06:27:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8056: OCSP stapling, signed response, revoked status produced a returncode of 1, expected is 3 - FAILED trying to kill selfserv_9591 with PID 3522 at Fri Jan 8 06:27:38 EST 2016 kill -USR1 3522 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3522 killed at Fri Jan 8 06:27:39 EST 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9591 starting at Fri Jan 8 06:27:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:27:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:27:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8057: Waiting for Server - FAILED kill -0 3584 >/dev/null 2>/dev/null selfserv_9591 with PID 3584 found at Fri Jan 8 06:27:45 EST 2016 selfserv_9591 with PID 3584 started at Fri Jan 8 06:27:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8058: OCSP stapling, signed response, unknown status produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 3584 at Fri Jan 8 06:27:45 EST 2016 kill -USR1 3584 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3584 killed at Fri Jan 8 06:27:46 EST 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9591 starting at Fri Jan 8 06:27:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:27:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:27:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8059: Waiting for Server - FAILED kill -0 3645 >/dev/null 2>/dev/null selfserv_9591 with PID 3645 found at Fri Jan 8 06:27:52 EST 2016 selfserv_9591 with PID 3645 started at Fri Jan 8 06:27:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8060: OCSP stapling, unsigned failure response produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 3645 at Fri Jan 8 06:27:52 EST 2016 kill -USR1 3645 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3645 killed at Fri Jan 8 06:27:53 EST 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9591 starting at Fri Jan 8 06:27:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:27:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:27:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8061: Waiting for Server - FAILED kill -0 3706 >/dev/null 2>/dev/null selfserv_9591 with PID 3706 found at Fri Jan 8 06:27:59 EST 2016 selfserv_9591 with PID 3706 started at Fri Jan 8 06:27:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8062: OCSP stapling, good status, bad signature produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 3706 at Fri Jan 8 06:27:59 EST 2016 kill -USR1 3706 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3706 killed at Fri Jan 8 06:27:59 EST 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9591 starting at Fri Jan 8 06:28:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:28:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:28:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8063: Waiting for Server - FAILED kill -0 3768 >/dev/null 2>/dev/null selfserv_9591 with PID 3768 found at Fri Jan 8 06:28:05 EST 2016 selfserv_9591 with PID 3768 started at Fri Jan 8 06:28:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8064: OCSP stapling, invalid cert status data produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 3768 at Fri Jan 8 06:28:06 EST 2016 kill -USR1 3768 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3768 killed at Fri Jan 8 06:28:06 EST 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9591 starting at Fri Jan 8 06:28:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:28:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:28:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8065: Waiting for Server - FAILED kill -0 3829 >/dev/null 2>/dev/null selfserv_9591 with PID 3829 found at Fri Jan 8 06:28:12 EST 2016 selfserv_9591 with PID 3829 started at Fri Jan 8 06:28:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8066: Valid cert, Server doesn't staple produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 3829 at Fri Jan 8 06:28:13 EST 2016 kill -USR1 3829 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3829 killed at Fri Jan 8 06:28:13 EST 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9591 starting at Fri Jan 8 06:28:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:28:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:28:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8067: Waiting for Server - FAILED kill -0 3890 >/dev/null 2>/dev/null selfserv_9591 with PID 3890 found at Fri Jan 8 06:28:19 EST 2016 selfserv_9591 with PID 3890 started at Fri Jan 8 06:28:19 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Fri Jan 8 06:28:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:28:20 EST 2016 ssl.sh: #8068: Stress OCSP stapling, server uses random status produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 3890 at Fri Jan 8 06:28:20 EST 2016 kill -USR1 3890 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3890 killed at Fri Jan 8 06:28:20 EST 2016 ssl.sh: SSL Stress Test - server bypass/client bypass - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 06:28:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:28:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:28:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8069: Waiting for Server - FAILED kill -0 4043 >/dev/null 2>/dev/null selfserv_9591 with PID 4043 found at Fri Jan 8 06:28:27 EST 2016 selfserv_9591 with PID 4043 started at Fri Jan 8 06:28:27 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 06:28:27 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:28:27 EST 2016 ssl.sh: #8070: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 4043 at Fri Jan 8 06:28:27 EST 2016 kill -USR1 4043 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4043 killed at Fri Jan 8 06:28:28 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 06:28:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:28:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:28:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8071: Waiting for Server - FAILED kill -0 4122 >/dev/null 2>/dev/null selfserv_9591 with PID 4122 found at Fri Jan 8 06:28:34 EST 2016 selfserv_9591 with PID 4122 started at Fri Jan 8 06:28:34 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 06:28:34 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:28:34 EST 2016 ssl.sh: #8072: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 4122 at Fri Jan 8 06:28:34 EST 2016 kill -USR1 4122 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4122 killed at Fri Jan 8 06:28:35 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9591 starting at Fri Jan 8 06:28:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:28:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:28:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8073: Waiting for Server - FAILED kill -0 4201 >/dev/null 2>/dev/null selfserv_9591 with PID 4201 found at Fri Jan 8 06:28:41 EST 2016 selfserv_9591 with PID 4201 started at Fri Jan 8 06:28:41 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 06:28:41 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:28:41 EST 2016 ssl.sh: #8074: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 4201 at Fri Jan 8 06:28:41 EST 2016 kill -USR1 4201 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4201 killed at Fri Jan 8 06:28:42 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9591 starting at Fri Jan 8 06:28:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:28:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:28:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8075: Waiting for Server - FAILED kill -0 4281 >/dev/null 2>/dev/null selfserv_9591 with PID 4281 found at Fri Jan 8 06:28:48 EST 2016 selfserv_9591 with PID 4281 started at Fri Jan 8 06:28:48 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 06:28:48 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:28:48 EST 2016 ssl.sh: #8076: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 4281 at Fri Jan 8 06:28:48 EST 2016 kill -USR1 4281 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4281 killed at Fri Jan 8 06:28:49 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9591 starting at Fri Jan 8 06:28:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:28:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:28:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8077: Waiting for Server - FAILED kill -0 4360 >/dev/null 2>/dev/null selfserv_9591 with PID 4360 found at Fri Jan 8 06:28:55 EST 2016 selfserv_9591 with PID 4360 started at Fri Jan 8 06:28:55 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 06:28:55 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:28:55 EST 2016 ssl.sh: #8078: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 4360 at Fri Jan 8 06:28:55 EST 2016 kill -USR1 4360 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4360 killed at Fri Jan 8 06:28:56 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9591 starting at Fri Jan 8 06:28:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:28:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:29:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8079: Waiting for Server - FAILED kill -0 4439 >/dev/null 2>/dev/null selfserv_9591 with PID 4439 found at Fri Jan 8 06:29:02 EST 2016 selfserv_9591 with PID 4439 started at Fri Jan 8 06:29:02 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 06:29:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:29:02 EST 2016 ssl.sh: #8080: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 4439 at Fri Jan 8 06:29:02 EST 2016 kill -USR1 4439 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4439 killed at Fri Jan 8 06:29:03 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9591 starting at Fri Jan 8 06:29:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:29:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:29:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8081: Waiting for Server - FAILED kill -0 4519 >/dev/null 2>/dev/null selfserv_9591 with PID 4519 found at Fri Jan 8 06:29:09 EST 2016 selfserv_9591 with PID 4519 started at Fri Jan 8 06:29:09 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 06:29:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:29:09 EST 2016 ssl.sh: #8082: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 4519 at Fri Jan 8 06:29:09 EST 2016 kill -USR1 4519 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4519 killed at Fri Jan 8 06:29:10 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9591 starting at Fri Jan 8 06:29:10 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:29:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:29:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8083: Waiting for Server - FAILED kill -0 4604 >/dev/null 2>/dev/null selfserv_9591 with PID 4604 found at Fri Jan 8 06:29:16 EST 2016 selfserv_9591 with PID 4604 started at Fri Jan 8 06:29:16 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 06:29:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:29:16 EST 2016 ssl.sh: #8084: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 4604 at Fri Jan 8 06:29:16 EST 2016 kill -USR1 4604 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4604 killed at Fri Jan 8 06:29:17 EST 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:29:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:29:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:29:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8085: Waiting for Server - FAILED kill -0 4711 >/dev/null 2>/dev/null selfserv_9591 with PID 4711 found at Fri Jan 8 06:29:23 EST 2016 selfserv_9591 with PID 4711 started at Fri Jan 8 06:29:23 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 06:29:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:29:23 EST 2016 ssl.sh: #8086: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 4711 at Fri Jan 8 06:29:23 EST 2016 kill -USR1 4711 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4711 killed at Fri Jan 8 06:29:24 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:29:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:29:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:29:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8087: Waiting for Server - FAILED kill -0 4791 >/dev/null 2>/dev/null selfserv_9591 with PID 4791 found at Fri Jan 8 06:29:30 EST 2016 selfserv_9591 with PID 4791 started at Fri Jan 8 06:29:30 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 06:29:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:29:30 EST 2016 ssl.sh: #8088: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 4791 at Fri Jan 8 06:29:30 EST 2016 kill -USR1 4791 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4791 killed at Fri Jan 8 06:29:31 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:29:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:29:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:29:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8089: Waiting for Server - FAILED kill -0 4870 >/dev/null 2>/dev/null selfserv_9591 with PID 4870 found at Fri Jan 8 06:29:37 EST 2016 selfserv_9591 with PID 4870 started at Fri Jan 8 06:29:37 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 06:29:37 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:29:37 EST 2016 ssl.sh: #8090: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 4870 at Fri Jan 8 06:29:38 EST 2016 kill -USR1 4870 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4870 killed at Fri Jan 8 06:29:38 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:29:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:29:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:29:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8091: Waiting for Server - FAILED kill -0 4949 >/dev/null 2>/dev/null selfserv_9591 with PID 4949 found at Fri Jan 8 06:29:44 EST 2016 selfserv_9591 with PID 4949 started at Fri Jan 8 06:29:44 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 06:29:44 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:29:44 EST 2016 ssl.sh: #8092: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 4949 at Fri Jan 8 06:29:45 EST 2016 kill -USR1 4949 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4949 killed at Fri Jan 8 06:29:45 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 06:29:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:29:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:29:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8093: Waiting for Server - FAILED kill -0 5029 >/dev/null 2>/dev/null selfserv_9591 with PID 5029 found at Fri Jan 8 06:29:51 EST 2016 selfserv_9591 with PID 5029 started at Fri Jan 8 06:29:51 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 06:29:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:29:51 EST 2016 ssl.sh: #8094: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 5029 at Fri Jan 8 06:29:52 EST 2016 kill -USR1 5029 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5029 killed at Fri Jan 8 06:29:52 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:29:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:29:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:29:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8095: Waiting for Server - FAILED kill -0 5108 >/dev/null 2>/dev/null selfserv_9591 with PID 5108 found at Fri Jan 8 06:29:58 EST 2016 selfserv_9591 with PID 5108 started at Fri Jan 8 06:29:58 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 06:29:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:29:59 EST 2016 ssl.sh: #8096: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 5108 at Fri Jan 8 06:29:59 EST 2016 kill -USR1 5108 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5108 killed at Fri Jan 8 06:29:59 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 06:29:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:29:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:30:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8097: Waiting for Server - FAILED kill -0 5187 >/dev/null 2>/dev/null selfserv_9591 with PID 5187 found at Fri Jan 8 06:30:05 EST 2016 selfserv_9591 with PID 5187 started at Fri Jan 8 06:30:05 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 06:30:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:30:06 EST 2016 ssl.sh: #8098: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 5187 at Fri Jan 8 06:30:06 EST 2016 kill -USR1 5187 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5187 killed at Fri Jan 8 06:30:06 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9591 starting at Fri Jan 8 06:30:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:30:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:30:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8099: Waiting for Server - FAILED kill -0 5273 >/dev/null 2>/dev/null selfserv_9591 with PID 5273 found at Fri Jan 8 06:30:12 EST 2016 selfserv_9591 with PID 5273 started at Fri Jan 8 06:30:12 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 06:30:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:30:13 EST 2016 ssl.sh: #8100: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 5273 at Fri Jan 8 06:30:13 EST 2016 kill -USR1 5273 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5273 killed at Fri Jan 8 06:30:13 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9591 starting at Fri Jan 8 06:30:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:30:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:30:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8101: Waiting for Server - FAILED kill -0 5358 >/dev/null 2>/dev/null selfserv_9591 with PID 5358 found at Fri Jan 8 06:30:19 EST 2016 selfserv_9591 with PID 5358 started at Fri Jan 8 06:30:19 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Fri Jan 8 06:30:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:30:20 EST 2016 ssl.sh: #8102: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 5358 at Fri Jan 8 06:30:20 EST 2016 kill -USR1 5358 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5358 killed at Fri Jan 8 06:30:20 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:30:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:30:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:30:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8103: Waiting for Server - FAILED kill -0 5459 >/dev/null 2>/dev/null selfserv_9591 with PID 5459 found at Fri Jan 8 06:30:26 EST 2016 selfserv_9591 with PID 5459 started at Fri Jan 8 06:30:26 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:30:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:30:27 EST 2016 ssl.sh: #8104: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 5459 at Fri Jan 8 06:30:27 EST 2016 kill -USR1 5459 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5459 killed at Fri Jan 8 06:30:27 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:30:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:30:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:30:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8105: Waiting for Server - FAILED kill -0 5538 >/dev/null 2>/dev/null selfserv_9591 with PID 5538 found at Fri Jan 8 06:30:33 EST 2016 selfserv_9591 with PID 5538 started at Fri Jan 8 06:30:33 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:30:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:30:34 EST 2016 ssl.sh: #8106: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 5538 at Fri Jan 8 06:30:34 EST 2016 kill -USR1 5538 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5538 killed at Fri Jan 8 06:30:34 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:30:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:30:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:30:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8107: Waiting for Server - FAILED kill -0 5617 >/dev/null 2>/dev/null selfserv_9591 with PID 5617 found at Fri Jan 8 06:30:40 EST 2016 selfserv_9591 with PID 5617 started at Fri Jan 8 06:30:40 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:30:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:30:41 EST 2016 ssl.sh: #8108: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 5617 at Fri Jan 8 06:30:41 EST 2016 kill -USR1 5617 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5617 killed at Fri Jan 8 06:30:41 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:30:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:30:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:30:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8109: Waiting for Server - FAILED kill -0 5697 >/dev/null 2>/dev/null selfserv_9591 with PID 5697 found at Fri Jan 8 06:30:47 EST 2016 selfserv_9591 with PID 5697 started at Fri Jan 8 06:30:47 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:30:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:30:48 EST 2016 ssl.sh: #8110: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 5697 at Fri Jan 8 06:30:48 EST 2016 kill -USR1 5697 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5697 killed at Fri Jan 8 06:30:48 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:30:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:30:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:30:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8111: Waiting for Server - FAILED kill -0 5776 >/dev/null 2>/dev/null selfserv_9591 with PID 5776 found at Fri Jan 8 06:30:54 EST 2016 selfserv_9591 with PID 5776 started at Fri Jan 8 06:30:54 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:30:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:30:55 EST 2016 ssl.sh: #8112: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 5776 at Fri Jan 8 06:30:55 EST 2016 kill -USR1 5776 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5776 killed at Fri Jan 8 06:30:55 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9591 starting at Fri Jan 8 06:30:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:30:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:31:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8113: Waiting for Server - FAILED kill -0 5855 >/dev/null 2>/dev/null selfserv_9591 with PID 5855 found at Fri Jan 8 06:31:01 EST 2016 selfserv_9591 with PID 5855 started at Fri Jan 8 06:31:01 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 06:31:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:31:02 EST 2016 ssl.sh: #8114: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 5855 at Fri Jan 8 06:31:02 EST 2016 kill -USR1 5855 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5855 killed at Fri Jan 8 06:31:02 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9591 starting at Fri Jan 8 06:31:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:31:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:31:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8115: Waiting for Server - FAILED kill -0 5935 >/dev/null 2>/dev/null selfserv_9591 with PID 5935 found at Fri Jan 8 06:31:08 EST 2016 selfserv_9591 with PID 5935 started at Fri Jan 8 06:31:08 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 06:31:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:31:09 EST 2016 ssl.sh: #8116: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 5935 at Fri Jan 8 06:31:09 EST 2016 kill -USR1 5935 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5935 killed at Fri Jan 8 06:31:09 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9591 starting at Fri Jan 8 06:31:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:31:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:31:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8117: Waiting for Server - FAILED kill -0 6014 >/dev/null 2>/dev/null selfserv_9591 with PID 6014 found at Fri Jan 8 06:31:15 EST 2016 selfserv_9591 with PID 6014 started at Fri Jan 8 06:31:15 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 06:31:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:31:16 EST 2016 ssl.sh: #8118: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 6014 at Fri Jan 8 06:31:16 EST 2016 kill -USR1 6014 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6014 killed at Fri Jan 8 06:31:16 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 06:31:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:31:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:31:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8119: Waiting for Server - FAILED kill -0 6093 >/dev/null 2>/dev/null selfserv_9591 with PID 6093 found at Fri Jan 8 06:31:22 EST 2016 selfserv_9591 with PID 6093 started at Fri Jan 8 06:31:22 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 06:31:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:31:23 EST 2016 ssl.sh: #8120: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6093 at Fri Jan 8 06:31:23 EST 2016 kill -USR1 6093 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6093 killed at Fri Jan 8 06:31:23 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 06:31:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:31:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:31:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8121: Waiting for Server - FAILED kill -0 6173 >/dev/null 2>/dev/null selfserv_9591 with PID 6173 found at Fri Jan 8 06:31:29 EST 2016 selfserv_9591 with PID 6173 started at Fri Jan 8 06:31:29 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 06:31:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:31:30 EST 2016 ssl.sh: #8122: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6173 at Fri Jan 8 06:31:30 EST 2016 kill -USR1 6173 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6173 killed at Fri Jan 8 06:31:30 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:31:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:31:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:31:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8123: Waiting for Server - FAILED kill -0 6273 >/dev/null 2>/dev/null selfserv_9591 with PID 6273 found at Fri Jan 8 06:31:37 EST 2016 selfserv_9591 with PID 6273 started at Fri Jan 8 06:31:37 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 06:31:37 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:31:37 EST 2016 ssl.sh: #8124: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6273 at Fri Jan 8 06:31:37 EST 2016 kill -USR1 6273 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6273 killed at Fri Jan 8 06:31:38 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:31:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:31:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:31:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8125: Waiting for Server - FAILED kill -0 6352 >/dev/null 2>/dev/null selfserv_9591 with PID 6352 found at Fri Jan 8 06:31:44 EST 2016 selfserv_9591 with PID 6352 started at Fri Jan 8 06:31:44 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 06:31:44 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:31:44 EST 2016 ssl.sh: #8126: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 6352 at Fri Jan 8 06:31:44 EST 2016 kill -USR1 6352 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6352 killed at Fri Jan 8 06:31:45 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:31:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:31:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:31:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8127: Waiting for Server - FAILED kill -0 6432 >/dev/null 2>/dev/null selfserv_9591 with PID 6432 found at Fri Jan 8 06:31:51 EST 2016 selfserv_9591 with PID 6432 started at Fri Jan 8 06:31:51 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 06:31:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:31:51 EST 2016 ssl.sh: #8128: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6432 at Fri Jan 8 06:31:51 EST 2016 kill -USR1 6432 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6432 killed at Fri Jan 8 06:31:52 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:31:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:31:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:31:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8129: Waiting for Server - FAILED kill -0 6511 >/dev/null 2>/dev/null selfserv_9591 with PID 6511 found at Fri Jan 8 06:31:58 EST 2016 selfserv_9591 with PID 6511 started at Fri Jan 8 06:31:58 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 06:31:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:31:58 EST 2016 ssl.sh: #8130: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6511 at Fri Jan 8 06:31:58 EST 2016 kill -USR1 6511 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6511 killed at Fri Jan 8 06:31:59 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9591 starting at Fri Jan 8 06:31:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:31:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:32:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8131: Waiting for Server - FAILED kill -0 6590 >/dev/null 2>/dev/null selfserv_9591 with PID 6590 found at Fri Jan 8 06:32:05 EST 2016 selfserv_9591 with PID 6590 started at Fri Jan 8 06:32:05 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 06:32:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:32:05 EST 2016 ssl.sh: #8132: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 6590 at Fri Jan 8 06:32:05 EST 2016 kill -USR1 6590 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6590 killed at Fri Jan 8 06:32:06 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:32:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:32:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:32:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8133: Waiting for Server - FAILED kill -0 6670 >/dev/null 2>/dev/null selfserv_9591 with PID 6670 found at Fri Jan 8 06:32:12 EST 2016 selfserv_9591 with PID 6670 started at Fri Jan 8 06:32:12 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 06:32:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:32:12 EST 2016 ssl.sh: #8134: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6670 at Fri Jan 8 06:32:12 EST 2016 kill -USR1 6670 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6670 killed at Fri Jan 8 06:32:13 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:32:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:32:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:32:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8135: Waiting for Server - FAILED kill -0 6770 >/dev/null 2>/dev/null selfserv_9591 with PID 6770 found at Fri Jan 8 06:32:19 EST 2016 selfserv_9591 with PID 6770 started at Fri Jan 8 06:32:19 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:32:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:32:19 EST 2016 ssl.sh: #8136: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6770 at Fri Jan 8 06:32:19 EST 2016 kill -USR1 6770 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6770 killed at Fri Jan 8 06:32:20 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9591 starting at Fri Jan 8 06:32:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:32:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:32:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8137: Waiting for Server - FAILED kill -0 6849 >/dev/null 2>/dev/null selfserv_9591 with PID 6849 found at Fri Jan 8 06:32:26 EST 2016 selfserv_9591 with PID 6849 started at Fri Jan 8 06:32:26 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 06:32:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:32:26 EST 2016 ssl.sh: #8138: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 6849 at Fri Jan 8 06:32:26 EST 2016 kill -USR1 6849 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6849 killed at Fri Jan 8 06:32:27 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:32:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:32:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:32:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8139: Waiting for Server - FAILED kill -0 6929 >/dev/null 2>/dev/null selfserv_9591 with PID 6929 found at Fri Jan 8 06:32:33 EST 2016 selfserv_9591 with PID 6929 started at Fri Jan 8 06:32:33 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:32:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:32:33 EST 2016 ssl.sh: #8140: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 6929 at Fri Jan 8 06:32:33 EST 2016 kill -USR1 6929 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 6929 killed at Fri Jan 8 06:32:34 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:32:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:32:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:32:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8141: Waiting for Server - FAILED kill -0 7008 >/dev/null 2>/dev/null selfserv_9591 with PID 7008 found at Fri Jan 8 06:32:40 EST 2016 selfserv_9591 with PID 7008 started at Fri Jan 8 06:32:40 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:32:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:32:40 EST 2016 ssl.sh: #8142: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7008 at Fri Jan 8 06:32:40 EST 2016 kill -USR1 7008 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7008 killed at Fri Jan 8 06:32:41 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:32:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:32:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:32:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8143: Waiting for Server - FAILED kill -0 7101 >/dev/null 2>/dev/null selfserv_9591 with PID 7101 found at Fri Jan 8 06:32:47 EST 2016 selfserv_9591 with PID 7101 started at Fri Jan 8 06:32:47 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:32:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:32:47 EST 2016 ssl.sh: #8144: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7101 at Fri Jan 8 06:32:48 EST 2016 kill -USR1 7101 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7101 killed at Fri Jan 8 06:32:48 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9591 starting at Fri Jan 8 06:32:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:32:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:32:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8145: Waiting for Server - FAILED kill -0 7195 >/dev/null 2>/dev/null selfserv_9591 with PID 7195 found at Fri Jan 8 06:32:54 EST 2016 selfserv_9591 with PID 7195 started at Fri Jan 8 06:32:54 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:32:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:32:55 EST 2016 ssl.sh: #8146: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7195 at Fri Jan 8 06:32:55 EST 2016 kill -USR1 7195 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7195 killed at Fri Jan 8 06:32:55 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:32:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:32:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:33:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8147: Waiting for Server - FAILED kill -0 7274 >/dev/null 2>/dev/null selfserv_9591 with PID 7274 found at Fri Jan 8 06:33:01 EST 2016 selfserv_9591 with PID 7274 started at Fri Jan 8 06:33:01 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:33:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:33:02 EST 2016 ssl.sh: #8148: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7274 at Fri Jan 8 06:33:02 EST 2016 kill -USR1 7274 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7274 killed at Fri Jan 8 06:33:02 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:33:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:33:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:33:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8149: Waiting for Server - FAILED kill -0 7363 >/dev/null 2>/dev/null selfserv_9591 with PID 7363 found at Fri Jan 8 06:33:08 EST 2016 selfserv_9591 with PID 7363 started at Fri Jan 8 06:33:08 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:33:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:33:09 EST 2016 ssl.sh: #8150: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7363 at Fri Jan 8 06:33:09 EST 2016 kill -USR1 7363 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7363 killed at Fri Jan 8 06:33:09 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:33:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:33:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:33:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8151: Waiting for Server - FAILED kill -0 7474 >/dev/null 2>/dev/null selfserv_9591 with PID 7474 found at Fri Jan 8 06:33:15 EST 2016 selfserv_9591 with PID 7474 started at Fri Jan 8 06:33:15 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 06:33:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:33:16 EST 2016 ssl.sh: #8152: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7474 at Fri Jan 8 06:33:16 EST 2016 kill -USR1 7474 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7474 killed at Fri Jan 8 06:33:16 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:33:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:33:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:33:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8153: Waiting for Server - FAILED kill -0 7561 >/dev/null 2>/dev/null selfserv_9591 with PID 7561 found at Fri Jan 8 06:33:22 EST 2016 selfserv_9591 with PID 7561 started at Fri Jan 8 06:33:22 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 06:33:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:33:23 EST 2016 ssl.sh: #8154: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 7561 at Fri Jan 8 06:33:23 EST 2016 kill -USR1 7561 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7561 killed at Fri Jan 8 06:33:23 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:33:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:33:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:33:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8155: Waiting for Server - FAILED kill -0 7661 >/dev/null 2>/dev/null selfserv_9591 with PID 7661 found at Fri Jan 8 06:33:29 EST 2016 selfserv_9591 with PID 7661 started at Fri Jan 8 06:33:29 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 06:33:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:33:30 EST 2016 ssl.sh: #8156: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 7661 at Fri Jan 8 06:33:30 EST 2016 kill -USR1 7661 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7661 killed at Fri Jan 8 06:33:30 EST 2016 ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client bypass - with ECC =============================== selfserv_9591 starting at Fri Jan 8 06:33:30 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:33:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:33:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8157: Waiting for Server - FAILED kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:36 EST 2016 selfserv_9591 with PID 7736 started at Fri Jan 8 06:33:36 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping A SSL2_RC4_128_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping F SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8158: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8159: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8160: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8161: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8162: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8163: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8164: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8165: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8166: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8167: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8168: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8169: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8170: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8171: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8172: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8173: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8174: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8175: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8176: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8177: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8178: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8179: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8180: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8181: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8182: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8183: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8184: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8185: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8186: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8187: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8188: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8189: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8190: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c c -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8191: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c d -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8192: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c e -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8193: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c i -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8194: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c j -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8195: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c k -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8196: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c n -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8197: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c v -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8198: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:33:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c y -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8199: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c z -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8200: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8201: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8202: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8203: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8204: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8205: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8206: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8207: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8208: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8209: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8210: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8211: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8212: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8213: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8214: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8215: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8216: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8217: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8218: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8219: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8220: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8221: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8222: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8223: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8224: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7736 >/dev/null 2>/dev/null selfserv_9591 with PID 7736 found at Fri Jan 8 06:34:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8225: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 7736 at Fri Jan 8 06:34:13 EST 2016 kill -USR1 7736 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7736 killed at Fri Jan 8 06:34:14 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 06:34:14 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:34:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:34:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8226: Waiting for Server - FAILED kill -0 9854 >/dev/null 2>/dev/null selfserv_9591 with PID 9854 found at Fri Jan 8 06:34:20 EST 2016 selfserv_9591 with PID 9854 started at Fri Jan 8 06:34:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8227: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9854 >/dev/null 2>/dev/null selfserv_9591 with PID 9854 found at Fri Jan 8 06:34:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8228: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9854 >/dev/null 2>/dev/null selfserv_9591 with PID 9854 found at Fri Jan 8 06:34:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8229: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9854 >/dev/null 2>/dev/null selfserv_9591 with PID 9854 found at Fri Jan 8 06:34:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8230: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9854 >/dev/null 2>/dev/null selfserv_9591 with PID 9854 found at Fri Jan 8 06:34:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8231: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 9854 at Fri Jan 8 06:34:22 EST 2016 kill -USR1 9854 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9854 killed at Fri Jan 8 06:34:23 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 06:34:23 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:34:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:34:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8232: Waiting for Server - FAILED kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:29 EST 2016 selfserv_9591 with PID 10029 started at Fri Jan 8 06:34:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8233: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8234: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8235: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8236: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8237: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8238: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8239: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8240: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8241: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8242: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8243: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8244: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8245: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8246: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10029 >/dev/null 2>/dev/null selfserv_9591 with PID 10029 found at Fri Jan 8 06:34:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8247: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 10029 at Fri Jan 8 06:34:37 EST 2016 kill -USR1 10029 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10029 killed at Fri Jan 8 06:34:37 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 06:34:37 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:34:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:34:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8248: Waiting for Server - FAILED kill -0 10443 >/dev/null 2>/dev/null selfserv_9591 with PID 10443 found at Fri Jan 8 06:34:43 EST 2016 selfserv_9591 with PID 10443 started at Fri Jan 8 06:34:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8249: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10443 >/dev/null 2>/dev/null selfserv_9591 with PID 10443 found at Fri Jan 8 06:34:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8250: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10443 >/dev/null 2>/dev/null selfserv_9591 with PID 10443 found at Fri Jan 8 06:34:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8251: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10443 >/dev/null 2>/dev/null selfserv_9591 with PID 10443 found at Fri Jan 8 06:34:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8252: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10443 >/dev/null 2>/dev/null selfserv_9591 with PID 10443 found at Fri Jan 8 06:34:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8253: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 10443 at Fri Jan 8 06:34:46 EST 2016 kill -USR1 10443 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10443 killed at Fri Jan 8 06:34:46 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 06:34:46 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:34:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:34:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8254: Waiting for Server - FAILED kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:52 EST 2016 selfserv_9591 with PID 10608 started at Fri Jan 8 06:34:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8255: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8256: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8257: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8258: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8259: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8260: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8261: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8262: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8263: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8264: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8265: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8266: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8267: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8268: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10608 >/dev/null 2>/dev/null selfserv_9591 with PID 10608 found at Fri Jan 8 06:34:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8269: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 10608 at Fri Jan 8 06:35:00 EST 2016 kill -USR1 10608 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10608 killed at Fri Jan 8 06:35:00 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 06:35:00 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:35:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:35:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8270: Waiting for Server - FAILED kill -0 11023 >/dev/null 2>/dev/null selfserv_9591 with PID 11023 found at Fri Jan 8 06:35:06 EST 2016 selfserv_9591 with PID 11023 started at Fri Jan 8 06:35:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8271: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11023 >/dev/null 2>/dev/null selfserv_9591 with PID 11023 found at Fri Jan 8 06:35:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8272: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11023 >/dev/null 2>/dev/null selfserv_9591 with PID 11023 found at Fri Jan 8 06:35:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8273: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11023 >/dev/null 2>/dev/null selfserv_9591 with PID 11023 found at Fri Jan 8 06:35:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8274: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11023 >/dev/null 2>/dev/null selfserv_9591 with PID 11023 found at Fri Jan 8 06:35:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8275: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9591 with PID 11023 at Fri Jan 8 06:35:09 EST 2016 kill -USR1 11023 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11023 killed at Fri Jan 8 06:35:09 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9591 starting at Fri Jan 8 06:35:09 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:35:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:35:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8276: Waiting for Server - FAILED kill -0 11191 >/dev/null 2>/dev/null selfserv_9591 with PID 11191 found at Fri Jan 8 06:35:15 EST 2016 selfserv_9591 with PID 11191 started at Fri Jan 8 06:35:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8277: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11191 >/dev/null 2>/dev/null selfserv_9591 with PID 11191 found at Fri Jan 8 06:35:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8278: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11191 >/dev/null 2>/dev/null selfserv_9591 with PID 11191 found at Fri Jan 8 06:35:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8279: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11191 >/dev/null 2>/dev/null selfserv_9591 with PID 11191 found at Fri Jan 8 06:35:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8280: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11191 >/dev/null 2>/dev/null selfserv_9591 with PID 11191 found at Fri Jan 8 06:35:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8281: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 11191 >/dev/null 2>/dev/null selfserv_9591 with PID 11191 found at Fri Jan 8 06:35:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8282: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 11191 >/dev/null 2>/dev/null selfserv_9591 with PID 11191 found at Fri Jan 8 06:35:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8283: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 11191 >/dev/null 2>/dev/null selfserv_9591 with PID 11191 found at Fri Jan 8 06:35:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8284: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 11191 >/dev/null 2>/dev/null selfserv_9591 with PID 11191 found at Fri Jan 8 06:35:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8285: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 11191 >/dev/null 2>/dev/null selfserv_9591 with PID 11191 found at Fri Jan 8 06:35:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8286: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 11191 >/dev/null 2>/dev/null selfserv_9591 with PID 11191 found at Fri Jan 8 06:35:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8287: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 11191 >/dev/null 2>/dev/null selfserv_9591 with PID 11191 found at Fri Jan 8 06:35:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8288: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 11191 >/dev/null 2>/dev/null selfserv_9591 with PID 11191 found at Fri Jan 8 06:35:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8289: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 11191 at Fri Jan 8 06:35:22 EST 2016 kill -USR1 11191 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11191 killed at Fri Jan 8 06:35:22 EST 2016 ssl.sh: SSL Client Authentication Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:35:23 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:35:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:35:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8290: Waiting for Server - FAILED kill -0 11598 >/dev/null 2>/dev/null selfserv_9591 with PID 11598 found at Fri Jan 8 06:35:29 EST 2016 selfserv_9591 with PID 11598 started at Fri Jan 8 06:35:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8291: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 11598 at Fri Jan 8 06:35:29 EST 2016 kill -USR1 11598 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11598 killed at Fri Jan 8 06:35:30 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:35:30 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:35:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:35:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8292: Waiting for Server - FAILED kill -0 11668 >/dev/null 2>/dev/null selfserv_9591 with PID 11668 found at Fri Jan 8 06:35:36 EST 2016 selfserv_9591 with PID 11668 started at Fri Jan 8 06:35:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8293: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 11668 at Fri Jan 8 06:35:36 EST 2016 kill -USR1 11668 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11668 killed at Fri Jan 8 06:35:36 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:35:37 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:35:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:35:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8294: Waiting for Server - FAILED kill -0 11738 >/dev/null 2>/dev/null selfserv_9591 with PID 11738 found at Fri Jan 8 06:35:42 EST 2016 selfserv_9591 with PID 11738 started at Fri Jan 8 06:35:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8295: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 11738 at Fri Jan 8 06:35:43 EST 2016 kill -USR1 11738 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11738 killed at Fri Jan 8 06:35:43 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:35:43 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:35:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:35:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8296: Waiting for Server - FAILED kill -0 11807 >/dev/null 2>/dev/null selfserv_9591 with PID 11807 found at Fri Jan 8 06:35:49 EST 2016 selfserv_9591 with PID 11807 started at Fri Jan 8 06:35:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8297: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 11807 at Fri Jan 8 06:35:50 EST 2016 kill -USR1 11807 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11807 killed at Fri Jan 8 06:35:50 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:35:50 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:35:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:35:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8298: Waiting for Server - FAILED kill -0 11877 >/dev/null 2>/dev/null selfserv_9591 with PID 11877 found at Fri Jan 8 06:35:56 EST 2016 selfserv_9591 with PID 11877 started at Fri Jan 8 06:35:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8299: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 11877 at Fri Jan 8 06:35:57 EST 2016 kill -USR1 11877 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11877 killed at Fri Jan 8 06:35:57 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:35:57 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:35:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:36:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8300: Waiting for Server - FAILED kill -0 11946 >/dev/null 2>/dev/null selfserv_9591 with PID 11946 found at Fri Jan 8 06:36:03 EST 2016 selfserv_9591 with PID 11946 started at Fri Jan 8 06:36:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8301: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 11946 at Fri Jan 8 06:36:04 EST 2016 kill -USR1 11946 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11946 killed at Fri Jan 8 06:36:04 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:36:04 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:36:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:36:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8302: Waiting for Server - FAILED kill -0 12015 >/dev/null 2>/dev/null selfserv_9591 with PID 12015 found at Fri Jan 8 06:36:10 EST 2016 selfserv_9591 with PID 12015 started at Fri Jan 8 06:36:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8303: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12015 at Fri Jan 8 06:36:11 EST 2016 kill -USR1 12015 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12015 killed at Fri Jan 8 06:36:11 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:36:11 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:36:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:36:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8304: Waiting for Server - FAILED kill -0 12085 >/dev/null 2>/dev/null selfserv_9591 with PID 12085 found at Fri Jan 8 06:36:17 EST 2016 selfserv_9591 with PID 12085 started at Fri Jan 8 06:36:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8305: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12085 at Fri Jan 8 06:36:17 EST 2016 kill -USR1 12085 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12085 killed at Fri Jan 8 06:36:18 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:36:18 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:36:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:36:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8306: Waiting for Server - FAILED kill -0 12154 >/dev/null 2>/dev/null selfserv_9591 with PID 12154 found at Fri Jan 8 06:36:24 EST 2016 selfserv_9591 with PID 12154 started at Fri Jan 8 06:36:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8307: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12154 at Fri Jan 8 06:36:24 EST 2016 kill -USR1 12154 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12154 killed at Fri Jan 8 06:36:25 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:36:25 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:36:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:36:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8308: Waiting for Server - FAILED kill -0 12223 >/dev/null 2>/dev/null selfserv_9591 with PID 12223 found at Fri Jan 8 06:36:31 EST 2016 selfserv_9591 with PID 12223 started at Fri Jan 8 06:36:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8309: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 12223 at Fri Jan 8 06:36:31 EST 2016 kill -USR1 12223 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12223 killed at Fri Jan 8 06:36:32 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:36:32 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:36:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:36:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8310: Waiting for Server - FAILED kill -0 12293 >/dev/null 2>/dev/null selfserv_9591 with PID 12293 found at Fri Jan 8 06:36:38 EST 2016 selfserv_9591 with PID 12293 started at Fri Jan 8 06:36:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8311: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 12293 at Fri Jan 8 06:36:38 EST 2016 kill -USR1 12293 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12293 killed at Fri Jan 8 06:36:39 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:36:39 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:36:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:36:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8312: Waiting for Server - FAILED kill -0 12362 >/dev/null 2>/dev/null selfserv_9591 with PID 12362 found at Fri Jan 8 06:36:45 EST 2016 selfserv_9591 with PID 12362 started at Fri Jan 8 06:36:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8313: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12362 at Fri Jan 8 06:36:45 EST 2016 kill -USR1 12362 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12362 killed at Fri Jan 8 06:36:46 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:36:46 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:36:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:36:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8314: Waiting for Server - FAILED kill -0 12431 >/dev/null 2>/dev/null selfserv_9591 with PID 12431 found at Fri Jan 8 06:36:52 EST 2016 selfserv_9591 with PID 12431 started at Fri Jan 8 06:36:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8315: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12431 at Fri Jan 8 06:36:52 EST 2016 kill -USR1 12431 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12431 killed at Fri Jan 8 06:36:52 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:36:53 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:36:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:36:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8316: Waiting for Server - FAILED kill -0 12501 >/dev/null 2>/dev/null selfserv_9591 with PID 12501 found at Fri Jan 8 06:36:58 EST 2016 selfserv_9591 with PID 12501 started at Fri Jan 8 06:36:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8317: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12501 at Fri Jan 8 06:36:59 EST 2016 kill -USR1 12501 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12501 killed at Fri Jan 8 06:36:59 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:36:59 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:37:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:37:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8318: Waiting for Server - FAILED kill -0 12570 >/dev/null 2>/dev/null selfserv_9591 with PID 12570 found at Fri Jan 8 06:37:05 EST 2016 selfserv_9591 with PID 12570 started at Fri Jan 8 06:37:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8319: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12570 at Fri Jan 8 06:37:06 EST 2016 kill -USR1 12570 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12570 killed at Fri Jan 8 06:37:06 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:37:06 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:37:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:37:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8320: Waiting for Server - FAILED kill -0 12639 >/dev/null 2>/dev/null selfserv_9591 with PID 12639 found at Fri Jan 8 06:37:12 EST 2016 selfserv_9591 with PID 12639 started at Fri Jan 8 06:37:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8321: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 12639 at Fri Jan 8 06:37:13 EST 2016 kill -USR1 12639 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12639 killed at Fri Jan 8 06:37:13 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:37:13 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:37:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:37:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8322: Waiting for Server - FAILED kill -0 12709 >/dev/null 2>/dev/null selfserv_9591 with PID 12709 found at Fri Jan 8 06:37:19 EST 2016 selfserv_9591 with PID 12709 started at Fri Jan 8 06:37:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8323: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 12709 at Fri Jan 8 06:37:20 EST 2016 kill -USR1 12709 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12709 killed at Fri Jan 8 06:37:20 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:37:20 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:37:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:37:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8324: Waiting for Server - FAILED kill -0 12778 >/dev/null 2>/dev/null selfserv_9591 with PID 12778 found at Fri Jan 8 06:37:26 EST 2016 selfserv_9591 with PID 12778 started at Fri Jan 8 06:37:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8325: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12778 at Fri Jan 8 06:37:27 EST 2016 kill -USR1 12778 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12778 killed at Fri Jan 8 06:37:27 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:37:27 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:37:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:37:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8326: Waiting for Server - FAILED kill -0 12847 >/dev/null 2>/dev/null selfserv_9591 with PID 12847 found at Fri Jan 8 06:37:33 EST 2016 selfserv_9591 with PID 12847 started at Fri Jan 8 06:37:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8327: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12847 at Fri Jan 8 06:37:34 EST 2016 kill -USR1 12847 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12847 killed at Fri Jan 8 06:37:34 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:37:34 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:37:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:37:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8328: Waiting for Server - FAILED kill -0 12917 >/dev/null 2>/dev/null selfserv_9591 with PID 12917 found at Fri Jan 8 06:37:40 EST 2016 selfserv_9591 with PID 12917 started at Fri Jan 8 06:37:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8329: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12917 at Fri Jan 8 06:37:40 EST 2016 kill -USR1 12917 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12917 killed at Fri Jan 8 06:37:41 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:37:41 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:37:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:37:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8330: Waiting for Server - FAILED kill -0 12986 >/dev/null 2>/dev/null selfserv_9591 with PID 12986 found at Fri Jan 8 06:37:47 EST 2016 selfserv_9591 with PID 12986 started at Fri Jan 8 06:37:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8331: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12986 at Fri Jan 8 06:37:47 EST 2016 kill -USR1 12986 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12986 killed at Fri Jan 8 06:37:48 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:37:48 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:37:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:37:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8332: Waiting for Server - FAILED kill -0 13055 >/dev/null 2>/dev/null selfserv_9591 with PID 13055 found at Fri Jan 8 06:37:54 EST 2016 selfserv_9591 with PID 13055 started at Fri Jan 8 06:37:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8333: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13055 at Fri Jan 8 06:37:54 EST 2016 kill -USR1 13055 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13055 killed at Fri Jan 8 06:37:55 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:37:55 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:37:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:38:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8334: Waiting for Server - FAILED kill -0 13125 >/dev/null 2>/dev/null selfserv_9591 with PID 13125 found at Fri Jan 8 06:38:01 EST 2016 selfserv_9591 with PID 13125 started at Fri Jan 8 06:38:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8335: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13125 at Fri Jan 8 06:38:01 EST 2016 kill -USR1 13125 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13125 killed at Fri Jan 8 06:38:02 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:38:02 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:38:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:38:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8336: Waiting for Server - FAILED kill -0 13194 >/dev/null 2>/dev/null selfserv_9591 with PID 13194 found at Fri Jan 8 06:38:08 EST 2016 selfserv_9591 with PID 13194 started at Fri Jan 8 06:38:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8337: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13194 at Fri Jan 8 06:38:08 EST 2016 kill -USR1 13194 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13194 killed at Fri Jan 8 06:38:09 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:38:09 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:38:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:38:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8338: Waiting for Server - FAILED kill -0 13263 >/dev/null 2>/dev/null selfserv_9591 with PID 13263 found at Fri Jan 8 06:38:15 EST 2016 selfserv_9591 with PID 13263 started at Fri Jan 8 06:38:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8339: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13263 at Fri Jan 8 06:38:15 EST 2016 kill -USR1 13263 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13263 killed at Fri Jan 8 06:38:15 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:38:16 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:38:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:38:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8340: Waiting for Server - FAILED kill -0 13333 >/dev/null 2>/dev/null selfserv_9591 with PID 13333 found at Fri Jan 8 06:38:21 EST 2016 selfserv_9591 with PID 13333 started at Fri Jan 8 06:38:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8341: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13333 at Fri Jan 8 06:38:22 EST 2016 kill -USR1 13333 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13333 killed at Fri Jan 8 06:38:22 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:38:22 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:38:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:38:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8342: Waiting for Server - FAILED kill -0 13402 >/dev/null 2>/dev/null selfserv_9591 with PID 13402 found at Fri Jan 8 06:38:28 EST 2016 selfserv_9591 with PID 13402 started at Fri Jan 8 06:38:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8343: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13402 at Fri Jan 8 06:38:29 EST 2016 kill -USR1 13402 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13402 killed at Fri Jan 8 06:38:29 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 06:38:29 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:38:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:38:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8344: Waiting for Server - FAILED kill -0 13471 >/dev/null 2>/dev/null selfserv_9591 with PID 13471 found at Fri Jan 8 06:38:35 EST 2016 selfserv_9591 with PID 13471 started at Fri Jan 8 06:38:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8345: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13471 at Fri Jan 8 06:38:36 EST 2016 kill -USR1 13471 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13471 killed at Fri Jan 8 06:38:36 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:38:36 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:38:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:38:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8346: Waiting for Server - FAILED kill -0 13541 >/dev/null 2>/dev/null selfserv_9591 with PID 13541 found at Fri Jan 8 06:38:42 EST 2016 selfserv_9591 with PID 13541 started at Fri Jan 8 06:38:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8347: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13541 at Fri Jan 8 06:38:43 EST 2016 kill -USR1 13541 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13541 killed at Fri Jan 8 06:38:43 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:38:43 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:38:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:38:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8348: Waiting for Server - FAILED kill -0 13610 >/dev/null 2>/dev/null selfserv_9591 with PID 13610 found at Fri Jan 8 06:38:49 EST 2016 selfserv_9591 with PID 13610 started at Fri Jan 8 06:38:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8349: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13610 at Fri Jan 8 06:38:50 EST 2016 kill -USR1 13610 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13610 killed at Fri Jan 8 06:38:50 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:38:50 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:38:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:38:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8350: Waiting for Server - FAILED kill -0 13694 >/dev/null 2>/dev/null selfserv_9591 with PID 13694 found at Fri Jan 8 06:38:56 EST 2016 selfserv_9591 with PID 13694 started at Fri Jan 8 06:38:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8351: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13694 at Fri Jan 8 06:38:57 EST 2016 kill -USR1 13694 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13694 killed at Fri Jan 8 06:38:57 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:38:57 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:38:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:39:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8352: Waiting for Server - FAILED kill -0 13764 >/dev/null 2>/dev/null selfserv_9591 with PID 13764 found at Fri Jan 8 06:39:03 EST 2016 selfserv_9591 with PID 13764 started at Fri Jan 8 06:39:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8353: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13764 at Fri Jan 8 06:39:03 EST 2016 kill -USR1 13764 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13764 killed at Fri Jan 8 06:39:04 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:39:04 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:39:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:39:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8354: Waiting for Server - FAILED kill -0 13833 >/dev/null 2>/dev/null selfserv_9591 with PID 13833 found at Fri Jan 8 06:39:10 EST 2016 selfserv_9591 with PID 13833 started at Fri Jan 8 06:39:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8355: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13833 at Fri Jan 8 06:39:10 EST 2016 kill -USR1 13833 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13833 killed at Fri Jan 8 06:39:11 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:39:11 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:39:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:39:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8356: Waiting for Server - FAILED kill -0 13902 >/dev/null 2>/dev/null selfserv_9591 with PID 13902 found at Fri Jan 8 06:39:17 EST 2016 selfserv_9591 with PID 13902 started at Fri Jan 8 06:39:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8357: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13902 at Fri Jan 8 06:39:17 EST 2016 kill -USR1 13902 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13902 killed at Fri Jan 8 06:39:18 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:39:18 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:39:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:39:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8358: Waiting for Server - FAILED kill -0 13972 >/dev/null 2>/dev/null selfserv_9591 with PID 13972 found at Fri Jan 8 06:39:24 EST 2016 selfserv_9591 with PID 13972 started at Fri Jan 8 06:39:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8359: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13972 at Fri Jan 8 06:39:24 EST 2016 kill -USR1 13972 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13972 killed at Fri Jan 8 06:39:25 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:39:25 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:39:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:39:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8360: Waiting for Server - FAILED kill -0 14041 >/dev/null 2>/dev/null selfserv_9591 with PID 14041 found at Fri Jan 8 06:39:31 EST 2016 selfserv_9591 with PID 14041 started at Fri Jan 8 06:39:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8361: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14041 at Fri Jan 8 06:39:31 EST 2016 kill -USR1 14041 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14041 killed at Fri Jan 8 06:39:32 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:39:32 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:39:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:39:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8362: Waiting for Server - FAILED kill -0 14110 >/dev/null 2>/dev/null selfserv_9591 with PID 14110 found at Fri Jan 8 06:39:38 EST 2016 selfserv_9591 with PID 14110 started at Fri Jan 8 06:39:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8363: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14110 at Fri Jan 8 06:39:38 EST 2016 kill -USR1 14110 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14110 killed at Fri Jan 8 06:39:38 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:39:39 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:39:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:39:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8364: Waiting for Server - FAILED kill -0 14180 >/dev/null 2>/dev/null selfserv_9591 with PID 14180 found at Fri Jan 8 06:39:44 EST 2016 selfserv_9591 with PID 14180 started at Fri Jan 8 06:39:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8365: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14180 at Fri Jan 8 06:39:45 EST 2016 kill -USR1 14180 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14180 killed at Fri Jan 8 06:39:45 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:39:45 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:39:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:39:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8366: Waiting for Server - FAILED kill -0 14249 >/dev/null 2>/dev/null selfserv_9591 with PID 14249 found at Fri Jan 8 06:39:51 EST 2016 selfserv_9591 with PID 14249 started at Fri Jan 8 06:39:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8367: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14249 at Fri Jan 8 06:39:52 EST 2016 kill -USR1 14249 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14249 killed at Fri Jan 8 06:39:52 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:39:52 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:39:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:39:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8368: Waiting for Server - FAILED kill -0 14318 >/dev/null 2>/dev/null selfserv_9591 with PID 14318 found at Fri Jan 8 06:39:58 EST 2016 selfserv_9591 with PID 14318 started at Fri Jan 8 06:39:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8369: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14318 at Fri Jan 8 06:39:59 EST 2016 kill -USR1 14318 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14318 killed at Fri Jan 8 06:39:59 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:39:59 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:39:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:40:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8370: Waiting for Server - FAILED kill -0 14388 >/dev/null 2>/dev/null selfserv_9591 with PID 14388 found at Fri Jan 8 06:40:05 EST 2016 selfserv_9591 with PID 14388 started at Fri Jan 8 06:40:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8371: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14388 at Fri Jan 8 06:40:06 EST 2016 kill -USR1 14388 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14388 killed at Fri Jan 8 06:40:06 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:40:06 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:40:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:40:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8372: Waiting for Server - FAILED kill -0 14458 >/dev/null 2>/dev/null selfserv_9591 with PID 14458 found at Fri Jan 8 06:40:12 EST 2016 selfserv_9591 with PID 14458 started at Fri Jan 8 06:40:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8373: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14458 at Fri Jan 8 06:40:13 EST 2016 kill -USR1 14458 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14458 killed at Fri Jan 8 06:40:13 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:40:13 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:40:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:40:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8374: Waiting for Server - FAILED kill -0 14527 >/dev/null 2>/dev/null selfserv_9591 with PID 14527 found at Fri Jan 8 06:40:19 EST 2016 selfserv_9591 with PID 14527 started at Fri Jan 8 06:40:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8375: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14527 at Fri Jan 8 06:40:20 EST 2016 kill -USR1 14527 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14527 killed at Fri Jan 8 06:40:20 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:40:20 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:40:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:40:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8376: Waiting for Server - FAILED kill -0 14597 >/dev/null 2>/dev/null selfserv_9591 with PID 14597 found at Fri Jan 8 06:40:26 EST 2016 selfserv_9591 with PID 14597 started at Fri Jan 8 06:40:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8377: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14597 at Fri Jan 8 06:40:26 EST 2016 kill -USR1 14597 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14597 killed at Fri Jan 8 06:40:27 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:40:27 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:40:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:40:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8378: Waiting for Server - FAILED kill -0 14666 >/dev/null 2>/dev/null selfserv_9591 with PID 14666 found at Fri Jan 8 06:40:33 EST 2016 selfserv_9591 with PID 14666 started at Fri Jan 8 06:40:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8379: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14666 at Fri Jan 8 06:40:33 EST 2016 kill -USR1 14666 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14666 killed at Fri Jan 8 06:40:34 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:40:34 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:40:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:40:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8380: Waiting for Server - FAILED kill -0 14735 >/dev/null 2>/dev/null selfserv_9591 with PID 14735 found at Fri Jan 8 06:40:40 EST 2016 selfserv_9591 with PID 14735 started at Fri Jan 8 06:40:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8381: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14735 at Fri Jan 8 06:40:40 EST 2016 kill -USR1 14735 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14735 killed at Fri Jan 8 06:40:41 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:40:41 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:40:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:40:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8382: Waiting for Server - FAILED kill -0 14805 >/dev/null 2>/dev/null selfserv_9591 with PID 14805 found at Fri Jan 8 06:40:47 EST 2016 selfserv_9591 with PID 14805 started at Fri Jan 8 06:40:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8383: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14805 at Fri Jan 8 06:40:47 EST 2016 kill -USR1 14805 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14805 killed at Fri Jan 8 06:40:48 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:40:48 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:40:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:40:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8384: Waiting for Server - FAILED kill -0 14874 >/dev/null 2>/dev/null selfserv_9591 with PID 14874 found at Fri Jan 8 06:40:54 EST 2016 selfserv_9591 with PID 14874 started at Fri Jan 8 06:40:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14874 at Fri Jan 8 06:40:54 EST 2016 kill -USR1 14874 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14874 killed at Fri Jan 8 06:40:55 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 06:40:55 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:40:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:41:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8386: Waiting for Server - FAILED kill -0 14943 >/dev/null 2>/dev/null selfserv_9591 with PID 14943 found at Fri Jan 8 06:41:01 EST 2016 selfserv_9591 with PID 14943 started at Fri Jan 8 06:41:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8387: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14943 at Fri Jan 8 06:41:01 EST 2016 kill -USR1 14943 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14943 killed at Fri Jan 8 06:41:01 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:41:02 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:41:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:41:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8388: Waiting for Server - FAILED kill -0 15013 >/dev/null 2>/dev/null selfserv_9591 with PID 15013 found at Fri Jan 8 06:41:07 EST 2016 selfserv_9591 with PID 15013 started at Fri Jan 8 06:41:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8389: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15013 at Fri Jan 8 06:41:08 EST 2016 kill -USR1 15013 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15013 killed at Fri Jan 8 06:41:08 EST 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 06:41:09 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:41:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:41:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8390: Waiting for Server - FAILED kill -0 15196 >/dev/null 2>/dev/null selfserv_9591 with PID 15196 found at Fri Jan 8 06:41:15 EST 2016 selfserv_9591 with PID 15196 started at Fri Jan 8 06:41:15 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 06:41:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:41:15 EST 2016 ssl.sh: #8391: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 15196 at Fri Jan 8 06:41:15 EST 2016 kill -USR1 15196 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15196 killed at Fri Jan 8 06:41:16 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 06:41:16 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:41:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:41:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8392: Waiting for Server - FAILED kill -0 15275 >/dev/null 2>/dev/null selfserv_9591 with PID 15275 found at Fri Jan 8 06:41:22 EST 2016 selfserv_9591 with PID 15275 started at Fri Jan 8 06:41:22 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 06:41:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:41:22 EST 2016 ssl.sh: #8393: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 15275 at Fri Jan 8 06:41:22 EST 2016 kill -USR1 15275 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15275 killed at Fri Jan 8 06:41:23 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9591 starting at Fri Jan 8 06:41:23 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:41:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:41:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8394: Waiting for Server - FAILED kill -0 15355 >/dev/null 2>/dev/null selfserv_9591 with PID 15355 found at Fri Jan 8 06:41:29 EST 2016 selfserv_9591 with PID 15355 started at Fri Jan 8 06:41:29 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 06:41:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:41:29 EST 2016 ssl.sh: #8395: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 15355 at Fri Jan 8 06:41:29 EST 2016 kill -USR1 15355 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15355 killed at Fri Jan 8 06:41:30 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9591 starting at Fri Jan 8 06:41:30 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:41:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:41:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8396: Waiting for Server - FAILED kill -0 15434 >/dev/null 2>/dev/null selfserv_9591 with PID 15434 found at Fri Jan 8 06:41:36 EST 2016 selfserv_9591 with PID 15434 started at Fri Jan 8 06:41:36 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 06:41:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:41:36 EST 2016 ssl.sh: #8397: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15434 at Fri Jan 8 06:41:36 EST 2016 kill -USR1 15434 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15434 killed at Fri Jan 8 06:41:37 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9591 starting at Fri Jan 8 06:41:37 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:41:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:41:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8398: Waiting for Server - FAILED kill -0 15513 >/dev/null 2>/dev/null selfserv_9591 with PID 15513 found at Fri Jan 8 06:41:43 EST 2016 selfserv_9591 with PID 15513 started at Fri Jan 8 06:41:43 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 06:41:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:41:43 EST 2016 ssl.sh: #8399: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 15513 at Fri Jan 8 06:41:43 EST 2016 kill -USR1 15513 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15513 killed at Fri Jan 8 06:41:44 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9591 starting at Fri Jan 8 06:41:44 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:41:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:41:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8400: Waiting for Server - FAILED kill -0 15593 >/dev/null 2>/dev/null selfserv_9591 with PID 15593 found at Fri Jan 8 06:41:50 EST 2016 selfserv_9591 with PID 15593 started at Fri Jan 8 06:41:50 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 06:41:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:41:50 EST 2016 ssl.sh: #8401: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15593 at Fri Jan 8 06:41:51 EST 2016 kill -USR1 15593 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15593 killed at Fri Jan 8 06:41:51 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9591 starting at Fri Jan 8 06:41:51 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:41:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:41:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8402: Waiting for Server - FAILED kill -0 15672 >/dev/null 2>/dev/null selfserv_9591 with PID 15672 found at Fri Jan 8 06:41:57 EST 2016 selfserv_9591 with PID 15672 started at Fri Jan 8 06:41:57 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 06:41:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:41:57 EST 2016 ssl.sh: #8403: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15672 at Fri Jan 8 06:41:58 EST 2016 kill -USR1 15672 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15672 killed at Fri Jan 8 06:41:58 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:41:58 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:41:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:42:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8404: Waiting for Server - FAILED kill -0 15780 >/dev/null 2>/dev/null selfserv_9591 with PID 15780 found at Fri Jan 8 06:42:04 EST 2016 selfserv_9591 with PID 15780 started at Fri Jan 8 06:42:04 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 06:42:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:42:05 EST 2016 ssl.sh: #8405: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15780 at Fri Jan 8 06:42:05 EST 2016 kill -USR1 15780 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15780 killed at Fri Jan 8 06:42:05 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:42:05 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:42:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:42:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8406: Waiting for Server - FAILED kill -0 15860 >/dev/null 2>/dev/null selfserv_9591 with PID 15860 found at Fri Jan 8 06:42:11 EST 2016 selfserv_9591 with PID 15860 started at Fri Jan 8 06:42:11 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 06:42:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:42:12 EST 2016 ssl.sh: #8407: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15860 at Fri Jan 8 06:42:12 EST 2016 kill -USR1 15860 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15860 killed at Fri Jan 8 06:42:12 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:42:12 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:42:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:42:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8408: Waiting for Server - FAILED kill -0 15940 >/dev/null 2>/dev/null selfserv_9591 with PID 15940 found at Fri Jan 8 06:42:18 EST 2016 selfserv_9591 with PID 15940 started at Fri Jan 8 06:42:18 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 06:42:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:42:19 EST 2016 ssl.sh: #8409: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15940 at Fri Jan 8 06:42:19 EST 2016 kill -USR1 15940 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15940 killed at Fri Jan 8 06:42:19 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:42:19 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:42:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:42:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8410: Waiting for Server - FAILED kill -0 16019 >/dev/null 2>/dev/null selfserv_9591 with PID 16019 found at Fri Jan 8 06:42:25 EST 2016 selfserv_9591 with PID 16019 started at Fri Jan 8 06:42:25 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 06:42:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:42:26 EST 2016 ssl.sh: #8411: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 16019 at Fri Jan 8 06:42:26 EST 2016 kill -USR1 16019 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16019 killed at Fri Jan 8 06:42:26 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 06:42:26 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:42:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:42:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8412: Waiting for Server - FAILED kill -0 16099 >/dev/null 2>/dev/null selfserv_9591 with PID 16099 found at Fri Jan 8 06:42:32 EST 2016 selfserv_9591 with PID 16099 started at Fri Jan 8 06:42:32 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 06:42:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:42:33 EST 2016 ssl.sh: #8413: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 16099 at Fri Jan 8 06:42:33 EST 2016 kill -USR1 16099 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16099 killed at Fri Jan 8 06:42:33 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:42:33 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:42:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:42:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8414: Waiting for Server - FAILED kill -0 16178 >/dev/null 2>/dev/null selfserv_9591 with PID 16178 found at Fri Jan 8 06:42:39 EST 2016 selfserv_9591 with PID 16178 started at Fri Jan 8 06:42:39 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 06:42:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:42:40 EST 2016 ssl.sh: #8415: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16178 at Fri Jan 8 06:42:40 EST 2016 kill -USR1 16178 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16178 killed at Fri Jan 8 06:42:40 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 06:42:40 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:42:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:42:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8416: Waiting for Server - FAILED kill -0 16258 >/dev/null 2>/dev/null selfserv_9591 with PID 16258 found at Fri Jan 8 06:42:46 EST 2016 selfserv_9591 with PID 16258 started at Fri Jan 8 06:42:46 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 06:42:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:42:47 EST 2016 ssl.sh: #8417: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16258 at Fri Jan 8 06:42:47 EST 2016 kill -USR1 16258 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16258 killed at Fri Jan 8 06:42:47 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:42:48 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:42:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:42:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8418: Waiting for Server - FAILED kill -0 16366 >/dev/null 2>/dev/null selfserv_9591 with PID 16366 found at Fri Jan 8 06:42:53 EST 2016 selfserv_9591 with PID 16366 started at Fri Jan 8 06:42:53 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:42:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:42:54 EST 2016 ssl.sh: #8419: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16366 at Fri Jan 8 06:42:54 EST 2016 kill -USR1 16366 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16366 killed at Fri Jan 8 06:42:54 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:42:55 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:42:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:43:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8420: Waiting for Server - FAILED kill -0 16445 >/dev/null 2>/dev/null selfserv_9591 with PID 16445 found at Fri Jan 8 06:43:00 EST 2016 selfserv_9591 with PID 16445 started at Fri Jan 8 06:43:00 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:43:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:43:01 EST 2016 ssl.sh: #8421: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16445 at Fri Jan 8 06:43:01 EST 2016 kill -USR1 16445 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16445 killed at Fri Jan 8 06:43:01 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:43:02 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:43:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:43:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8422: Waiting for Server - FAILED kill -0 16525 >/dev/null 2>/dev/null selfserv_9591 with PID 16525 found at Fri Jan 8 06:43:07 EST 2016 selfserv_9591 with PID 16525 started at Fri Jan 8 06:43:08 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:43:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:43:08 EST 2016 ssl.sh: #8423: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16525 at Fri Jan 8 06:43:08 EST 2016 kill -USR1 16525 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16525 killed at Fri Jan 8 06:43:09 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:43:09 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:43:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:43:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8424: Waiting for Server - FAILED kill -0 16604 >/dev/null 2>/dev/null selfserv_9591 with PID 16604 found at Fri Jan 8 06:43:15 EST 2016 selfserv_9591 with PID 16604 started at Fri Jan 8 06:43:15 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:43:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:43:15 EST 2016 ssl.sh: #8425: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16604 at Fri Jan 8 06:43:15 EST 2016 kill -USR1 16604 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16604 killed at Fri Jan 8 06:43:16 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:43:16 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:43:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:43:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8426: Waiting for Server - FAILED kill -0 16683 >/dev/null 2>/dev/null selfserv_9591 with PID 16683 found at Fri Jan 8 06:43:22 EST 2016 selfserv_9591 with PID 16683 started at Fri Jan 8 06:43:22 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:43:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:43:22 EST 2016 ssl.sh: #8427: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16683 at Fri Jan 8 06:43:22 EST 2016 kill -USR1 16683 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16683 killed at Fri Jan 8 06:43:23 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9591 starting at Fri Jan 8 06:43:23 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:43:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:43:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8428: Waiting for Server - FAILED kill -0 16763 >/dev/null 2>/dev/null selfserv_9591 with PID 16763 found at Fri Jan 8 06:43:29 EST 2016 selfserv_9591 with PID 16763 started at Fri Jan 8 06:43:29 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 06:43:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:43:29 EST 2016 ssl.sh: #8429: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 16763 at Fri Jan 8 06:43:29 EST 2016 kill -USR1 16763 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16763 killed at Fri Jan 8 06:43:30 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9591 starting at Fri Jan 8 06:43:30 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:43:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:43:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8430: Waiting for Server - FAILED kill -0 16842 >/dev/null 2>/dev/null selfserv_9591 with PID 16842 found at Fri Jan 8 06:43:36 EST 2016 selfserv_9591 with PID 16842 started at Fri Jan 8 06:43:36 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 06:43:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:43:36 EST 2016 ssl.sh: #8431: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 16842 at Fri Jan 8 06:43:36 EST 2016 kill -USR1 16842 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16842 killed at Fri Jan 8 06:43:37 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9591 starting at Fri Jan 8 06:43:37 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:43:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:43:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8432: Waiting for Server - FAILED kill -0 16921 >/dev/null 2>/dev/null selfserv_9591 with PID 16921 found at Fri Jan 8 06:43:43 EST 2016 selfserv_9591 with PID 16921 started at Fri Jan 8 06:43:43 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 06:43:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:43:43 EST 2016 ssl.sh: #8433: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 16921 at Fri Jan 8 06:43:43 EST 2016 kill -USR1 16921 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16921 killed at Fri Jan 8 06:43:44 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 06:43:44 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:43:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:43:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8434: Waiting for Server - FAILED kill -0 17001 >/dev/null 2>/dev/null selfserv_9591 with PID 17001 found at Fri Jan 8 06:43:50 EST 2016 selfserv_9591 with PID 17001 started at Fri Jan 8 06:43:50 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 06:43:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:43:50 EST 2016 ssl.sh: #8435: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17001 at Fri Jan 8 06:43:50 EST 2016 kill -USR1 17001 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17001 killed at Fri Jan 8 06:43:51 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 06:43:51 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:43:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:43:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8436: Waiting for Server - FAILED kill -0 17080 >/dev/null 2>/dev/null selfserv_9591 with PID 17080 found at Fri Jan 8 06:43:57 EST 2016 selfserv_9591 with PID 17080 started at Fri Jan 8 06:43:57 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 06:43:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:43:57 EST 2016 ssl.sh: #8437: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17080 at Fri Jan 8 06:43:57 EST 2016 kill -USR1 17080 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17080 killed at Fri Jan 8 06:43:58 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:43:58 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:43:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:44:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8438: Waiting for Server - FAILED kill -0 17180 >/dev/null 2>/dev/null selfserv_9591 with PID 17180 found at Fri Jan 8 06:44:04 EST 2016 selfserv_9591 with PID 17180 started at Fri Jan 8 06:44:04 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 06:44:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:44:04 EST 2016 ssl.sh: #8439: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17180 at Fri Jan 8 06:44:04 EST 2016 kill -USR1 17180 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17180 killed at Fri Jan 8 06:44:05 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:44:05 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:44:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:44:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8440: Waiting for Server - FAILED kill -0 17260 >/dev/null 2>/dev/null selfserv_9591 with PID 17260 found at Fri Jan 8 06:44:11 EST 2016 selfserv_9591 with PID 17260 started at Fri Jan 8 06:44:11 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 06:44:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:44:11 EST 2016 ssl.sh: #8441: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 17260 at Fri Jan 8 06:44:11 EST 2016 kill -USR1 17260 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17260 killed at Fri Jan 8 06:44:12 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:44:12 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:44:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:44:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8442: Waiting for Server - FAILED kill -0 17339 >/dev/null 2>/dev/null selfserv_9591 with PID 17339 found at Fri Jan 8 06:44:18 EST 2016 selfserv_9591 with PID 17339 started at Fri Jan 8 06:44:18 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 06:44:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:44:18 EST 2016 ssl.sh: #8443: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17339 at Fri Jan 8 06:44:18 EST 2016 kill -USR1 17339 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17339 killed at Fri Jan 8 06:44:19 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:44:19 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:44:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:44:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8444: Waiting for Server - FAILED kill -0 17418 >/dev/null 2>/dev/null selfserv_9591 with PID 17418 found at Fri Jan 8 06:44:25 EST 2016 selfserv_9591 with PID 17418 started at Fri Jan 8 06:44:25 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 06:44:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:44:25 EST 2016 ssl.sh: #8445: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17418 at Fri Jan 8 06:44:25 EST 2016 kill -USR1 17418 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17418 killed at Fri Jan 8 06:44:26 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9591 starting at Fri Jan 8 06:44:26 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:44:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:44:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8446: Waiting for Server - FAILED kill -0 17498 >/dev/null 2>/dev/null selfserv_9591 with PID 17498 found at Fri Jan 8 06:44:32 EST 2016 selfserv_9591 with PID 17498 started at Fri Jan 8 06:44:32 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 06:44:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:44:32 EST 2016 ssl.sh: #8447: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 17498 at Fri Jan 8 06:44:32 EST 2016 kill -USR1 17498 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17498 killed at Fri Jan 8 06:44:33 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:44:33 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:44:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:44:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8448: Waiting for Server - FAILED kill -0 17577 >/dev/null 2>/dev/null selfserv_9591 with PID 17577 found at Fri Jan 8 06:44:39 EST 2016 selfserv_9591 with PID 17577 started at Fri Jan 8 06:44:39 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 06:44:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:44:39 EST 2016 ssl.sh: #8449: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17577 at Fri Jan 8 06:44:40 EST 2016 kill -USR1 17577 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17577 killed at Fri Jan 8 06:44:40 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:44:40 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:44:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:44:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8450: Waiting for Server - FAILED kill -0 17677 >/dev/null 2>/dev/null selfserv_9591 with PID 17677 found at Fri Jan 8 06:44:46 EST 2016 selfserv_9591 with PID 17677 started at Fri Jan 8 06:44:46 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:44:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:44:47 EST 2016 ssl.sh: #8451: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17677 at Fri Jan 8 06:44:47 EST 2016 kill -USR1 17677 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17677 killed at Fri Jan 8 06:44:47 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9591 starting at Fri Jan 8 06:44:47 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:44:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:44:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8452: Waiting for Server - FAILED kill -0 17757 >/dev/null 2>/dev/null selfserv_9591 with PID 17757 found at Fri Jan 8 06:44:53 EST 2016 selfserv_9591 with PID 17757 started at Fri Jan 8 06:44:53 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 06:44:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:44:54 EST 2016 ssl.sh: #8453: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 17757 at Fri Jan 8 06:44:54 EST 2016 kill -USR1 17757 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17757 killed at Fri Jan 8 06:44:54 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:44:54 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:44:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:45:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8454: Waiting for Server - FAILED kill -0 17836 >/dev/null 2>/dev/null selfserv_9591 with PID 17836 found at Fri Jan 8 06:45:00 EST 2016 selfserv_9591 with PID 17836 started at Fri Jan 8 06:45:00 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:45:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:45:01 EST 2016 ssl.sh: #8455: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17836 at Fri Jan 8 06:45:01 EST 2016 kill -USR1 17836 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17836 killed at Fri Jan 8 06:45:01 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:45:01 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:45:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:45:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8456: Waiting for Server - FAILED kill -0 17915 >/dev/null 2>/dev/null selfserv_9591 with PID 17915 found at Fri Jan 8 06:45:07 EST 2016 selfserv_9591 with PID 17915 started at Fri Jan 8 06:45:07 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:45:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:45:08 EST 2016 ssl.sh: #8457: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17915 at Fri Jan 8 06:45:08 EST 2016 kill -USR1 17915 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17915 killed at Fri Jan 8 06:45:08 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:45:08 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:45:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:45:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8458: Waiting for Server - FAILED kill -0 18009 >/dev/null 2>/dev/null selfserv_9591 with PID 18009 found at Fri Jan 8 06:45:14 EST 2016 selfserv_9591 with PID 18009 started at Fri Jan 8 06:45:14 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:45:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:45:15 EST 2016 ssl.sh: #8459: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 18009 at Fri Jan 8 06:45:15 EST 2016 kill -USR1 18009 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18009 killed at Fri Jan 8 06:45:15 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9591 starting at Fri Jan 8 06:45:15 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:45:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:45:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8460: Waiting for Server - FAILED kill -0 18102 >/dev/null 2>/dev/null selfserv_9591 with PID 18102 found at Fri Jan 8 06:45:21 EST 2016 selfserv_9591 with PID 18102 started at Fri Jan 8 06:45:21 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:45:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:45:22 EST 2016 ssl.sh: #8461: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 18102 at Fri Jan 8 06:45:22 EST 2016 kill -USR1 18102 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18102 killed at Fri Jan 8 06:45:22 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:45:22 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:45:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:45:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8462: Waiting for Server - FAILED kill -0 18181 >/dev/null 2>/dev/null selfserv_9591 with PID 18181 found at Fri Jan 8 06:45:28 EST 2016 selfserv_9591 with PID 18181 started at Fri Jan 8 06:45:28 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:45:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:45:29 EST 2016 ssl.sh: #8463: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 18181 at Fri Jan 8 06:45:29 EST 2016 kill -USR1 18181 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18181 killed at Fri Jan 8 06:45:29 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 06:45:29 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:45:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:45:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8464: Waiting for Server - FAILED kill -0 18261 >/dev/null 2>/dev/null selfserv_9591 with PID 18261 found at Fri Jan 8 06:45:35 EST 2016 selfserv_9591 with PID 18261 started at Fri Jan 8 06:45:35 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 06:45:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:45:36 EST 2016 ssl.sh: #8465: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 18261 at Fri Jan 8 06:45:36 EST 2016 kill -USR1 18261 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18261 killed at Fri Jan 8 06:45:36 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:45:37 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:45:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:45:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8466: Waiting for Server - FAILED kill -0 18361 >/dev/null 2>/dev/null selfserv_9591 with PID 18361 found at Fri Jan 8 06:45:42 EST 2016 selfserv_9591 with PID 18361 started at Fri Jan 8 06:45:42 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 06:45:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:45:43 EST 2016 ssl.sh: #8467: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 18361 at Fri Jan 8 06:45:43 EST 2016 kill -USR1 18361 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18361 killed at Fri Jan 8 06:45:43 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9591 starting at Fri Jan 8 06:45:44 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:45:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:45:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8468: Waiting for Server - FAILED kill -0 18440 >/dev/null 2>/dev/null selfserv_9591 with PID 18440 found at Fri Jan 8 06:45:49 EST 2016 selfserv_9591 with PID 18440 started at Fri Jan 8 06:45:50 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 06:45:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:45:50 EST 2016 ssl.sh: #8469: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 18440 at Fri Jan 8 06:45:50 EST 2016 kill -USR1 18440 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18440 killed at Fri Jan 8 06:45:51 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 06:45:51 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 06:45:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 06:45:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8470: Waiting for Server - FAILED kill -0 18534 >/dev/null 2>/dev/null selfserv_9591 with PID 18534 found at Fri Jan 8 06:45:57 EST 2016 selfserv_9591 with PID 18534 started at Fri Jan 8 06:45:57 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 06:45:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 06:45:57 EST 2016 ssl.sh: #8471: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 18534 at Fri Jan 8 06:45:57 EST 2016 kill -USR1 18534 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18534 killed at Fri Jan 8 06:45:58 EST 2016 TIMESTAMP ssl END: Fri Jan 8 06:45:58 EST 2016 Running tests for ocsp TIMESTAMP ocsp BEGIN: Fri Jan 8 06:45:58 EST 2016 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Fri Jan 8 06:45:58 EST 2016 Running tests for pkits TIMESTAMP pkits BEGIN: Fri Jan 8 06:45:58 EST 2016 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Fri Jan 8 06:45:58 EST 2016 Running tests for chains TIMESTAMP chains BEGIN: Fri Jan 8 06:45:58 EST 2016 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #8472: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064559 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8473: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #8474: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #8475: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #8476: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8477: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8478: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8479: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #8480: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #8481: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8482: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8483: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8484: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #8485: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #8486: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8487: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9602 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8488: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8489: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #8490: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #8491: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8492: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8493: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8494: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #8495: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8496: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8497: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8498: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #8499: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8500: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8501: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8502: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #8503: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8504: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8505: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8506: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #8507: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8508: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9602 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8509: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8510: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #8511: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8512: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8513: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8514: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #8515: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8516: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8517: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8518: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #8519: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8520: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9602 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8521: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8522: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #8523: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8524: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8525: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8526: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #8527: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8528: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8529: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8530: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #8531: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8532: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9602 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8533: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8534: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160108114857Z nextupdate=20170108114857Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Jan 08 11:48:57 2016 Next Update: Sun Jan 08 11:48:57 2017 CRL Extensions: chains.sh: #8535: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160108114858Z addcert 2 20160108114858Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Jan 08 11:48:58 2016 Next Update: Sun Jan 08 11:48:57 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 11:48:58 2016 CRL Extensions: chains.sh: #8536: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108114859Z nextupdate=20170108114859Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 11:48:59 2016 Next Update: Sun Jan 08 11:48:59 2017 CRL Extensions: chains.sh: #8537: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108114900Z addcert 2 20160108114900Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 11:49:00 2016 Next Update: Sun Jan 08 11:48:59 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 11:49:00 2016 CRL Extensions: chains.sh: #8538: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108114901Z addcert 4 20160108114901Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 11:49:01 2016 Next Update: Sun Jan 08 11:48:59 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 11:49:00 2016 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Fri Jan 08 11:49:01 2016 CRL Extensions: chains.sh: #8539: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108114902Z nextupdate=20170108114902Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 11:49:02 2016 Next Update: Sun Jan 08 11:49:02 2017 CRL Extensions: chains.sh: #8540: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108114903Z addcert 2 20160108114903Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 11:49:03 2016 Next Update: Sun Jan 08 11:49:02 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 11:49:03 2016 CRL Extensions: chains.sh: #8541: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108114904Z addcert 3 20160108114904Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 11:49:04 2016 Next Update: Sun Jan 08 11:49:02 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 11:49:03 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Jan 08 11:49:04 2016 CRL Extensions: chains.sh: #8542: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108114904Z nextupdate=20170108114904Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 11:49:04 2016 Next Update: Sun Jan 08 11:49:04 2017 CRL Extensions: chains.sh: #8543: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108114905Z addcert 2 20160108114905Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 11:49:05 2016 Next Update: Sun Jan 08 11:49:04 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 11:49:05 2016 CRL Extensions: chains.sh: #8544: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108114906Z addcert 3 20160108114906Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 11:49:06 2016 Next Update: Sun Jan 08 11:49:04 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 11:49:05 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Jan 08 11:49:06 2016 CRL Extensions: chains.sh: #8545: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #8546: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #8547: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #8548: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #8549: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #8550: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #8551: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #8552: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #8553: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #8554: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #8555: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #8556: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #8557: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #8558: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #8559: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #8560: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #8561: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #8562: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #8563: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #8564: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #8565: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #8566: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #8567: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #8568: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #8569: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Fri Jan 8 06:49:20 EST 2016 httpserv -D -p 9601 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/aiahttp/http_pid.18586 & trying to connect to httpserv at Fri Jan 8 06:49:20 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 06:49:25 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #8570: Waiting for Server - FAILED kill -0 20016 >/dev/null 2>/dev/null httpserv with PID 20016 found at Fri Jan 8 06:49:26 EST 2016 httpserv with PID 20016 started at Fri Jan 8 06:49:26 EST 2016 tstclnt -h localhost.localdomain -p 9601 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #8571: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 20016 at Fri Jan 8 06:49:27 EST 2016 kill -USR1 20016 httpserv: normal termination httpserv -b -p 9601 2>/dev/null; httpserv with PID 20016 killed at Fri Jan 8 06:49:27 EST 2016 httpserv starting at Fri Jan 8 06:49:27 EST 2016 httpserv -D -p 9601 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/aiahttp/http_pid.18586 & trying to connect to httpserv at Fri Jan 8 06:49:27 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 06:49:33 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #8572: Waiting for Server - FAILED kill -0 20101 >/dev/null 2>/dev/null httpserv with PID 20101 found at Fri Jan 8 06:49:33 EST 2016 httpserv with PID 20101 started at Fri Jan 8 06:49:33 EST 2016 tstclnt -h localhost.localdomain -p 9601 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #8573: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 20101 at Fri Jan 8 06:49:35 EST 2016 kill -USR1 20101 httpserv: normal termination httpserv -b -p 9601 2>/dev/null; httpserv with PID 20101 killed at Fri Jan 8 06:49:35 EST 2016 httpserv starting at Fri Jan 8 06:49:35 EST 2016 httpserv -D -p 9601 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/aiahttp/http_pid.18586 & trying to connect to httpserv at Fri Jan 8 06:49:35 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 06:49:41 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #8574: Waiting for Server - FAILED kill -0 20187 >/dev/null 2>/dev/null httpserv with PID 20187 found at Fri Jan 8 06:49:41 EST 2016 httpserv with PID 20187 started at Fri Jan 8 06:49:41 EST 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #8575: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064560 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8576: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #8577: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #8578: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064561 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8579: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #8580: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #8581: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8582: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108064562 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8583: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8584: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108064563 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8585: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8586: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #8587: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8588: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8589: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 108064564 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8590: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8591: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8592: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #8593: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #8594: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064561 (0x670ef31) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 11:50:00 2016 Not After : Fri Jan 08 11:50:00 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:2c:cb:c1:cf:50:93:a2:35:64:2f:bf:c5:08:09:88: 6a:10:05:f4:6e:18:41:03:45:2d:fe:ef:0a:e4:1f:21: a1:0b:0b:9f:38:b2:6b:b9:94:73:25:33:30:75:f0:e2: 91:d6:ff:c0:80:ff:ab:30:93:d0:96:26:86:80:1a:ca: a6:da:28:fe:ad:ed:4c:77:14:a7:5d:62:be:f2:cf:39: ee:8d:af:a7:77:32:f9:da:90:eb:ee:e9:19:1c:e9:a2: fc:0c:16:fb:d4:74:00:e8:34:ed:26:d8:cb:6f:1f:3f: 69:a8:83:5c:ab:03:17:3a:f8:5d:79:8b:01:c2:19:fe: 07:f5:03:37:4d:85:32:b5:5f:7a:6d:bb:62:22:bc:93: 1f:5d:c8:b5:2b:d8:d0:a7:ef:15:44:9b:15:ca:e1:54: c9:4c:3e:48:70:7a:d1:e9:b5:73:63:df:04:3b:e1:9a: 17:ec:86:a8:07:bd:dc:1d:9f:f8:76:77:b9:cf:1b:41: 2a:6d:c3:f3:8a:80:d7:57:a4:68:3c:99:2b:23:42:ef: 6a:30:df:a5:9c:b1:03:20:3d:81:52:5c:d9:a8:0c:99: 8f:81:55:4a:b1:97:a8:51:88:7a:d9:3f:2a:f7:ce:3b: e6:44:e0:a1:31:b9:e1:63:b3:98:a7:9a:9d:98:60:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:08:f5:e8:b5:5a:d2:bb:00:7c:f3:00:7a:d2:ec:3a: ef:fc:4e:48:e3:6d:34:13:57:7c:93:1b:00:22:b5:06: e2:bf:dd:32:f8:f6:1f:85:f8:57:80:6f:b0:cf:04:45: 68:04:20:7a:7b:d3:10:3f:19:49:ae:15:51:7f:e9:68: 7f:f8:de:3c:f5:73:98:da:da:a0:cb:4b:b0:c1:84:c0: 18:93:0a:40:d7:6c:d9:81:61:fd:f4:a4:dd:03:a2:be: c7:7f:2d:d0:5e:08:37:57:76:19:e9:ad:77:23:d5:f9: 26:4e:a6:7a:46:20:66:fd:2a:ec:31:a1:99:8f:14:f0: 26:5d:6d:49:24:71:65:6f:ba:f4:be:d3:19:2c:b2:20: 66:42:b2:55:98:d5:39:bd:4b:5b:45:a0:a5:5a:ad:d7: f5:40:a2:45:41:10:e8:a3:cb:07:c0:91:9b:75:47:0f: 93:57:95:1c:47:b7:40:80:25:69:91:c3:00:24:d0:98: 57:43:96:c9:b7:2f:3a:bb:27:f2:15:4e:55:cb:a0:7f: c8:e1:d1:66:8f:8f:fa:36:73:45:aa:67:32:31:cd:e6: a3:62:1a:63:66:b0:ce:c5:2d:8f:b6:d6:a3:6e:b9:04: 7e:83:9f:9b:84:2c:3d:9f:4e:dd:11:9e:f9:53:61:a6 Fingerprint (SHA-256): E4:DE:B0:EA:42:AD:3C:72:48:94:9B:C5:5A:DB:0B:CA:F2:1A:72:8D:88:5A:A9:52:8D:E8:66:1D:F8:2B:82:41 Fingerprint (SHA1): C1:19:0B:BA:35:1D:FE:3B:92:E5:58:BA:82:D3:18:53:18:B8:A7:15 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8595: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064560 (0x670ef30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 11:49:51 2016 Not After : Fri Jan 08 11:49:51 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:57:48:aa:95:5b:eb:ce:e9:f6:61:a1:1c:71:50:03: 5d:ec:18:a7:a1:a5:3c:6e:bb:c7:56:bc:e9:7e:9c:2a: 1f:f4:a7:68:17:27:46:1c:80:07:34:9e:0f:b9:ca:68: 12:a5:5c:a8:8a:4c:83:fb:80:e2:af:29:eb:26:e7:b2: 23:fe:ff:d3:59:83:74:d7:7e:93:95:37:99:27:03:4a: ec:80:a2:dc:89:0f:26:11:c5:11:51:2a:df:33:8e:6a: 0d:9e:49:03:9a:ef:2c:d9:d9:ed:60:84:29:b1:a6:50: 74:c6:72:75:dd:91:41:52:9c:0d:71:fc:19:43:58:b8: e2:fa:f4:e4:93:e7:d0:7f:24:05:44:ec:0c:25:b2:d1: aa:22:9f:24:2d:ab:b5:8f:b6:d1:d4:a3:0c:b5:ad:79: 31:15:e1:9e:ae:e3:7b:40:c4:e6:84:02:94:ed:41:b4: a8:7e:0d:84:62:7f:d7:f7:51:a5:fa:2e:38:5e:ae:0e: b4:42:b0:c0:08:55:b6:11:6d:22:8c:28:0d:cb:e2:b9: da:ad:f6:6a:a1:ae:48:16:7d:52:30:c9:95:ed:8b:5a: 90:a0:a0:eb:6d:b8:ba:ac:3b:74:51:36:87:12:56:9f: 55:51:ea:76:f5:30:80:3f:04:82:21:cb:ff:2a:9c:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:65:aa:8b:47:fa:2f:d3:9c:9e:98:5c:4c:b3:67:ec: 1e:b8:72:4a:6f:12:a2:57:d5:7b:44:97:85:38:f4:b9: cf:61:c1:91:5a:fb:cc:61:f1:3c:af:61:10:32:c3:4f: 89:92:4a:b6:fb:a2:a3:52:46:ee:56:23:1f:55:bd:f8: 7a:fc:38:36:36:df:ed:7f:bf:2b:fa:5a:30:b2:53:9e: 95:70:3a:64:e0:33:f3:ed:d9:ab:c3:31:c6:cb:5d:89: ed:88:33:6d:f6:2a:0f:3f:08:4b:01:1e:43:8f:9f:7f: 37:c0:7b:16:d6:80:3a:0a:10:7e:88:a0:56:dc:28:74: 45:9d:30:96:f0:63:f1:49:36:ae:8e:30:a2:7c:b5:14: 83:34:db:95:51:43:c3:1a:76:9b:00:49:5d:a9:a9:45: 81:3a:16:23:71:d1:bd:e6:66:f7:b6:6c:f7:1e:dc:a1: b7:ea:e5:69:16:3d:b0:ae:eb:63:e5:bc:72:60:0d:f2: cf:54:55:c1:33:ff:0a:9c:75:20:24:f5:ec:17:0e:66: e4:c4:c0:40:2b:43:51:95:89:09:8d:7b:6c:c4:da:9a: 0e:7c:81:8c:6c:af:ef:05:86:b6:d2:03:d4:1e:8e:17: 18:1d:ea:58:66:2d:df:ff:f9:38:f4:6c:4b:3b:27:c2 Fingerprint (SHA-256): 1C:F3:01:A9:58:EE:87:DC:0A:26:12:BA:28:AE:63:F5:F6:56:64:CD:53:82:19:3C:7B:64:AA:A0:EC:01:A9:F9 Fingerprint (SHA1): 66:F5:C0:F7:19:FC:23:DA:13:6A:FB:85:EB:A4:18:40:B6:9C:4E:41 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8596: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8597: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #8598: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #8599: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064560 (0x670ef30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 11:49:51 2016 Not After : Fri Jan 08 11:49:51 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:57:48:aa:95:5b:eb:ce:e9:f6:61:a1:1c:71:50:03: 5d:ec:18:a7:a1:a5:3c:6e:bb:c7:56:bc:e9:7e:9c:2a: 1f:f4:a7:68:17:27:46:1c:80:07:34:9e:0f:b9:ca:68: 12:a5:5c:a8:8a:4c:83:fb:80:e2:af:29:eb:26:e7:b2: 23:fe:ff:d3:59:83:74:d7:7e:93:95:37:99:27:03:4a: ec:80:a2:dc:89:0f:26:11:c5:11:51:2a:df:33:8e:6a: 0d:9e:49:03:9a:ef:2c:d9:d9:ed:60:84:29:b1:a6:50: 74:c6:72:75:dd:91:41:52:9c:0d:71:fc:19:43:58:b8: e2:fa:f4:e4:93:e7:d0:7f:24:05:44:ec:0c:25:b2:d1: aa:22:9f:24:2d:ab:b5:8f:b6:d1:d4:a3:0c:b5:ad:79: 31:15:e1:9e:ae:e3:7b:40:c4:e6:84:02:94:ed:41:b4: a8:7e:0d:84:62:7f:d7:f7:51:a5:fa:2e:38:5e:ae:0e: b4:42:b0:c0:08:55:b6:11:6d:22:8c:28:0d:cb:e2:b9: da:ad:f6:6a:a1:ae:48:16:7d:52:30:c9:95:ed:8b:5a: 90:a0:a0:eb:6d:b8:ba:ac:3b:74:51:36:87:12:56:9f: 55:51:ea:76:f5:30:80:3f:04:82:21:cb:ff:2a:9c:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:65:aa:8b:47:fa:2f:d3:9c:9e:98:5c:4c:b3:67:ec: 1e:b8:72:4a:6f:12:a2:57:d5:7b:44:97:85:38:f4:b9: cf:61:c1:91:5a:fb:cc:61:f1:3c:af:61:10:32:c3:4f: 89:92:4a:b6:fb:a2:a3:52:46:ee:56:23:1f:55:bd:f8: 7a:fc:38:36:36:df:ed:7f:bf:2b:fa:5a:30:b2:53:9e: 95:70:3a:64:e0:33:f3:ed:d9:ab:c3:31:c6:cb:5d:89: ed:88:33:6d:f6:2a:0f:3f:08:4b:01:1e:43:8f:9f:7f: 37:c0:7b:16:d6:80:3a:0a:10:7e:88:a0:56:dc:28:74: 45:9d:30:96:f0:63:f1:49:36:ae:8e:30:a2:7c:b5:14: 83:34:db:95:51:43:c3:1a:76:9b:00:49:5d:a9:a9:45: 81:3a:16:23:71:d1:bd:e6:66:f7:b6:6c:f7:1e:dc:a1: b7:ea:e5:69:16:3d:b0:ae:eb:63:e5:bc:72:60:0d:f2: cf:54:55:c1:33:ff:0a:9c:75:20:24:f5:ec:17:0e:66: e4:c4:c0:40:2b:43:51:95:89:09:8d:7b:6c:c4:da:9a: 0e:7c:81:8c:6c:af:ef:05:86:b6:d2:03:d4:1e:8e:17: 18:1d:ea:58:66:2d:df:ff:f9:38:f4:6c:4b:3b:27:c2 Fingerprint (SHA-256): 1C:F3:01:A9:58:EE:87:DC:0A:26:12:BA:28:AE:63:F5:F6:56:64:CD:53:82:19:3C:7B:64:AA:A0:EC:01:A9:F9 Fingerprint (SHA1): 66:F5:C0:F7:19:FC:23:DA:13:6A:FB:85:EB:A4:18:40:B6:9C:4E:41 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8600: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064561 (0x670ef31) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 11:50:00 2016 Not After : Fri Jan 08 11:50:00 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:2c:cb:c1:cf:50:93:a2:35:64:2f:bf:c5:08:09:88: 6a:10:05:f4:6e:18:41:03:45:2d:fe:ef:0a:e4:1f:21: a1:0b:0b:9f:38:b2:6b:b9:94:73:25:33:30:75:f0:e2: 91:d6:ff:c0:80:ff:ab:30:93:d0:96:26:86:80:1a:ca: a6:da:28:fe:ad:ed:4c:77:14:a7:5d:62:be:f2:cf:39: ee:8d:af:a7:77:32:f9:da:90:eb:ee:e9:19:1c:e9:a2: fc:0c:16:fb:d4:74:00:e8:34:ed:26:d8:cb:6f:1f:3f: 69:a8:83:5c:ab:03:17:3a:f8:5d:79:8b:01:c2:19:fe: 07:f5:03:37:4d:85:32:b5:5f:7a:6d:bb:62:22:bc:93: 1f:5d:c8:b5:2b:d8:d0:a7:ef:15:44:9b:15:ca:e1:54: c9:4c:3e:48:70:7a:d1:e9:b5:73:63:df:04:3b:e1:9a: 17:ec:86:a8:07:bd:dc:1d:9f:f8:76:77:b9:cf:1b:41: 2a:6d:c3:f3:8a:80:d7:57:a4:68:3c:99:2b:23:42:ef: 6a:30:df:a5:9c:b1:03:20:3d:81:52:5c:d9:a8:0c:99: 8f:81:55:4a:b1:97:a8:51:88:7a:d9:3f:2a:f7:ce:3b: e6:44:e0:a1:31:b9:e1:63:b3:98:a7:9a:9d:98:60:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:08:f5:e8:b5:5a:d2:bb:00:7c:f3:00:7a:d2:ec:3a: ef:fc:4e:48:e3:6d:34:13:57:7c:93:1b:00:22:b5:06: e2:bf:dd:32:f8:f6:1f:85:f8:57:80:6f:b0:cf:04:45: 68:04:20:7a:7b:d3:10:3f:19:49:ae:15:51:7f:e9:68: 7f:f8:de:3c:f5:73:98:da:da:a0:cb:4b:b0:c1:84:c0: 18:93:0a:40:d7:6c:d9:81:61:fd:f4:a4:dd:03:a2:be: c7:7f:2d:d0:5e:08:37:57:76:19:e9:ad:77:23:d5:f9: 26:4e:a6:7a:46:20:66:fd:2a:ec:31:a1:99:8f:14:f0: 26:5d:6d:49:24:71:65:6f:ba:f4:be:d3:19:2c:b2:20: 66:42:b2:55:98:d5:39:bd:4b:5b:45:a0:a5:5a:ad:d7: f5:40:a2:45:41:10:e8:a3:cb:07:c0:91:9b:75:47:0f: 93:57:95:1c:47:b7:40:80:25:69:91:c3:00:24:d0:98: 57:43:96:c9:b7:2f:3a:bb:27:f2:15:4e:55:cb:a0:7f: c8:e1:d1:66:8f:8f:fa:36:73:45:aa:67:32:31:cd:e6: a3:62:1a:63:66:b0:ce:c5:2d:8f:b6:d6:a3:6e:b9:04: 7e:83:9f:9b:84:2c:3d:9f:4e:dd:11:9e:f9:53:61:a6 Fingerprint (SHA-256): E4:DE:B0:EA:42:AD:3C:72:48:94:9B:C5:5A:DB:0B:CA:F2:1A:72:8D:88:5A:A9:52:8D:E8:66:1D:F8:2B:82:41 Fingerprint (SHA1): C1:19:0B:BA:35:1D:FE:3B:92:E5:58:BA:82:D3:18:53:18:B8:A7:15 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8601: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #8602: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #8603: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #8604: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8605: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8606: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064561 (0x670ef31) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 11:50:00 2016 Not After : Fri Jan 08 11:50:00 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:2c:cb:c1:cf:50:93:a2:35:64:2f:bf:c5:08:09:88: 6a:10:05:f4:6e:18:41:03:45:2d:fe:ef:0a:e4:1f:21: a1:0b:0b:9f:38:b2:6b:b9:94:73:25:33:30:75:f0:e2: 91:d6:ff:c0:80:ff:ab:30:93:d0:96:26:86:80:1a:ca: a6:da:28:fe:ad:ed:4c:77:14:a7:5d:62:be:f2:cf:39: ee:8d:af:a7:77:32:f9:da:90:eb:ee:e9:19:1c:e9:a2: fc:0c:16:fb:d4:74:00:e8:34:ed:26:d8:cb:6f:1f:3f: 69:a8:83:5c:ab:03:17:3a:f8:5d:79:8b:01:c2:19:fe: 07:f5:03:37:4d:85:32:b5:5f:7a:6d:bb:62:22:bc:93: 1f:5d:c8:b5:2b:d8:d0:a7:ef:15:44:9b:15:ca:e1:54: c9:4c:3e:48:70:7a:d1:e9:b5:73:63:df:04:3b:e1:9a: 17:ec:86:a8:07:bd:dc:1d:9f:f8:76:77:b9:cf:1b:41: 2a:6d:c3:f3:8a:80:d7:57:a4:68:3c:99:2b:23:42:ef: 6a:30:df:a5:9c:b1:03:20:3d:81:52:5c:d9:a8:0c:99: 8f:81:55:4a:b1:97:a8:51:88:7a:d9:3f:2a:f7:ce:3b: e6:44:e0:a1:31:b9:e1:63:b3:98:a7:9a:9d:98:60:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:08:f5:e8:b5:5a:d2:bb:00:7c:f3:00:7a:d2:ec:3a: ef:fc:4e:48:e3:6d:34:13:57:7c:93:1b:00:22:b5:06: e2:bf:dd:32:f8:f6:1f:85:f8:57:80:6f:b0:cf:04:45: 68:04:20:7a:7b:d3:10:3f:19:49:ae:15:51:7f:e9:68: 7f:f8:de:3c:f5:73:98:da:da:a0:cb:4b:b0:c1:84:c0: 18:93:0a:40:d7:6c:d9:81:61:fd:f4:a4:dd:03:a2:be: c7:7f:2d:d0:5e:08:37:57:76:19:e9:ad:77:23:d5:f9: 26:4e:a6:7a:46:20:66:fd:2a:ec:31:a1:99:8f:14:f0: 26:5d:6d:49:24:71:65:6f:ba:f4:be:d3:19:2c:b2:20: 66:42:b2:55:98:d5:39:bd:4b:5b:45:a0:a5:5a:ad:d7: f5:40:a2:45:41:10:e8:a3:cb:07:c0:91:9b:75:47:0f: 93:57:95:1c:47:b7:40:80:25:69:91:c3:00:24:d0:98: 57:43:96:c9:b7:2f:3a:bb:27:f2:15:4e:55:cb:a0:7f: c8:e1:d1:66:8f:8f:fa:36:73:45:aa:67:32:31:cd:e6: a3:62:1a:63:66:b0:ce:c5:2d:8f:b6:d6:a3:6e:b9:04: 7e:83:9f:9b:84:2c:3d:9f:4e:dd:11:9e:f9:53:61:a6 Fingerprint (SHA-256): E4:DE:B0:EA:42:AD:3C:72:48:94:9B:C5:5A:DB:0B:CA:F2:1A:72:8D:88:5A:A9:52:8D:E8:66:1D:F8:2B:82:41 Fingerprint (SHA1): C1:19:0B:BA:35:1D:FE:3B:92:E5:58:BA:82:D3:18:53:18:B8:A7:15 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8607: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064561 (0x670ef31) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 11:50:00 2016 Not After : Fri Jan 08 11:50:00 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:2c:cb:c1:cf:50:93:a2:35:64:2f:bf:c5:08:09:88: 6a:10:05:f4:6e:18:41:03:45:2d:fe:ef:0a:e4:1f:21: a1:0b:0b:9f:38:b2:6b:b9:94:73:25:33:30:75:f0:e2: 91:d6:ff:c0:80:ff:ab:30:93:d0:96:26:86:80:1a:ca: a6:da:28:fe:ad:ed:4c:77:14:a7:5d:62:be:f2:cf:39: ee:8d:af:a7:77:32:f9:da:90:eb:ee:e9:19:1c:e9:a2: fc:0c:16:fb:d4:74:00:e8:34:ed:26:d8:cb:6f:1f:3f: 69:a8:83:5c:ab:03:17:3a:f8:5d:79:8b:01:c2:19:fe: 07:f5:03:37:4d:85:32:b5:5f:7a:6d:bb:62:22:bc:93: 1f:5d:c8:b5:2b:d8:d0:a7:ef:15:44:9b:15:ca:e1:54: c9:4c:3e:48:70:7a:d1:e9:b5:73:63:df:04:3b:e1:9a: 17:ec:86:a8:07:bd:dc:1d:9f:f8:76:77:b9:cf:1b:41: 2a:6d:c3:f3:8a:80:d7:57:a4:68:3c:99:2b:23:42:ef: 6a:30:df:a5:9c:b1:03:20:3d:81:52:5c:d9:a8:0c:99: 8f:81:55:4a:b1:97:a8:51:88:7a:d9:3f:2a:f7:ce:3b: e6:44:e0:a1:31:b9:e1:63:b3:98:a7:9a:9d:98:60:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:08:f5:e8:b5:5a:d2:bb:00:7c:f3:00:7a:d2:ec:3a: ef:fc:4e:48:e3:6d:34:13:57:7c:93:1b:00:22:b5:06: e2:bf:dd:32:f8:f6:1f:85:f8:57:80:6f:b0:cf:04:45: 68:04:20:7a:7b:d3:10:3f:19:49:ae:15:51:7f:e9:68: 7f:f8:de:3c:f5:73:98:da:da:a0:cb:4b:b0:c1:84:c0: 18:93:0a:40:d7:6c:d9:81:61:fd:f4:a4:dd:03:a2:be: c7:7f:2d:d0:5e:08:37:57:76:19:e9:ad:77:23:d5:f9: 26:4e:a6:7a:46:20:66:fd:2a:ec:31:a1:99:8f:14:f0: 26:5d:6d:49:24:71:65:6f:ba:f4:be:d3:19:2c:b2:20: 66:42:b2:55:98:d5:39:bd:4b:5b:45:a0:a5:5a:ad:d7: f5:40:a2:45:41:10:e8:a3:cb:07:c0:91:9b:75:47:0f: 93:57:95:1c:47:b7:40:80:25:69:91:c3:00:24:d0:98: 57:43:96:c9:b7:2f:3a:bb:27:f2:15:4e:55:cb:a0:7f: c8:e1:d1:66:8f:8f:fa:36:73:45:aa:67:32:31:cd:e6: a3:62:1a:63:66:b0:ce:c5:2d:8f:b6:d6:a3:6e:b9:04: 7e:83:9f:9b:84:2c:3d:9f:4e:dd:11:9e:f9:53:61:a6 Fingerprint (SHA-256): E4:DE:B0:EA:42:AD:3C:72:48:94:9B:C5:5A:DB:0B:CA:F2:1A:72:8D:88:5A:A9:52:8D:E8:66:1D:F8:2B:82:41 Fingerprint (SHA1): C1:19:0B:BA:35:1D:FE:3B:92:E5:58:BA:82:D3:18:53:18:B8:A7:15 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8608: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #8609: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #8610: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #8611: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #8612: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #8613: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064560 (0x670ef30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 11:49:51 2016 Not After : Fri Jan 08 11:49:51 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:57:48:aa:95:5b:eb:ce:e9:f6:61:a1:1c:71:50:03: 5d:ec:18:a7:a1:a5:3c:6e:bb:c7:56:bc:e9:7e:9c:2a: 1f:f4:a7:68:17:27:46:1c:80:07:34:9e:0f:b9:ca:68: 12:a5:5c:a8:8a:4c:83:fb:80:e2:af:29:eb:26:e7:b2: 23:fe:ff:d3:59:83:74:d7:7e:93:95:37:99:27:03:4a: ec:80:a2:dc:89:0f:26:11:c5:11:51:2a:df:33:8e:6a: 0d:9e:49:03:9a:ef:2c:d9:d9:ed:60:84:29:b1:a6:50: 74:c6:72:75:dd:91:41:52:9c:0d:71:fc:19:43:58:b8: e2:fa:f4:e4:93:e7:d0:7f:24:05:44:ec:0c:25:b2:d1: aa:22:9f:24:2d:ab:b5:8f:b6:d1:d4:a3:0c:b5:ad:79: 31:15:e1:9e:ae:e3:7b:40:c4:e6:84:02:94:ed:41:b4: a8:7e:0d:84:62:7f:d7:f7:51:a5:fa:2e:38:5e:ae:0e: b4:42:b0:c0:08:55:b6:11:6d:22:8c:28:0d:cb:e2:b9: da:ad:f6:6a:a1:ae:48:16:7d:52:30:c9:95:ed:8b:5a: 90:a0:a0:eb:6d:b8:ba:ac:3b:74:51:36:87:12:56:9f: 55:51:ea:76:f5:30:80:3f:04:82:21:cb:ff:2a:9c:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:65:aa:8b:47:fa:2f:d3:9c:9e:98:5c:4c:b3:67:ec: 1e:b8:72:4a:6f:12:a2:57:d5:7b:44:97:85:38:f4:b9: cf:61:c1:91:5a:fb:cc:61:f1:3c:af:61:10:32:c3:4f: 89:92:4a:b6:fb:a2:a3:52:46:ee:56:23:1f:55:bd:f8: 7a:fc:38:36:36:df:ed:7f:bf:2b:fa:5a:30:b2:53:9e: 95:70:3a:64:e0:33:f3:ed:d9:ab:c3:31:c6:cb:5d:89: ed:88:33:6d:f6:2a:0f:3f:08:4b:01:1e:43:8f:9f:7f: 37:c0:7b:16:d6:80:3a:0a:10:7e:88:a0:56:dc:28:74: 45:9d:30:96:f0:63:f1:49:36:ae:8e:30:a2:7c:b5:14: 83:34:db:95:51:43:c3:1a:76:9b:00:49:5d:a9:a9:45: 81:3a:16:23:71:d1:bd:e6:66:f7:b6:6c:f7:1e:dc:a1: b7:ea:e5:69:16:3d:b0:ae:eb:63:e5:bc:72:60:0d:f2: cf:54:55:c1:33:ff:0a:9c:75:20:24:f5:ec:17:0e:66: e4:c4:c0:40:2b:43:51:95:89:09:8d:7b:6c:c4:da:9a: 0e:7c:81:8c:6c:af:ef:05:86:b6:d2:03:d4:1e:8e:17: 18:1d:ea:58:66:2d:df:ff:f9:38:f4:6c:4b:3b:27:c2 Fingerprint (SHA-256): 1C:F3:01:A9:58:EE:87:DC:0A:26:12:BA:28:AE:63:F5:F6:56:64:CD:53:82:19:3C:7B:64:AA:A0:EC:01:A9:F9 Fingerprint (SHA1): 66:F5:C0:F7:19:FC:23:DA:13:6A:FB:85:EB:A4:18:40:B6:9C:4E:41 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8614: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064560 (0x670ef30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 11:49:51 2016 Not After : Fri Jan 08 11:49:51 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:57:48:aa:95:5b:eb:ce:e9:f6:61:a1:1c:71:50:03: 5d:ec:18:a7:a1:a5:3c:6e:bb:c7:56:bc:e9:7e:9c:2a: 1f:f4:a7:68:17:27:46:1c:80:07:34:9e:0f:b9:ca:68: 12:a5:5c:a8:8a:4c:83:fb:80:e2:af:29:eb:26:e7:b2: 23:fe:ff:d3:59:83:74:d7:7e:93:95:37:99:27:03:4a: ec:80:a2:dc:89:0f:26:11:c5:11:51:2a:df:33:8e:6a: 0d:9e:49:03:9a:ef:2c:d9:d9:ed:60:84:29:b1:a6:50: 74:c6:72:75:dd:91:41:52:9c:0d:71:fc:19:43:58:b8: e2:fa:f4:e4:93:e7:d0:7f:24:05:44:ec:0c:25:b2:d1: aa:22:9f:24:2d:ab:b5:8f:b6:d1:d4:a3:0c:b5:ad:79: 31:15:e1:9e:ae:e3:7b:40:c4:e6:84:02:94:ed:41:b4: a8:7e:0d:84:62:7f:d7:f7:51:a5:fa:2e:38:5e:ae:0e: b4:42:b0:c0:08:55:b6:11:6d:22:8c:28:0d:cb:e2:b9: da:ad:f6:6a:a1:ae:48:16:7d:52:30:c9:95:ed:8b:5a: 90:a0:a0:eb:6d:b8:ba:ac:3b:74:51:36:87:12:56:9f: 55:51:ea:76:f5:30:80:3f:04:82:21:cb:ff:2a:9c:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:65:aa:8b:47:fa:2f:d3:9c:9e:98:5c:4c:b3:67:ec: 1e:b8:72:4a:6f:12:a2:57:d5:7b:44:97:85:38:f4:b9: cf:61:c1:91:5a:fb:cc:61:f1:3c:af:61:10:32:c3:4f: 89:92:4a:b6:fb:a2:a3:52:46:ee:56:23:1f:55:bd:f8: 7a:fc:38:36:36:df:ed:7f:bf:2b:fa:5a:30:b2:53:9e: 95:70:3a:64:e0:33:f3:ed:d9:ab:c3:31:c6:cb:5d:89: ed:88:33:6d:f6:2a:0f:3f:08:4b:01:1e:43:8f:9f:7f: 37:c0:7b:16:d6:80:3a:0a:10:7e:88:a0:56:dc:28:74: 45:9d:30:96:f0:63:f1:49:36:ae:8e:30:a2:7c:b5:14: 83:34:db:95:51:43:c3:1a:76:9b:00:49:5d:a9:a9:45: 81:3a:16:23:71:d1:bd:e6:66:f7:b6:6c:f7:1e:dc:a1: b7:ea:e5:69:16:3d:b0:ae:eb:63:e5:bc:72:60:0d:f2: cf:54:55:c1:33:ff:0a:9c:75:20:24:f5:ec:17:0e:66: e4:c4:c0:40:2b:43:51:95:89:09:8d:7b:6c:c4:da:9a: 0e:7c:81:8c:6c:af:ef:05:86:b6:d2:03:d4:1e:8e:17: 18:1d:ea:58:66:2d:df:ff:f9:38:f4:6c:4b:3b:27:c2 Fingerprint (SHA-256): 1C:F3:01:A9:58:EE:87:DC:0A:26:12:BA:28:AE:63:F5:F6:56:64:CD:53:82:19:3C:7B:64:AA:A0:EC:01:A9:F9 Fingerprint (SHA1): 66:F5:C0:F7:19:FC:23:DA:13:6A:FB:85:EB:A4:18:40:B6:9C:4E:41 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8615: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #8616: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064565 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8617: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #8618: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #8619: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064566 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8620: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #8621: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #8622: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064567 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8623: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #8624: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #8625: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064568 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8626: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #8627: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #8628: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064569 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8629: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #8630: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #8631: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064570 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8632: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #8633: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #8634: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064571 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8635: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #8636: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #8637: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064572 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8638: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #8639: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #8640: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064573 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8641: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #8642: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #8643: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8644: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 108064574 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8645: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8646: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 108064575 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8647: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8648: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 108064576 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8649: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8650: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #8651: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #8652: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8653: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 108064577 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8654: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8655: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 108064578 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8656: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8657: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 108064579 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8658: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8659: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #8660: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #8661: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8662: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 108064580 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8663: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8664: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 108064581 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8665: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8666: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 108064582 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8667: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8668: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #8669: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #8670: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8671: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 108064583 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8672: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8673: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 108064584 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8674: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8675: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 108064585 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8676: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8677: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #8678: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8679: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8680: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 108064586 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8681: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8682: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8683: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8684: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108064587 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8685: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8686: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064565 (0x670ef35) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Jan 08 11:50:54 2016 Not After : Fri Jan 08 11:50:54 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:b8:53:f9:83:89:2b:9a:a6:79:0e:a6:17:ae:af:29: 4f:10:90:57:b8:9a:48:ee:d3:bf:50:83:91:cd:9d:b0: 4c:bb:5d:55:59:82:1e:2b:a7:d7:3e:67:33:7a:82:f6: c7:4c:cf:0e:98:bb:e5:07:37:67:65:0e:9a:5f:ea:8c: 7f:01:2f:10:b0:1a:e3:d3:46:d7:2f:30:69:3e:91:61: 07:93:4a:85:95:37:f9:2a:34:14:c0:82:25:82:13:37: e0:de:c9:34:c2:aa:2b:99:bf:fa:1f:ad:15:1c:45:39: 98:f2:44:16:d7:e1:92:41:f7:df:9b:8f:cb:cf:c1:1f: f0:f2:f5:dc:1e:b8:93:d4:b2:8e:2a:44:4e:fa:e6:cf: ca:56:79:79:18:c3:58:be:54:4f:e4:e3:9a:8e:81:9b: c2:a4:01:fa:f6:2b:8e:8e:0b:3b:19:fb:94:bf:c9:4c: b2:d5:3a:c1:90:86:54:84:60:95:93:1e:2a:9f:8a:a8: 07:ba:7b:f4:52:54:a6:0b:2e:92:16:b8:73:2b:10:77: 0b:7c:0d:78:1f:e2:ff:45:8d:70:e5:47:44:55:84:5d: 21:e7:7c:12:c0:e9:68:fa:51:98:6e:fb:e9:f4:05:0c: f4:b8:1e:f7:5b:af:fc:9e:c8:0a:ac:bc:1d:ee:ae:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:26:72:c9:79:1a:42:7f:a6:f9:70:44:11:a8:f1:c8: 11:48:a0:27:0d:cd:fc:68:9d:4e:3c:a4:5c:60:00:cd: cc:90:a5:67:40:27:08:c8:0e:d2:6c:ea:b2:af:93:71: 51:c4:84:65:88:0d:57:3d:70:0e:bb:47:7e:1b:6b:9f: 33:7d:9e:27:05:5e:0e:ec:5c:4d:b9:50:d5:4d:6f:3c: 52:99:55:af:ce:8e:2c:af:a2:a7:bc:a7:f9:7a:20:85: d2:9f:62:b0:4b:ef:93:e4:38:9e:55:64:25:a8:0b:bb: 64:32:0a:1b:b3:9d:98:57:7c:76:72:57:c1:58:0d:4e: dc:64:a4:c7:f3:b5:80:ec:75:e6:6f:db:aa:f3:96:1e: 09:f7:04:d8:bb:9d:93:e8:75:51:89:7d:1b:56:ca:41: 27:a0:a9:f5:39:ef:b0:1e:1c:c0:4b:c4:81:ec:04:d0: 99:14:af:56:c7:45:f3:36:7e:e6:ec:65:c6:92:a3:87: fd:7c:75:13:ea:b8:42:c9:0a:39:cd:e1:bb:a4:d8:2d: 5d:4a:3d:eb:91:b4:0b:47:e9:a1:61:40:52:d2:1e:a2: be:ce:56:ff:0c:1c:4e:3a:21:2c:e1:8e:56:c4:48:fb: 7e:c8:a3:94:42:3e:ea:3f:2a:17:86:80:a7:d6:17:e9 Fingerprint (SHA-256): 49:6E:10:7A:CA:8A:52:3D:91:B5:C8:F2:54:D7:09:A0:F2:B3:51:DE:AC:F7:95:15:A0:40:34:B9:45:1A:A4:C6 Fingerprint (SHA1): 89:43:DB:4A:05:FA:5A:35:77:5D:01:0B:2B:47:1A:6A:C5:8A:7E:97 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #8687: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064566 (0x670ef36) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Jan 08 11:51:01 2016 Not After : Fri Jan 08 11:51:01 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:58:99:73:8d:48:da:8f:2b:80:65:10:f9:b2:86:3e: d7:9c:64:e9:28:3d:49:2c:43:92:48:7a:f5:35:9d:6f: f1:f8:5a:23:f4:a6:c2:f7:de:63:b2:a7:a2:91:71:4c: d7:59:66:5b:40:4b:d2:36:a5:90:c6:f5:e7:7a:b7:5b: 73:94:fe:9d:ea:0a:ab:41:06:dc:5c:c2:b2:3b:98:c5: 3c:8b:d1:a5:b9:ae:3f:42:01:46:3b:1a:ee:5c:34:4a: e6:b1:c7:fe:6e:19:1a:3c:27:6e:ba:dd:2b:59:48:42: fb:4f:7a:69:a3:81:35:71:ed:19:4d:1f:10:af:03:07: 83:dc:ca:f7:6a:4a:bb:cf:0e:42:a5:f5:ca:01:d5:4a: 11:e5:72:a7:32:c4:66:30:e0:b5:d1:53:55:20:f4:d5: a7:e7:47:7d:cd:0a:a6:ea:31:6d:09:b2:63:ba:1b:58: 1e:ae:4f:45:51:16:0e:9b:5f:9d:c9:6b:c6:18:26:5a: db:43:8c:f7:7a:28:50:0b:a5:e8:54:d6:12:c1:ed:a5: ba:ca:2a:f7:d6:b4:3d:db:db:3a:ea:8f:50:d0:3e:6f: 8d:4f:9b:aa:d9:b6:62:94:09:a9:54:51:d7:0d:32:76: f6:70:2d:aa:5c:6f:23:a0:65:4d:fd:47:98:13:9e:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:5d:4d:98:60:1a:88:37:15:81:e8:da:f5:e6:6f:29: 69:86:00:b2:c7:3f:f3:78:49:ef:ec:a9:ce:dc:ba:f7: e6:ef:c8:3e:73:c6:4e:a5:23:44:62:ee:03:46:23:4b: 09:ac:74:a2:62:b4:d2:fb:93:5a:b6:2e:4d:98:1d:7c: 5d:16:d2:83:08:79:2c:7c:0b:7e:1d:ff:63:90:5b:31: 59:8a:2f:87:ab:fb:c3:de:0c:5d:af:e7:b5:94:26:24: 1f:01:fb:f0:51:1e:bc:5e:53:80:f6:86:d4:9f:fa:05: 67:9b:c0:fb:79:be:6d:50:00:6f:d5:e3:95:f6:33:22: e0:75:30:fd:31:38:3e:a3:4a:d5:bf:23:35:52:cd:fe: ac:e5:05:cb:be:36:8e:46:90:9b:b2:df:a5:9f:1d:ca: b7:0a:f1:6a:21:1b:81:de:9c:7e:13:c8:67:44:2b:b7: 39:67:e0:a9:25:88:43:5e:10:0c:33:bb:0f:42:fe:97: e1:a3:df:ec:9f:20:ae:ec:49:35:70:1a:d3:a7:23:71: 51:7f:e2:76:2b:c4:d9:b7:0a:7e:6d:c4:0b:c7:1b:8f: ab:75:5c:ee:fd:2f:13:0b:5a:c1:11:7e:e1:28:e1:62: be:e8:7a:fb:74:1f:75:76:5c:bf:a1:73:f2:07:2e:10 Fingerprint (SHA-256): 99:85:06:76:DD:61:97:31:40:9B:52:80:FE:24:F6:60:85:24:65:F8:EE:09:37:CA:F1:CD:C0:20:20:6C:AA:13 Fingerprint (SHA1): D9:23:34:7D:C9:91:71:A3:3E:09:98:4A:54:85:ED:B9:49:3D:AE:7A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #8688: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064567 (0x670ef37) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Jan 08 11:51:17 2016 Not After : Fri Jan 08 11:51:17 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:83:d6:aa:11:dd:50:b2:63:f0:fe:e5:67:c2:da:a1: c1:99:da:26:d3:00:51:6a:e8:0e:0f:2e:1f:39:d7:f0: b3:ca:bf:db:ba:cd:54:18:3f:15:3f:3b:fa:bc:4f:34: 2b:fa:5d:7c:52:c1:3c:c7:a2:64:98:88:f0:4b:7f:dd: a7:e6:47:62:a4:0c:8a:d0:05:a9:f5:78:d3:9c:1b:02: 42:99:c3:2d:b5:2f:3d:cf:0f:8a:df:9b:b8:69:c8:c9: 52:e5:15:bf:b7:ac:fa:b1:b8:fc:b1:d8:c2:ef:f4:59: a9:14:63:23:3a:75:8e:24:af:a2:2f:7c:b0:70:a4:b2: 21:ba:52:2b:5a:02:95:ed:a3:f4:e6:65:82:9b:9e:bf: 3c:74:25:08:77:19:37:dd:00:07:26:b8:a9:63:44:9b: fa:7f:70:f8:ee:60:0e:84:0c:48:86:f8:3c:3a:36:e3: a6:40:ad:52:42:e3:dd:12:56:87:34:71:9e:0e:7a:8c: f9:8f:c1:15:8f:35:cf:4b:a8:8a:95:0e:46:28:44:06: b2:78:38:6f:0e:b0:20:91:bf:42:97:9c:66:06:3f:b4: c0:8e:ec:58:c5:e0:35:69:15:87:3c:33:5f:82:5c:93: 32:7f:6a:fa:d1:67:9d:07:f0:12:bb:a5:c7:44:80:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:0b:ea:37:dc:98:0d:b2:a2:ae:64:4f:59:7b:14:b2: 19:63:fd:fb:b8:bf:ca:9a:42:09:e1:9e:bb:a5:f3:90: d5:b4:86:4c:57:03:05:5f:87:39:11:d3:68:29:18:7b: 79:ec:19:47:7f:90:0d:92:25:a0:20:fd:8c:d7:0f:fc: e6:37:80:26:d4:0e:ed:ed:61:84:b5:5c:da:2a:02:c3: 76:b3:70:4e:e3:b1:94:3e:b9:8b:93:a3:cb:b8:d7:29: 2c:d5:ae:60:0f:0c:9f:0a:c3:84:b8:f0:0b:6a:89:d9: 6f:e4:83:45:0f:00:4e:59:c5:c6:9b:3c:93:ce:27:a7: 5c:18:79:01:cd:70:c6:e0:59:73:8c:11:ce:c2:ce:10: 93:a9:cf:33:08:25:5b:83:b2:03:61:05:1f:ac:b2:60: b6:d7:67:2e:06:e1:ae:8e:fa:2e:11:1d:f3:ca:11:42: 27:72:28:56:4a:1c:c2:e1:34:3b:ac:f3:85:24:b7:21: 43:5b:a8:ad:6a:e8:56:c1:5e:ed:93:6b:d3:1b:b5:ac: bd:fc:73:26:c0:d9:52:ce:fb:57:6a:75:42:b6:b3:14: bd:ba:4f:70:fa:9a:f7:e0:75:31:b8:35:ab:7b:65:fc: 9e:dd:90:8e:f4:85:f6:52:03:98:22:67:25:4f:fe:fb Fingerprint (SHA-256): 07:E7:46:0E:82:8A:26:5D:C8:C7:07:F4:25:60:DB:F0:B0:98:7D:1A:50:F9:03:4C:0F:BA:31:83:00:A6:05:F7 Fingerprint (SHA1): DC:57:66:A6:59:82:93:A7:31:86:5C:20:E3:F9:4C:34:2B:AE:84:F4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #8689: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064568 (0x670ef38) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Jan 08 11:51:24 2016 Not After : Fri Jan 08 11:51:24 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:ba:41:c7:f0:d0:56:fd:08:54:c4:b5:39:e0:b8:de: 4f:d6:f4:c7:06:d0:a9:f9:ba:95:0b:35:5f:d7:bb:44: f6:53:be:97:58:d0:65:d1:59:d6:3c:2c:9f:91:78:81: ba:bc:07:e9:c0:90:f4:5b:54:11:7b:f2:f5:dd:56:35: b1:3b:0a:55:f7:54:8d:16:f2:69:90:3a:91:ce:01:1e: df:09:e1:84:fa:e9:ca:2e:4b:ad:6c:f6:60:a3:73:bd: 6a:12:14:b1:d2:9b:74:76:63:6c:48:32:82:27:ac:c1: 09:c1:d3:15:33:8b:66:08:dd:2d:39:95:61:c6:51:b9: a5:ae:c1:10:40:b5:d2:33:53:6a:f7:c9:66:09:5d:e6: 35:21:26:1c:32:66:ed:cd:f1:9f:26:cd:8a:e9:8c:ea: 38:20:12:6e:1d:9b:68:20:45:49:4b:2e:80:a6:40:61: 12:9c:56:89:ea:64:d4:e3:aa:b2:1b:c9:5c:c2:8d:28: 38:35:d8:19:03:42:08:9b:23:c1:b6:1b:e1:56:51:88: 5d:0e:46:4c:27:b2:f7:7e:9f:bd:f5:08:ee:4a:88:12: cc:8e:98:83:dc:43:4b:e3:06:90:bf:76:84:21:6a:f3: f7:3a:de:d0:c1:04:27:68:23:d3:86:1a:b8:c4:ab:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:bd:f2:72:47:b7:68:b9:96:94:f7:38:ed:97:6c:d4: c6:11:ef:8f:ab:91:1a:e5:dd:78:9b:fa:51:cb:fd:74: 33:e0:6e:2a:5f:3d:b3:ac:fb:03:33:77:d4:17:e6:f3: 2d:bb:17:82:1e:b0:95:00:24:de:59:6c:fa:18:3f:70: a1:3c:db:75:45:43:84:e8:19:c2:32:f9:40:b0:c9:f8: ab:a1:c8:a1:cf:36:a0:c2:60:dd:c0:51:b2:ff:e8:f5: 5b:89:03:ba:10:dc:04:aa:fa:02:fd:c7:71:15:22:4e: 8f:5f:50:a8:3f:55:53:89:61:e6:51:35:c6:58:12:7d: 66:26:2f:6a:d6:e4:27:3d:08:a4:82:43:cf:30:e1:01: 71:ed:83:74:26:73:b1:21:13:de:de:68:c8:86:3a:eb: 39:5e:86:9d:16:26:3f:05:33:7d:49:b0:1d:4b:d1:b4: 0e:06:2f:26:f5:2f:b8:8c:2c:92:e8:86:73:43:d8:47: 60:92:fb:51:04:49:9a:04:94:0d:fa:49:d3:fb:f8:fb: 79:3f:c3:10:2c:d0:46:d9:f8:b1:2a:61:b3:0d:64:29: 51:9d:0f:6a:ab:59:45:8f:15:a0:8f:2a:16:33:12:6b: ea:ac:62:86:d6:8d:b6:d6:f3:c0:14:15:26:b5:25:f2 Fingerprint (SHA-256): 63:19:54:02:AB:2F:F5:D7:16:B7:E4:1C:D9:33:EA:6E:AB:CA:37:9D:F1:D0:51:99:F9:02:A9:6A:D1:8F:7E:44 Fingerprint (SHA1): 55:B2:14:DD:0D:E2:E2:DD:9F:13:2C:48:E3:65:A5:D7:B9:B8:FC:A0 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #8690: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064569 (0x670ef39) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Jan 08 11:51:32 2016 Not After : Fri Jan 08 11:51:32 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:7c:05:94:03:41:6f:64:ea:1e:39:e6:ec:fb:89:11: 1f:48:94:6e:b0:c0:c9:22:de:80:d8:57:d7:44:c9:91: a2:e3:12:de:4d:d8:2f:54:3d:54:75:84:87:78:f2:83: a5:59:ec:bc:80:a2:18:d1:26:b3:4f:c3:70:a2:97:b3: ac:98:f7:81:40:6a:93:e3:ee:e4:99:d4:eb:a8:17:3f: 05:6e:f3:21:41:18:b5:23:44:9d:eb:5e:9a:c0:d3:4c: a6:bc:e3:11:9d:89:62:45:f3:c9:08:37:42:ed:02:01: c2:40:1f:3e:3f:6c:0f:e1:82:1a:08:0d:2e:bc:9d:e5: 31:08:0b:c3:05:db:49:12:c3:68:5f:15:71:6c:4c:61: b3:0c:99:64:b0:c1:40:6d:7f:90:5e:40:1d:18:9d:69: b5:97:4c:f9:bf:f8:d5:55:b3:da:fa:d6:dd:5f:2c:6e: 5b:ad:57:52:7a:fd:92:38:79:63:aa:1d:08:05:ab:4d: ef:2f:71:05:4f:b7:e3:b3:83:86:fb:7a:f5:4b:dd:b8: a8:73:f6:b4:2d:d6:11:b5:4e:d0:e1:58:d7:fe:24:ef: c7:db:7b:f0:12:ce:dd:bb:1f:71:a5:6f:de:82:86:55: 14:17:7f:4b:2f:e9:c5:1d:2b:f7:f4:c9:97:f6:cd:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:13:2f:aa:c8:5e:8d:98:c7:34:37:fe:03:ea:0e:28: 82:d7:87:36:91:91:3c:51:d4:3a:4e:a6:a4:ab:bb:0e: f0:79:df:ba:40:44:da:6b:8c:4d:45:3b:41:e9:23:77: cb:44:88:16:a0:58:23:80:f1:19:3d:10:17:2e:e0:30: 69:f4:66:cc:4b:e7:a2:96:ef:9d:3f:76:01:fb:9f:8b: ef:16:eb:75:ca:d2:17:09:0b:64:71:78:c1:23:8e:14: ca:d6:af:17:ad:79:8c:f4:28:9b:86:31:e5:3f:f2:79: 80:35:40:f5:99:9e:c2:64:25:6b:60:16:e0:ce:51:97: e5:e8:dd:44:65:36:e3:f8:a6:8d:4c:25:a6:05:07:81: 0b:63:7e:6c:fd:5a:6a:f6:7c:88:4a:bd:22:3b:24:34: 9b:3b:f6:95:dd:a7:02:80:b9:93:64:f4:9b:01:40:1d: e7:53:b0:53:81:5f:38:fa:70:fb:c2:07:97:5f:58:2b: 0a:28:24:3f:39:11:be:2e:df:f8:c1:bd:da:4e:74:f6: 2f:84:34:d6:60:25:d4:1e:97:33:fd:1d:ea:fb:7c:63: 27:95:d6:e0:e3:de:64:10:e7:59:1a:d6:cb:9e:c5:96: a5:0a:2a:2e:00:55:4e:a0:74:75:be:27:d7:71:6e:8d Fingerprint (SHA-256): 2C:9E:06:CA:84:60:0F:DA:BF:E1:D9:06:55:51:15:DE:9F:EB:BA:F9:53:42:95:C9:00:CD:6D:8A:BE:1A:32:0E Fingerprint (SHA1): 63:65:FC:B6:76:72:41:02:50:4B:83:FF:A9:EE:CC:CE:59:4A:71:2A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #8691: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064570 (0x670ef3a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Jan 08 11:51:45 2016 Not After : Fri Jan 08 11:51:45 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:b8:48:b9:72:53:c8:de:c2:3e:e8:6f:ab:e4:2b:fd: aa:82:cf:31:04:76:c0:e4:00:04:a0:7b:79:99:15:ec: e5:ff:70:44:c3:28:3b:5d:0c:80:ba:68:f9:a3:6f:2e: a7:34:d7:e0:48:cc:d0:fd:48:37:0a:7d:b0:54:25:02: b3:f3:1f:cc:ed:1b:c7:c2:b6:6e:84:f4:2a:2f:fb:a4: f1:16:85:01:5e:d7:fd:f5:cd:6f:7a:37:28:82:cb:7c: 81:97:81:e0:39:26:70:a4:bc:9b:e0:95:12:9d:f8:ab: c7:f2:bd:fe:48:6c:4f:e0:67:22:c6:29:c7:5f:ec:0d: 8b:fc:b7:c1:1b:0f:ac:ed:b7:da:6b:cd:84:c7:89:49: 13:25:00:38:09:0b:da:4b:0c:5a:e0:e6:81:7f:9a:0f: 18:0f:8d:d5:56:dc:4b:a4:07:46:b1:7f:e4:c2:23:6e: 13:06:60:5f:6c:a5:73:63:83:00:b2:9e:3c:6b:29:76: 4f:2a:ec:19:15:e1:1b:5c:14:99:be:6a:a9:c9:65:80: d1:d1:a9:1b:aa:21:f3:83:ee:3c:e3:05:4b:8e:b2:29: 11:c4:87:44:e3:0b:ee:00:1b:dc:d0:b2:17:fd:9e:c1: 07:75:f1:38:a5:ca:9a:e5:ce:f6:b5:db:56:06:12:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:96:ab:d9:60:ea:b3:d5:25:83:06:43:b8:13:83:5c: 33:4f:87:a6:79:77:e9:2c:92:38:e7:45:8e:31:52:47: b0:88:1f:71:35:93:e6:61:fa:b8:b2:e1:7f:90:0a:41: 79:39:e1:87:06:23:7b:72:0b:3f:8e:08:f6:b2:f0:3a: 67:4c:a1:b0:1d:89:95:8e:9c:7d:82:02:79:ba:49:73: ec:8e:81:9a:e2:fe:8f:3b:ba:bf:49:da:ed:d4:30:72: 91:39:3d:96:97:30:ad:1c:52:62:6f:cb:38:8b:61:9d: 9f:ca:ac:9c:84:ac:27:d8:6c:e0:17:7a:3d:c5:82:5c: 23:ee:ea:45:2f:6b:c0:01:53:33:b3:b9:5d:08:a7:10: bf:6b:55:b7:c0:8a:32:51:66:bf:4c:9f:f3:56:a4:0e: af:9c:36:16:bd:cb:ac:72:8c:08:1b:2b:0f:b6:96:3b: 26:f1:f7:3c:e5:6d:3b:ed:0a:6e:fd:77:2e:b1:c6:49: a8:ae:a8:c5:7f:9c:da:6a:ff:08:90:0d:d3:9e:07:11: 98:94:5b:95:7a:41:12:f9:35:3a:24:be:65:a8:ab:05: 41:aa:77:9f:23:44:3c:5b:0e:6b:e6:55:8d:87:8f:31: fe:d1:06:e4:5f:53:bb:43:1d:a3:05:17:fb:2d:dd:9b Fingerprint (SHA-256): 53:9E:AB:FE:B1:1F:3D:62:96:9A:CD:A6:60:C2:B9:8F:BE:51:F1:25:AF:56:D7:54:B1:6C:A4:A7:26:D2:27:A1 Fingerprint (SHA1): 19:F7:0D:BE:31:76:D9:C4:AE:CE:88:08:0B:C9:87:76:90:22:2C:43 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #8692: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064571 (0x670ef3b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Jan 08 11:52:01 2016 Not After : Fri Jan 08 11:52:01 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:ab:f0:81:a5:bf:a0:99:21:bd:d4:65:f3:bf:12:b3: 9e:d7:e3:7c:7d:16:0d:b2:9b:6d:65:c3:bd:06:34:ff: cf:de:13:82:59:23:d7:c8:11:0b:ae:68:e6:2f:bc:ff: c1:7d:00:9d:aa:6f:95:f0:49:66:56:e9:a1:a0:4c:5d: b3:85:08:40:a0:a0:6a:66:63:10:ec:f4:05:c8:15:62: 1f:e9:26:a4:4c:68:05:21:12:85:e5:69:b6:99:41:19: 45:94:83:a4:40:41:c2:b7:21:f1:a7:d8:67:8a:45:ea: 82:cf:55:b0:9c:bb:ee:7b:02:25:6c:bf:39:61:8b:9f: 4b:cd:89:53:97:72:df:70:35:ad:7e:27:72:e3:42:b3: 08:00:40:75:02:c0:59:b2:25:0d:80:2c:48:8e:a4:7e: e9:1f:c8:45:0a:01:64:b9:d9:46:45:03:2c:e3:c9:00: 1d:8d:04:13:f5:c8:6a:65:49:aa:32:6e:a7:8e:ca:69: 89:8c:7f:93:1b:05:4b:eb:b5:b6:4b:45:9d:da:3a:40: fe:6c:30:3d:dd:1c:f6:32:1c:93:29:d4:62:8d:f8:00: f4:92:ef:38:80:6f:f9:98:7f:cd:03:74:d3:91:ed:01: 68:63:53:47:22:b2:80:05:09:16:8f:1b:72:a9:45:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:e9:d9:e2:c5:52:cd:77:87:d3:2d:8b:e8:f3:59:fc: 9d:05:83:07:93:2f:64:11:b9:08:2a:8e:8d:ea:bb:d6: d3:f7:64:25:c4:7e:84:21:46:d5:7e:92:6f:bd:ef:61: eb:8c:05:c6:f8:95:31:4c:21:48:c0:77:e0:fe:e3:af: 6a:32:0a:57:07:92:94:e6:f9:8a:f8:59:ba:8a:e8:4e: 2d:a2:9d:c4:20:62:5c:0a:6e:20:83:25:5b:c8:45:f0: f4:7c:8f:d9:25:93:4b:3b:d8:dd:69:6a:96:6f:cb:a1: 58:71:c0:24:8c:b5:7b:c4:db:18:07:af:59:6b:0b:cb: bf:d1:b3:4d:78:01:46:4a:e2:dc:5b:77:51:a3:f6:72: 71:de:28:36:ef:a5:50:1a:22:94:79:1e:97:80:71:0c: 4e:3d:a2:c7:a8:59:1b:e9:05:ff:aa:15:79:ff:6a:7c: 15:e5:90:77:b6:b3:d8:08:50:e7:19:61:e3:84:08:fa: 8e:21:a6:54:09:cc:4f:27:e9:21:07:ab:9e:2e:2c:30: 20:12:26:94:47:e6:95:1d:22:9d:ca:9d:67:2e:c9:ee: 60:eb:6a:06:c6:3e:31:67:e4:6c:f2:20:ff:66:bd:b8: 34:69:a8:1a:fd:e5:2d:ac:9d:6c:e5:bf:29:8c:df:40 Fingerprint (SHA-256): 6B:B0:DF:04:69:F9:56:63:B6:09:0E:EE:99:0A:02:D7:5A:8E:5A:A3:E5:3B:03:FB:A8:4B:E8:4C:BD:27:64:E4 Fingerprint (SHA1): 22:C4:C2:76:22:D6:88:3F:F9:9F:AC:7F:D7:8F:FB:96:B5:36:B3:67 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #8693: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064572 (0x670ef3c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Jan 08 11:52:08 2016 Not After : Fri Jan 08 11:52:08 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:f3:75:be:db:e6:42:6a:39:cd:d4:e9:8e:19:e5:ff: 27:39:c3:1b:87:ea:c1:cc:ba:ac:83:86:77:ed:8a:85: cd:b8:44:3d:cc:ff:57:3e:9e:57:b1:e3:76:a9:60:4a: 47:18:85:47:0b:37:84:47:63:e0:78:b4:d9:f7:d6:0b: 26:56:aa:6d:09:57:7b:8a:ed:23:ba:df:ec:bd:b9:a8: e6:50:1e:ba:12:65:59:78:c2:91:b0:0e:93:3a:6f:94: f6:bb:a5:2f:76:7f:0a:09:b7:a1:9c:ec:9e:09:cb:94: ea:74:fc:72:da:7c:83:50:88:d5:e4:db:7f:43:14:4f: d6:eb:c7:17:d0:48:7e:a4:86:70:35:97:1c:74:dc:a6: 48:a9:c0:a3:ed:99:7e:d8:5e:34:b5:f4:d8:12:41:b2: 60:1f:ef:ae:6a:64:30:47:31:65:62:df:03:a7:14:d7: 75:34:78:98:da:66:08:f2:f9:9c:30:f5:79:f0:16:28: 7e:74:93:f9:c8:1b:b7:94:00:ca:c5:96:04:dc:4b:9f: 3d:10:29:63:ea:ca:38:52:87:3d:c1:29:1b:90:8d:a6: da:4a:74:40:9d:18:d7:00:83:9b:97:a3:53:ac:c3:13: 5d:f0:5f:30:e1:a8:0e:51:83:94:71:39:c0:99:9d:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:28:eb:29:04:67:a1:7e:47:38:5d:10:f0:bd:7c:b5: af:0c:40:00:1b:b1:bf:b1:7c:6b:cc:50:e1:a6:94:a0: 29:e6:c8:80:c8:8e:52:50:70:3e:76:4b:89:66:36:00: c6:c3:0f:97:9b:01:a8:24:a6:92:04:13:2b:7a:5f:3e: 49:ae:fb:9f:de:08:3e:a2:9f:6e:5e:9d:71:e1:5f:0c: 09:e7:b8:97:ce:16:4b:10:08:56:7e:36:fb:bc:09:00: e3:6b:ed:b5:83:3e:19:bf:fb:04:ca:87:62:f8:4c:64: ab:1b:65:1f:8c:b0:c7:ba:ce:32:99:9d:7e:49:45:9f: b8:f7:05:a9:aa:b3:29:3d:22:a7:f5:02:6d:e1:2f:d2: 13:f6:9f:62:de:d7:0e:76:09:37:0a:06:2f:d7:6a:ad: c9:6a:b3:94:f4:de:3e:f3:3e:f2:60:33:87:1f:67:36: 6d:90:2e:bc:d4:c7:e9:94:95:23:ee:c6:2b:92:11:d9: 6f:53:11:52:50:4c:e9:0c:e7:e1:c8:eb:f6:1e:ca:c2: ee:75:7d:e1:2e:68:62:f9:b3:a8:2b:f9:28:d2:99:a6: 06:65:50:ff:6c:d7:3d:f0:bd:f5:69:30:53:b5:6c:44: 47:ca:f6:ed:c3:a3:7e:0e:fa:7e:de:db:22:60:df:ed Fingerprint (SHA-256): B9:85:B6:EF:85:BB:5A:60:42:6D:B7:3D:41:9E:04:F0:8F:6D:25:83:6C:15:9B:8E:5F:26:1D:7B:F7:DC:00:4F Fingerprint (SHA1): BB:15:87:41:11:03:86:FB:DD:D1:51:4E:E3:D2:CC:49:26:A6:86:98 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #8694: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064573 (0x670ef3d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Jan 08 11:52:12 2016 Not After : Fri Jan 08 11:52:12 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:da:65:81:5c:2f:b7:0e:a6:58:e7:32:8e:f2:0b:a1: cf:4a:94:c1:aa:05:34:4e:44:bb:77:39:05:44:0c:ac: bf:3a:68:85:51:6f:ad:e0:97:e3:e4:fb:61:05:f1:98: 17:e3:e6:30:df:b4:86:25:2a:61:f4:e3:35:4e:fa:b5: 57:fc:3e:8b:c7:41:bb:af:d0:20:4d:ce:97:6d:0a:89: be:8b:e2:b4:ff:38:04:f3:b2:77:ac:7a:fe:30:37:2e: 49:d7:18:f8:31:79:50:7b:6c:f2:a7:3f:d1:9b:e5:1b: fe:4e:40:a4:e9:ee:76:e2:09:42:95:31:23:76:20:d0: 61:59:6d:c5:ab:b9:d9:78:a6:98:43:10:fa:9f:bb:92: 68:de:1f:06:e9:1c:d3:f3:dd:41:87:d3:c3:f1:f7:7d: 42:b7:ba:50:1e:18:00:5a:78:af:26:78:7c:55:3f:fc: 81:69:a0:4a:ad:03:14:b4:3f:67:c8:e6:25:57:eb:fc: 27:da:82:8a:84:61:a3:72:f8:d5:4c:c3:38:a5:41:4e: 5d:3f:7f:85:87:ce:2e:54:3c:72:ee:6f:ac:c1:61:11: 62:de:d2:41:77:86:d5:45:46:fe:fb:0b:95:15:fd:e3: 69:b4:82:d0:4b:68:ce:53:ee:c0:a4:0d:50:90:7c:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:63:08:e3:4a:83:58:d2:16:14:f1:a7:8a:d3:de:ee: e2:ff:fe:ff:fd:20:37:48:92:71:58:45:17:b2:d4:da: ee:66:69:56:8f:71:bc:d7:01:c9:a3:d5:6c:a4:11:0a: 5b:01:7f:43:5b:0d:c6:25:f3:73:4f:e0:c5:44:44:91: 9a:5b:13:66:08:03:5f:75:10:25:ae:d3:fd:21:13:36: d7:e6:ac:1f:dc:3d:52:35:48:ae:c3:09:75:66:ae:2e: 01:54:31:b2:01:df:3a:68:e5:1b:a8:e5:a8:9d:07:c6: a5:a9:f3:69:1e:34:25:65:6b:af:66:22:ec:6d:f3:a9: 7f:65:e1:ab:67:2a:06:19:e9:e5:db:89:47:a0:8f:46: 45:a3:fb:65:35:ba:ac:af:d2:e8:fa:8c:db:73:4c:e3: 94:18:8c:00:64:df:48:e0:d2:6e:0d:57:ce:70:c7:e6: 8e:03:60:27:b8:a4:0b:fb:f1:ae:2b:81:8b:85:43:ba: ee:e8:1f:2d:61:b9:df:02:3d:91:f3:5a:9f:99:a6:08: de:e0:88:b7:a4:20:d1:07:64:51:f2:56:7e:5e:4f:8f: ae:3a:bb:73:63:d7:e9:7a:fc:64:e0:a3:bf:2c:67:4a: ad:2b:15:05:77:e8:22:3c:67:91:a8:aa:55:c6:cc:ca Fingerprint (SHA-256): 3E:82:97:1B:19:FC:56:C9:B8:F0:AE:9C:15:29:75:01:36:7A:DD:A8:02:03:5F:7D:1C:4C:A6:30:4D:DC:04:16 Fingerprint (SHA1): 67:D1:88:B0:6D:F3:FB:C0:1A:3E:A5:44:EF:8B:DB:58:70:5D:2E:5E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #8695: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8696: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064588 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8697: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8698: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8699: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8700: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108064589 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8701: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8702: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8703: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8704: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108064590 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8705: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8706: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8707: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8708: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108064591 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8709: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8710: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8711: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064588 (0x670ef4c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 11:54:00 2016 Not After : Fri Jan 08 11:54:00 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:fe:a7:56:60:28:42:f7:eb:82:68:af:a7:d3:5f:73: 55:1e:d1:6f:5b:1f:9f:35:55:53:26:27:15:d2:e3:8f: 1c:77:6e:87:fc:c8:e4:ec:0c:9a:58:6d:9f:8e:23:6f: a1:db:cc:e3:9c:24:f2:6e:cb:b4:52:6e:ce:3a:78:95: f0:3c:82:1c:a8:1c:20:62:f6:e1:f8:51:72:95:07:a0: 16:c6:66:a5:00:91:97:7b:b0:30:08:a3:61:df:9c:d0: 58:84:68:ce:f3:13:f7:6b:44:0f:44:be:70:6c:58:dc: 04:5d:25:66:32:6e:79:aa:1d:4e:74:16:82:b1:ff:c5: d8:8b:83:45:e4:0a:77:d5:56:db:07:93:f0:40:33:4f: 8f:82:88:a1:6a:35:43:18:9e:3e:42:c4:4f:88:bc:93: c3:24:ff:87:23:b3:6c:a3:a7:0f:74:d8:82:92:42:6d: 36:6e:33:35:5d:e4:8d:4a:42:84:59:1c:c8:fd:72:cc: 5d:54:87:ce:b6:3a:81:03:8f:46:b0:dd:98:18:e2:81: 9f:42:13:b9:62:1a:42:ab:67:12:8b:fb:d9:30:78:67: 43:86:f9:fa:6a:0b:a3:08:1b:71:d0:33:e6:82:11:eb: 6d:e5:03:1c:3f:81:1e:a1:00:b9:0e:a1:d5:a1:3b:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:fd:58:f3:e8:c1:2d:93:ac:48:29:ef:a0:cb:48:87: 17:ab:81:3b:74:72:eb:a5:79:42:ec:db:15:36:69:fd: 5e:42:41:bd:57:62:c1:12:9d:a8:8c:67:24:78:45:24: 23:7a:06:0c:02:ca:bf:e6:fa:2a:cb:42:ae:2f:67:8d: 4f:a6:c0:14:91:72:5f:b4:0f:ee:fe:38:c7:21:2e:06: e8:bc:fd:4d:ad:61:eb:0e:21:6b:c6:8b:7e:a0:20:9b: 54:17:42:9f:2f:c4:42:bd:5a:78:76:b5:12:df:7a:c1: 7d:d6:84:b2:e9:ee:3c:9c:b7:86:1b:e0:5e:f8:3c:1a: 22:c8:75:9e:7d:f8:a2:94:62:9d:4f:f0:ea:43:0d:d8: 87:e8:55:07:97:b0:4b:e8:60:03:c1:f6:09:dd:1e:92: 7d:0c:94:bd:e3:57:b9:6a:2f:f1:71:6e:f6:c8:aa:9f: 3d:6a:97:3b:7c:b9:98:06:e7:4d:5c:97:8d:11:42:7d: 54:df:06:51:40:57:81:fd:88:c9:95:9e:3b:46:e7:3d: b0:31:56:b0:e1:75:46:89:96:7e:c1:fa:13:ec:33:34: 67:8e:2c:9d:cf:49:fd:18:46:ee:48:68:56:12:08:48: ed:80:5d:3d:99:d8:6b:48:fa:13:a9:2b:db:f5:bb:34 Fingerprint (SHA-256): 76:E2:43:AF:56:22:AD:A6:AE:3F:94:CD:FF:10:3D:00:DD:06:DF:F2:8F:3B:63:A5:D5:44:AA:25:2F:FE:85:9C Fingerprint (SHA1): 91:73:75:DA:48:28:B4:4D:09:33:72:CE:91:DD:ED:9B:6A:CB:28:62 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8712: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8713: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064589 (0x670ef4d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 11:54:35 2016 Not After : Fri Jan 08 11:54:35 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:3e:1f:bf:fb:f7:02:ee:f0:fd:13:21:98:b0:0d:3c: 6f:4c:40:44:85:2e:e3:b7:44:88:a5:38:c8:6e:fd:47: 1a:34:76:d2:3c:05:e1:18:13:c3:60:8b:be:0b:20:8d: 1e:2e:5b:72:ed:fe:e6:ea:43:0e:d3:15:f9:0e:87:1a: 2b:81:ad:e0:bc:22:02:ee:37:32:aa:ba:e5:11:3a:8c: e0:27:28:92:7f:7a:9c:76:d0:a6:c3:9c:3c:78:e7:87: 4f:05:b8:db:bb:33:97:1b:55:ba:71:74:33:df:87:0c: 6c:75:74:6d:46:31:1e:ba:ee:c3:89:f2:4f:8c:87:75: aa:12:02:76:f8:2b:41:51:b8:d7:bd:00:5f:77:2e:a3: a2:fa:d7:d0:6a:f2:99:b0:70:15:8b:cd:76:45:96:ff: c1:46:28:a8:89:df:20:97:96:c5:25:4c:c7:99:0e:23: b0:56:68:6f:94:22:49:45:f1:30:f1:02:03:7f:f3:25: 5c:5b:1c:74:fc:c5:5b:85:7f:54:b2:8b:28:4e:a9:5c: 04:70:44:7e:13:c9:f6:3a:8b:d1:2a:fd:4a:7a:51:15: e1:1d:a3:ea:a2:ca:d8:88:9d:b8:23:e6:c4:a8:77:13: 55:17:17:b5:9a:20:19:bd:93:a7:30:3c:41:c3:aa:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:e8:68:c6:84:ef:70:f1:8f:3f:f4:0c:8c:bf:39:7c: e0:68:f5:be:8a:d6:b2:63:62:c4:4b:14:f1:e7:24:84: b0:a8:c4:1c:aa:b4:5c:4e:6c:6c:d8:3e:f1:d3:15:d0: a9:98:ce:b9:6a:3d:6d:e1:6d:e1:80:8b:04:64:f9:1b: 7b:e4:53:e4:a1:42:58:53:40:e9:c8:e6:7a:5c:a8:75: c1:4e:c4:89:5a:60:ff:2a:dd:e5:29:3e:ef:11:b3:6f: ac:9e:4e:72:e9:15:19:6e:a6:1c:db:7e:38:fb:0c:83: e1:67:c0:8a:f1:dd:87:14:15:a9:14:72:a5:b4:ca:5a: 89:87:0b:6e:34:02:94:24:bd:aa:cd:9b:aa:c6:79:6d: c3:64:72:8b:59:96:80:92:a0:90:b3:89:87:17:fd:83: 22:20:61:87:b7:20:43:63:0c:e5:c4:88:39:48:0f:a9: 7e:29:c4:18:f5:2a:ab:d0:a3:d0:93:f0:3d:bb:3b:a2: e7:dd:61:b1:b5:c9:d7:34:6b:b0:67:95:5c:82:82:7d: 93:1f:9b:11:49:60:70:4a:e4:d6:a1:a9:ae:49:b3:4a: 2e:00:6d:ea:c9:b2:8d:33:3e:da:05:c5:97:b5:71:2a: 1c:cf:62:44:c9:ff:85:56:61:0e:a4:48:83:b3:e2:59 Fingerprint (SHA-256): A8:51:40:C2:DD:76:60:18:A4:F8:8D:C6:2E:82:CA:EB:29:CE:96:A2:2E:63:25:3B:FD:77:EA:03:F1:7A:EB:29 Fingerprint (SHA1): BE:D8:87:BB:45:68:1D:87:AB:6A:91:67:46:AC:B5:B2:81:0C:1D:C8 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8714: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8715: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064590 (0x670ef4e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 11:54:45 2016 Not After : Fri Jan 08 11:54:45 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:64:67:61:fe:b0:43:62:c8:8b:f4:66:20:2b:46:52: d3:de:9c:bc:5d:89:dc:da:56:23:f3:38:7e:a8:6f:06: a4:50:c5:aa:55:d9:a8:4d:64:75:87:0f:a5:95:b2:97: bb:07:d6:27:43:3a:1e:cf:b9:a3:0f:a2:55:ac:62:65: 5a:b3:2b:3b:5b:c2:c7:70:cf:80:fe:1b:21:88:1b:61: 2c:ed:7d:a0:34:dd:33:61:17:9c:e2:25:01:d8:35:1f: a5:af:78:4c:cc:d3:90:fd:56:c2:77:ca:10:6e:2a:77: 7a:56:53:7a:5c:4d:d8:69:75:69:9a:71:71:8e:93:b5: 4f:e5:13:1c:e2:f8:62:f8:88:69:02:65:68:56:63:18: 1e:3f:62:1a:8f:ca:c2:ec:8d:b6:94:76:72:28:9d:80: 5e:d3:8c:b9:d4:4d:04:a8:a4:3e:dc:3b:a0:29:a5:6c: 39:fb:18:21:d8:a6:0d:c2:bb:0f:f5:8b:e0:82:72:aa: 7b:37:8b:b0:ae:8e:29:04:e3:0a:ce:46:11:15:a1:0c: 31:7d:64:e0:f7:b0:7a:2b:d6:99:de:f9:aa:dd:27:a3: 9c:e5:e4:60:c5:28:b7:90:e7:c6:a7:0a:44:a7:0d:99: 4c:72:77:eb:95:a2:65:d2:97:8e:b8:5b:78:15:e8:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:a3:d9:e6:60:62:30:42:46:74:b2:5c:66:8d:01:bb: 36:e9:4c:7a:e7:39:b5:32:8e:fc:83:43:10:ba:bc:d0: a4:32:aa:cb:f9:2f:64:89:07:a6:f7:60:5a:1b:50:b2: a8:cf:40:d5:4f:17:73:06:c9:26:1b:c5:eb:43:c1:7d: 36:e3:8e:aa:27:92:ce:fd:f3:4a:c8:81:33:c5:e8:c1: d4:04:3d:fb:b4:15:ac:6c:32:db:f4:8f:07:f8:53:28: 4b:79:16:fd:07:d4:ea:4e:35:fc:08:84:ff:85:5c:24: 82:e3:2c:2d:31:67:4c:1d:2e:05:65:ff:15:a0:7b:f3: fd:2e:d7:46:d1:6d:97:4a:11:40:c3:71:26:54:07:fd: 0c:8d:7d:4d:38:f7:87:c0:b5:45:78:f0:a6:c5:ce:f8: 78:95:1c:03:28:98:8d:aa:a4:d6:e3:0a:2d:95:be:a0: f6:12:5f:89:7e:56:b2:c2:ab:e0:95:3b:07:a4:4a:19: 56:ab:11:5f:8e:43:13:61:1a:8d:71:3b:44:26:51:28: 57:c2:dd:ba:f7:2e:12:08:f4:ff:a7:db:b6:88:d0:ea: f2:cf:60:b0:53:fa:1b:fb:18:cd:36:3f:4b:87:98:15: 6d:b1:cb:b5:89:75:87:ee:e5:d9:b0:18:72:0a:58:86 Fingerprint (SHA-256): F0:62:49:3A:02:1B:94:7E:64:CE:6D:08:B3:D8:27:2D:33:8C:37:71:A8:19:8A:7E:49:31:02:E5:85:30:D8:90 Fingerprint (SHA1): EF:31:F1:9A:8C:B1:5E:D2:CF:10:A3:4A:C8:D6:A9:28:5F:67:02:6F Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #8716: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8717: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8718: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #8719: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8720: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064588 (0x670ef4c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 11:54:00 2016 Not After : Fri Jan 08 11:54:00 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:fe:a7:56:60:28:42:f7:eb:82:68:af:a7:d3:5f:73: 55:1e:d1:6f:5b:1f:9f:35:55:53:26:27:15:d2:e3:8f: 1c:77:6e:87:fc:c8:e4:ec:0c:9a:58:6d:9f:8e:23:6f: a1:db:cc:e3:9c:24:f2:6e:cb:b4:52:6e:ce:3a:78:95: f0:3c:82:1c:a8:1c:20:62:f6:e1:f8:51:72:95:07:a0: 16:c6:66:a5:00:91:97:7b:b0:30:08:a3:61:df:9c:d0: 58:84:68:ce:f3:13:f7:6b:44:0f:44:be:70:6c:58:dc: 04:5d:25:66:32:6e:79:aa:1d:4e:74:16:82:b1:ff:c5: d8:8b:83:45:e4:0a:77:d5:56:db:07:93:f0:40:33:4f: 8f:82:88:a1:6a:35:43:18:9e:3e:42:c4:4f:88:bc:93: c3:24:ff:87:23:b3:6c:a3:a7:0f:74:d8:82:92:42:6d: 36:6e:33:35:5d:e4:8d:4a:42:84:59:1c:c8:fd:72:cc: 5d:54:87:ce:b6:3a:81:03:8f:46:b0:dd:98:18:e2:81: 9f:42:13:b9:62:1a:42:ab:67:12:8b:fb:d9:30:78:67: 43:86:f9:fa:6a:0b:a3:08:1b:71:d0:33:e6:82:11:eb: 6d:e5:03:1c:3f:81:1e:a1:00:b9:0e:a1:d5:a1:3b:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:fd:58:f3:e8:c1:2d:93:ac:48:29:ef:a0:cb:48:87: 17:ab:81:3b:74:72:eb:a5:79:42:ec:db:15:36:69:fd: 5e:42:41:bd:57:62:c1:12:9d:a8:8c:67:24:78:45:24: 23:7a:06:0c:02:ca:bf:e6:fa:2a:cb:42:ae:2f:67:8d: 4f:a6:c0:14:91:72:5f:b4:0f:ee:fe:38:c7:21:2e:06: e8:bc:fd:4d:ad:61:eb:0e:21:6b:c6:8b:7e:a0:20:9b: 54:17:42:9f:2f:c4:42:bd:5a:78:76:b5:12:df:7a:c1: 7d:d6:84:b2:e9:ee:3c:9c:b7:86:1b:e0:5e:f8:3c:1a: 22:c8:75:9e:7d:f8:a2:94:62:9d:4f:f0:ea:43:0d:d8: 87:e8:55:07:97:b0:4b:e8:60:03:c1:f6:09:dd:1e:92: 7d:0c:94:bd:e3:57:b9:6a:2f:f1:71:6e:f6:c8:aa:9f: 3d:6a:97:3b:7c:b9:98:06:e7:4d:5c:97:8d:11:42:7d: 54:df:06:51:40:57:81:fd:88:c9:95:9e:3b:46:e7:3d: b0:31:56:b0:e1:75:46:89:96:7e:c1:fa:13:ec:33:34: 67:8e:2c:9d:cf:49:fd:18:46:ee:48:68:56:12:08:48: ed:80:5d:3d:99:d8:6b:48:fa:13:a9:2b:db:f5:bb:34 Fingerprint (SHA-256): 76:E2:43:AF:56:22:AD:A6:AE:3F:94:CD:FF:10:3D:00:DD:06:DF:F2:8F:3B:63:A5:D5:44:AA:25:2F:FE:85:9C Fingerprint (SHA1): 91:73:75:DA:48:28:B4:4D:09:33:72:CE:91:DD:ED:9B:6A:CB:28:62 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8721: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8722: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064589 (0x670ef4d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 11:54:35 2016 Not After : Fri Jan 08 11:54:35 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:3e:1f:bf:fb:f7:02:ee:f0:fd:13:21:98:b0:0d:3c: 6f:4c:40:44:85:2e:e3:b7:44:88:a5:38:c8:6e:fd:47: 1a:34:76:d2:3c:05:e1:18:13:c3:60:8b:be:0b:20:8d: 1e:2e:5b:72:ed:fe:e6:ea:43:0e:d3:15:f9:0e:87:1a: 2b:81:ad:e0:bc:22:02:ee:37:32:aa:ba:e5:11:3a:8c: e0:27:28:92:7f:7a:9c:76:d0:a6:c3:9c:3c:78:e7:87: 4f:05:b8:db:bb:33:97:1b:55:ba:71:74:33:df:87:0c: 6c:75:74:6d:46:31:1e:ba:ee:c3:89:f2:4f:8c:87:75: aa:12:02:76:f8:2b:41:51:b8:d7:bd:00:5f:77:2e:a3: a2:fa:d7:d0:6a:f2:99:b0:70:15:8b:cd:76:45:96:ff: c1:46:28:a8:89:df:20:97:96:c5:25:4c:c7:99:0e:23: b0:56:68:6f:94:22:49:45:f1:30:f1:02:03:7f:f3:25: 5c:5b:1c:74:fc:c5:5b:85:7f:54:b2:8b:28:4e:a9:5c: 04:70:44:7e:13:c9:f6:3a:8b:d1:2a:fd:4a:7a:51:15: e1:1d:a3:ea:a2:ca:d8:88:9d:b8:23:e6:c4:a8:77:13: 55:17:17:b5:9a:20:19:bd:93:a7:30:3c:41:c3:aa:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:e8:68:c6:84:ef:70:f1:8f:3f:f4:0c:8c:bf:39:7c: e0:68:f5:be:8a:d6:b2:63:62:c4:4b:14:f1:e7:24:84: b0:a8:c4:1c:aa:b4:5c:4e:6c:6c:d8:3e:f1:d3:15:d0: a9:98:ce:b9:6a:3d:6d:e1:6d:e1:80:8b:04:64:f9:1b: 7b:e4:53:e4:a1:42:58:53:40:e9:c8:e6:7a:5c:a8:75: c1:4e:c4:89:5a:60:ff:2a:dd:e5:29:3e:ef:11:b3:6f: ac:9e:4e:72:e9:15:19:6e:a6:1c:db:7e:38:fb:0c:83: e1:67:c0:8a:f1:dd:87:14:15:a9:14:72:a5:b4:ca:5a: 89:87:0b:6e:34:02:94:24:bd:aa:cd:9b:aa:c6:79:6d: c3:64:72:8b:59:96:80:92:a0:90:b3:89:87:17:fd:83: 22:20:61:87:b7:20:43:63:0c:e5:c4:88:39:48:0f:a9: 7e:29:c4:18:f5:2a:ab:d0:a3:d0:93:f0:3d:bb:3b:a2: e7:dd:61:b1:b5:c9:d7:34:6b:b0:67:95:5c:82:82:7d: 93:1f:9b:11:49:60:70:4a:e4:d6:a1:a9:ae:49:b3:4a: 2e:00:6d:ea:c9:b2:8d:33:3e:da:05:c5:97:b5:71:2a: 1c:cf:62:44:c9:ff:85:56:61:0e:a4:48:83:b3:e2:59 Fingerprint (SHA-256): A8:51:40:C2:DD:76:60:18:A4:F8:8D:C6:2E:82:CA:EB:29:CE:96:A2:2E:63:25:3B:FD:77:EA:03:F1:7A:EB:29 Fingerprint (SHA1): BE:D8:87:BB:45:68:1D:87:AB:6A:91:67:46:AC:B5:B2:81:0C:1D:C8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8723: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8724: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064590 (0x670ef4e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 11:54:45 2016 Not After : Fri Jan 08 11:54:45 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:64:67:61:fe:b0:43:62:c8:8b:f4:66:20:2b:46:52: d3:de:9c:bc:5d:89:dc:da:56:23:f3:38:7e:a8:6f:06: a4:50:c5:aa:55:d9:a8:4d:64:75:87:0f:a5:95:b2:97: bb:07:d6:27:43:3a:1e:cf:b9:a3:0f:a2:55:ac:62:65: 5a:b3:2b:3b:5b:c2:c7:70:cf:80:fe:1b:21:88:1b:61: 2c:ed:7d:a0:34:dd:33:61:17:9c:e2:25:01:d8:35:1f: a5:af:78:4c:cc:d3:90:fd:56:c2:77:ca:10:6e:2a:77: 7a:56:53:7a:5c:4d:d8:69:75:69:9a:71:71:8e:93:b5: 4f:e5:13:1c:e2:f8:62:f8:88:69:02:65:68:56:63:18: 1e:3f:62:1a:8f:ca:c2:ec:8d:b6:94:76:72:28:9d:80: 5e:d3:8c:b9:d4:4d:04:a8:a4:3e:dc:3b:a0:29:a5:6c: 39:fb:18:21:d8:a6:0d:c2:bb:0f:f5:8b:e0:82:72:aa: 7b:37:8b:b0:ae:8e:29:04:e3:0a:ce:46:11:15:a1:0c: 31:7d:64:e0:f7:b0:7a:2b:d6:99:de:f9:aa:dd:27:a3: 9c:e5:e4:60:c5:28:b7:90:e7:c6:a7:0a:44:a7:0d:99: 4c:72:77:eb:95:a2:65:d2:97:8e:b8:5b:78:15:e8:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:a3:d9:e6:60:62:30:42:46:74:b2:5c:66:8d:01:bb: 36:e9:4c:7a:e7:39:b5:32:8e:fc:83:43:10:ba:bc:d0: a4:32:aa:cb:f9:2f:64:89:07:a6:f7:60:5a:1b:50:b2: a8:cf:40:d5:4f:17:73:06:c9:26:1b:c5:eb:43:c1:7d: 36:e3:8e:aa:27:92:ce:fd:f3:4a:c8:81:33:c5:e8:c1: d4:04:3d:fb:b4:15:ac:6c:32:db:f4:8f:07:f8:53:28: 4b:79:16:fd:07:d4:ea:4e:35:fc:08:84:ff:85:5c:24: 82:e3:2c:2d:31:67:4c:1d:2e:05:65:ff:15:a0:7b:f3: fd:2e:d7:46:d1:6d:97:4a:11:40:c3:71:26:54:07:fd: 0c:8d:7d:4d:38:f7:87:c0:b5:45:78:f0:a6:c5:ce:f8: 78:95:1c:03:28:98:8d:aa:a4:d6:e3:0a:2d:95:be:a0: f6:12:5f:89:7e:56:b2:c2:ab:e0:95:3b:07:a4:4a:19: 56:ab:11:5f:8e:43:13:61:1a:8d:71:3b:44:26:51:28: 57:c2:dd:ba:f7:2e:12:08:f4:ff:a7:db:b6:88:d0:ea: f2:cf:60:b0:53:fa:1b:fb:18:cd:36:3f:4b:87:98:15: 6d:b1:cb:b5:89:75:87:ee:e5:d9:b0:18:72:0a:58:86 Fingerprint (SHA-256): F0:62:49:3A:02:1B:94:7E:64:CE:6D:08:B3:D8:27:2D:33:8C:37:71:A8:19:8A:7E:49:31:02:E5:85:30:D8:90 Fingerprint (SHA1): EF:31:F1:9A:8C:B1:5E:D2:CF:10:A3:4A:C8:D6:A9:28:5F:67:02:6F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #8725: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8726: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8727: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064592 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8728: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8729: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8730: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8731: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108064593 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8732: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8733: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8734: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8735: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108064594 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8736: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8737: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #8738: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8739: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108064595 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8740: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8741: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #8742: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8743: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108064596 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8744: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8745: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8746: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064592 (0x670ef50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 11:55:24 2016 Not After : Fri Jan 08 11:55:24 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:9b:08:79:ee:81:33:18:60:2d:9f:7b:fa:ae:ce:0c: ac:d7:c8:31:bb:25:7b:f9:af:a8:b1:f6:34:be:77:55: 0d:a2:74:e9:b9:dd:4e:88:a0:1e:90:4e:c6:8d:69:c0: f1:61:b8:17:db:9a:9c:42:a7:4f:ab:ff:62:6c:5a:07: de:57:81:94:85:e0:a1:29:5a:ee:cf:63:95:3c:28:e2: 8d:81:7b:ef:e8:17:dc:0b:c0:aa:ec:2f:e7:2b:de:36: f4:81:26:e5:51:11:6f:ba:97:d0:9e:49:63:c3:0e:42: 65:de:1b:cf:41:29:1a:d4:71:05:b6:ed:f2:ac:15:8d: f9:87:8c:e8:66:66:b4:f0:c5:52:91:29:93:d8:f1:97: 7a:dd:6f:df:3b:74:a8:5d:81:7c:79:ac:b2:b9:83:cd: b8:e9:d0:22:61:e7:a5:9f:88:35:4c:7b:73:8d:0b:17: e0:21:60:10:0f:89:28:23:49:e0:fb:b5:e3:78:0c:4c: 8a:25:da:c3:44:97:db:9a:c3:74:d4:b4:37:13:e5:2b: 77:60:da:ef:66:4e:9d:32:03:d0:85:c9:67:ba:09:32: 49:a5:9f:f8:bd:17:a5:ee:9e:82:76:c0:6d:6c:59:92: ca:20:71:67:bd:19:f5:03:bc:ac:8f:22:1f:5c:15:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:fd:bb:83:6d:ea:14:86:4b:45:6a:d2:f9:5b:7a:2d: 9f:92:de:5e:e3:bf:aa:4d:4d:27:5e:6f:e8:f0:2c:13: a2:50:88:ce:93:62:18:c4:00:95:6e:8e:c5:c7:32:14: ba:e5:21:f9:20:8c:85:9a:67:a1:04:22:b1:ba:14:e4: 7a:db:88:da:98:44:7b:c5:a1:83:2c:cd:6d:93:c3:e4: 6c:29:72:5b:0c:94:c5:2c:2f:de:a5:e1:a5:95:20:d7: ef:b7:8e:76:4e:16:96:44:86:6f:81:dc:1f:ff:d8:86: 8c:d2:ba:a9:d1:23:00:3e:21:1a:7a:13:76:94:2b:7b: ce:64:67:a0:cd:0a:78:96:0b:24:62:86:f3:ec:cd:8e: c7:34:0d:52:f1:2c:ff:08:0f:43:28:2c:52:79:14:c8: 9b:80:5f:e9:4f:e9:94:40:b1:7d:5f:5d:1f:5b:35:e5: 90:ec:89:e9:c4:42:6a:c5:00:92:14:93:cd:af:f1:39: b6:87:c0:54:63:17:7a:68:2d:1c:13:c5:d5:5e:3e:93: c5:bd:25:41:bf:71:c7:1c:42:7f:2f:c8:3d:96:5a:d1: 07:6a:a6:28:0f:70:fe:fe:5c:2a:ba:55:f6:cb:4b:59: 87:a1:66:28:14:f2:2d:fa:32:8c:8a:80:2d:ff:29:d3 Fingerprint (SHA-256): 34:D7:CD:BC:69:FC:B6:CB:63:D0:96:B0:4D:56:41:8D:19:2F:1E:8F:A8:1B:DD:96:C5:FF:70:C9:A9:B3:48:54 Fingerprint (SHA1): 1E:F9:26:80:D7:9D:B8:95:E1:D0:38:BE:1E:2C:1F:DA:60:2A:19:73 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8747: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8748: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064593 (0x670ef51) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 11:55:32 2016 Not After : Fri Jan 08 11:55:32 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:07:77:09:55:c6:4e:94:8c:32:da:67:22:a3:8e:dd: 4d:4b:af:64:bc:bf:f9:e8:b6:09:e6:28:7d:19:68:f7: c4:24:fd:da:c0:6a:54:8e:09:3c:41:76:dc:17:68:0a: 5a:ca:d0:2b:17:ff:8f:d2:07:f0:91:66:d1:65:47:3c: bb:a1:2d:bc:6d:19:62:8c:3c:cf:24:3d:4e:05:db:e0: d0:a2:6d:b5:49:5b:30:02:0a:30:cd:24:d0:52:38:db: a4:56:19:63:38:d0:38:24:32:e8:bb:32:29:8b:32:9e: a7:6e:5c:30:16:47:0b:cd:e6:33:66:f4:9f:fa:f9:d0: 13:ec:42:da:f3:b1:d3:0a:30:ed:f2:1f:84:77:f1:f5: 2c:be:b5:1d:e0:11:f7:b6:95:a7:af:13:a2:32:b9:65: 97:3f:95:3b:2f:68:d5:c0:88:aa:66:b1:55:2f:7d:07: 4b:22:ee:6a:0c:a0:48:db:0a:ae:8d:75:25:2e:b4:61: 57:72:a5:49:cb:c8:7f:e4:51:61:fd:52:c3:f8:2a:77: 27:05:c1:9c:64:f9:cd:43:94:1a:ca:d7:6f:db:ef:75: f4:d9:29:2d:5e:62:7a:97:b9:be:b6:7b:6a:ba:2d:ab: ef:2b:7f:08:40:47:b3:6e:32:21:78:71:e9:d7:f7:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:74:64:a2:a7:b5:c9:46:8d:de:8e:ab:02:08:bd:ee: 9d:e4:42:e3:13:29:3e:6b:90:71:03:4f:5f:13:95:b5: 73:03:8c:4c:ca:cd:a6:35:58:f4:0c:53:8a:93:ad:0e: 9e:2a:fa:62:ab:62:7b:36:05:9c:64:c5:5a:00:ca:9a: 98:d7:bc:e7:84:f8:e8:47:d7:26:ef:ad:13:e2:16:ec: 22:f0:d0:6e:10:69:cf:7d:be:7f:74:d0:4e:7b:4e:e2: 7d:af:4e:4e:bd:14:2b:63:f3:b5:44:a7:2a:7e:66:1f: 34:32:3c:3c:66:51:51:78:d8:4f:63:d6:cb:0d:fa:36: 9c:9d:99:a6:c2:fa:68:0e:64:33:9b:b3:d2:03:d7:d2: 07:37:f5:d8:6f:cf:71:ea:d4:18:8b:df:13:61:08:ea: 38:f0:12:aa:8b:47:6b:a9:57:80:a6:69:6f:0b:6c:21: 06:aa:22:b8:a6:90:95:05:8e:2f:5b:10:a3:62:a5:13: 89:26:87:8f:5e:ee:e8:f5:c6:a6:97:4b:9b:e7:67:6a: dd:ab:a4:03:b7:77:a1:e7:c9:5a:82:76:af:07:20:ce: ba:88:a0:82:91:32:3b:61:1e:2d:8f:58:03:43:83:98: 29:8b:06:ca:ba:25:30:01:70:ad:23:a9:2f:3f:39:d8 Fingerprint (SHA-256): 5D:1E:91:4D:7F:E9:9F:33:B8:16:F3:A2:B9:90:9D:74:E8:5A:30:1C:8E:C7:30:53:3E:E9:0B:BC:13:80:DC:AB Fingerprint (SHA1): DA:11:67:E3:CB:69:FB:54:55:DE:6F:57:4D:31:DF:FD:4C:9E:4A:46 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8749: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8750: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064594 (0x670ef52) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 11:55:37 2016 Not After : Fri Jan 08 11:55:37 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:7f:05:6d:65:09:b1:d8:b3:2d:95:01:1d:8a:e4: f2:a1:ed:5c:65:0a:96:53:e7:2b:42:b4:24:18:0c:d5: 09:2d:25:2c:23:97:b5:1f:d8:27:fa:94:5a:65:f3:57: 31:16:eb:5a:5b:b2:18:86:7c:e0:c5:a0:e5:6e:96:2e: 11:e4:b2:e3:67:20:bb:60:3b:d0:95:12:f1:e9:39:9c: e6:e8:45:9b:fb:ea:81:b1:ee:18:23:3f:33:1f:95:3a: 0a:c9:55:a0:3e:aa:03:c8:64:f0:42:a9:6c:d9:18:54: a6:c8:af:50:7d:b2:33:b4:e3:12:3a:cf:b5:59:7a:dc: de:a7:e1:19:16:21:ab:09:e8:fb:bc:a4:3a:0b:ac:e6: db:16:32:ae:6b:a2:53:c2:f4:74:d9:84:c7:61:4a:5f: 60:d3:bb:02:f5:8c:f6:56:30:8d:a7:69:b1:36:39:fc: 02:0c:fa:7d:3d:24:90:40:b8:1c:5b:26:9b:ac:d8:bd: 03:86:35:5e:c2:51:36:de:1f:ba:e8:84:6d:1e:c8:e9: 52:57:a6:7b:9b:03:59:67:b2:e7:eb:b2:da:aa:4d:89: fe:95:f2:87:af:64:77:04:ab:de:d8:22:db:7b:24:47: 1d:fa:51:61:10:bd:d3:1e:ea:8f:70:6c:d7:b6:5f:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:07:8e:5f:4d:cc:01:7b:24:5e:9a:df:70:65:fe:36: 72:cd:d0:54:82:c3:e0:32:02:1c:4b:54:a0:e0:1a:88: c8:30:d3:bd:fd:55:72:71:68:0a:bf:d6:9e:41:dc:5a: 11:a8:ab:58:13:38:e2:be:98:66:b1:d2:77:ec:47:bd: 3d:ea:cd:4e:47:e3:3e:97:8f:1e:f1:de:48:4d:29:ef: 7f:e2:bb:8b:bf:ac:8a:95:d4:79:20:f3:70:c7:86:f4: 0f:a2:71:23:4c:49:6d:63:b1:02:aa:30:b2:e5:f7:5c: d3:e0:52:2b:01:de:5c:22:e0:cc:ee:bd:ca:b3:07:a2: 68:a6:9c:b1:62:45:d7:aa:21:4e:f7:12:6b:0b:c5:03: b2:36:4a:0f:8f:3c:4c:5b:b8:90:64:87:5f:a4:4b:0e: 76:3c:89:62:62:31:87:92:cc:c7:7b:32:a7:74:a2:38: 0c:65:ac:bf:7f:03:32:10:53:7d:c5:c4:aa:e4:14:ac: 7f:12:f0:9d:1b:8b:67:b5:2d:56:46:54:20:61:04:7f: d7:36:b3:7a:55:40:81:25:47:e1:8e:1e:22:bf:dd:f0: 42:bc:ae:a0:e6:6d:99:6f:0f:ad:e7:7e:67:66:3b:e8: 57:bc:53:1a:2c:e5:6d:1a:cf:22:07:97:76:24:44:09 Fingerprint (SHA-256): 40:60:2E:B2:BD:AD:72:27:F8:A6:6A:97:4F:92:42:6F:02:35:32:E5:33:26:99:42:76:7C:8E:D0:25:F0:1A:89 Fingerprint (SHA1): 39:2D:DB:DC:75:CF:04:4F:4F:1E:9E:01:E1:8A:03:3D:6F:04:35:4E Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #8751: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8752: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8753: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #8754: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8755: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064592 (0x670ef50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 11:55:24 2016 Not After : Fri Jan 08 11:55:24 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:9b:08:79:ee:81:33:18:60:2d:9f:7b:fa:ae:ce:0c: ac:d7:c8:31:bb:25:7b:f9:af:a8:b1:f6:34:be:77:55: 0d:a2:74:e9:b9:dd:4e:88:a0:1e:90:4e:c6:8d:69:c0: f1:61:b8:17:db:9a:9c:42:a7:4f:ab:ff:62:6c:5a:07: de:57:81:94:85:e0:a1:29:5a:ee:cf:63:95:3c:28:e2: 8d:81:7b:ef:e8:17:dc:0b:c0:aa:ec:2f:e7:2b:de:36: f4:81:26:e5:51:11:6f:ba:97:d0:9e:49:63:c3:0e:42: 65:de:1b:cf:41:29:1a:d4:71:05:b6:ed:f2:ac:15:8d: f9:87:8c:e8:66:66:b4:f0:c5:52:91:29:93:d8:f1:97: 7a:dd:6f:df:3b:74:a8:5d:81:7c:79:ac:b2:b9:83:cd: b8:e9:d0:22:61:e7:a5:9f:88:35:4c:7b:73:8d:0b:17: e0:21:60:10:0f:89:28:23:49:e0:fb:b5:e3:78:0c:4c: 8a:25:da:c3:44:97:db:9a:c3:74:d4:b4:37:13:e5:2b: 77:60:da:ef:66:4e:9d:32:03:d0:85:c9:67:ba:09:32: 49:a5:9f:f8:bd:17:a5:ee:9e:82:76:c0:6d:6c:59:92: ca:20:71:67:bd:19:f5:03:bc:ac:8f:22:1f:5c:15:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:fd:bb:83:6d:ea:14:86:4b:45:6a:d2:f9:5b:7a:2d: 9f:92:de:5e:e3:bf:aa:4d:4d:27:5e:6f:e8:f0:2c:13: a2:50:88:ce:93:62:18:c4:00:95:6e:8e:c5:c7:32:14: ba:e5:21:f9:20:8c:85:9a:67:a1:04:22:b1:ba:14:e4: 7a:db:88:da:98:44:7b:c5:a1:83:2c:cd:6d:93:c3:e4: 6c:29:72:5b:0c:94:c5:2c:2f:de:a5:e1:a5:95:20:d7: ef:b7:8e:76:4e:16:96:44:86:6f:81:dc:1f:ff:d8:86: 8c:d2:ba:a9:d1:23:00:3e:21:1a:7a:13:76:94:2b:7b: ce:64:67:a0:cd:0a:78:96:0b:24:62:86:f3:ec:cd:8e: c7:34:0d:52:f1:2c:ff:08:0f:43:28:2c:52:79:14:c8: 9b:80:5f:e9:4f:e9:94:40:b1:7d:5f:5d:1f:5b:35:e5: 90:ec:89:e9:c4:42:6a:c5:00:92:14:93:cd:af:f1:39: b6:87:c0:54:63:17:7a:68:2d:1c:13:c5:d5:5e:3e:93: c5:bd:25:41:bf:71:c7:1c:42:7f:2f:c8:3d:96:5a:d1: 07:6a:a6:28:0f:70:fe:fe:5c:2a:ba:55:f6:cb:4b:59: 87:a1:66:28:14:f2:2d:fa:32:8c:8a:80:2d:ff:29:d3 Fingerprint (SHA-256): 34:D7:CD:BC:69:FC:B6:CB:63:D0:96:B0:4D:56:41:8D:19:2F:1E:8F:A8:1B:DD:96:C5:FF:70:C9:A9:B3:48:54 Fingerprint (SHA1): 1E:F9:26:80:D7:9D:B8:95:E1:D0:38:BE:1E:2C:1F:DA:60:2A:19:73 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8756: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8757: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064593 (0x670ef51) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 11:55:32 2016 Not After : Fri Jan 08 11:55:32 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:07:77:09:55:c6:4e:94:8c:32:da:67:22:a3:8e:dd: 4d:4b:af:64:bc:bf:f9:e8:b6:09:e6:28:7d:19:68:f7: c4:24:fd:da:c0:6a:54:8e:09:3c:41:76:dc:17:68:0a: 5a:ca:d0:2b:17:ff:8f:d2:07:f0:91:66:d1:65:47:3c: bb:a1:2d:bc:6d:19:62:8c:3c:cf:24:3d:4e:05:db:e0: d0:a2:6d:b5:49:5b:30:02:0a:30:cd:24:d0:52:38:db: a4:56:19:63:38:d0:38:24:32:e8:bb:32:29:8b:32:9e: a7:6e:5c:30:16:47:0b:cd:e6:33:66:f4:9f:fa:f9:d0: 13:ec:42:da:f3:b1:d3:0a:30:ed:f2:1f:84:77:f1:f5: 2c:be:b5:1d:e0:11:f7:b6:95:a7:af:13:a2:32:b9:65: 97:3f:95:3b:2f:68:d5:c0:88:aa:66:b1:55:2f:7d:07: 4b:22:ee:6a:0c:a0:48:db:0a:ae:8d:75:25:2e:b4:61: 57:72:a5:49:cb:c8:7f:e4:51:61:fd:52:c3:f8:2a:77: 27:05:c1:9c:64:f9:cd:43:94:1a:ca:d7:6f:db:ef:75: f4:d9:29:2d:5e:62:7a:97:b9:be:b6:7b:6a:ba:2d:ab: ef:2b:7f:08:40:47:b3:6e:32:21:78:71:e9:d7:f7:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:74:64:a2:a7:b5:c9:46:8d:de:8e:ab:02:08:bd:ee: 9d:e4:42:e3:13:29:3e:6b:90:71:03:4f:5f:13:95:b5: 73:03:8c:4c:ca:cd:a6:35:58:f4:0c:53:8a:93:ad:0e: 9e:2a:fa:62:ab:62:7b:36:05:9c:64:c5:5a:00:ca:9a: 98:d7:bc:e7:84:f8:e8:47:d7:26:ef:ad:13:e2:16:ec: 22:f0:d0:6e:10:69:cf:7d:be:7f:74:d0:4e:7b:4e:e2: 7d:af:4e:4e:bd:14:2b:63:f3:b5:44:a7:2a:7e:66:1f: 34:32:3c:3c:66:51:51:78:d8:4f:63:d6:cb:0d:fa:36: 9c:9d:99:a6:c2:fa:68:0e:64:33:9b:b3:d2:03:d7:d2: 07:37:f5:d8:6f:cf:71:ea:d4:18:8b:df:13:61:08:ea: 38:f0:12:aa:8b:47:6b:a9:57:80:a6:69:6f:0b:6c:21: 06:aa:22:b8:a6:90:95:05:8e:2f:5b:10:a3:62:a5:13: 89:26:87:8f:5e:ee:e8:f5:c6:a6:97:4b:9b:e7:67:6a: dd:ab:a4:03:b7:77:a1:e7:c9:5a:82:76:af:07:20:ce: ba:88:a0:82:91:32:3b:61:1e:2d:8f:58:03:43:83:98: 29:8b:06:ca:ba:25:30:01:70:ad:23:a9:2f:3f:39:d8 Fingerprint (SHA-256): 5D:1E:91:4D:7F:E9:9F:33:B8:16:F3:A2:B9:90:9D:74:E8:5A:30:1C:8E:C7:30:53:3E:E9:0B:BC:13:80:DC:AB Fingerprint (SHA1): DA:11:67:E3:CB:69:FB:54:55:DE:6F:57:4D:31:DF:FD:4C:9E:4A:46 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8758: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8759: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064594 (0x670ef52) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 11:55:37 2016 Not After : Fri Jan 08 11:55:37 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:7f:05:6d:65:09:b1:d8:b3:2d:95:01:1d:8a:e4: f2:a1:ed:5c:65:0a:96:53:e7:2b:42:b4:24:18:0c:d5: 09:2d:25:2c:23:97:b5:1f:d8:27:fa:94:5a:65:f3:57: 31:16:eb:5a:5b:b2:18:86:7c:e0:c5:a0:e5:6e:96:2e: 11:e4:b2:e3:67:20:bb:60:3b:d0:95:12:f1:e9:39:9c: e6:e8:45:9b:fb:ea:81:b1:ee:18:23:3f:33:1f:95:3a: 0a:c9:55:a0:3e:aa:03:c8:64:f0:42:a9:6c:d9:18:54: a6:c8:af:50:7d:b2:33:b4:e3:12:3a:cf:b5:59:7a:dc: de:a7:e1:19:16:21:ab:09:e8:fb:bc:a4:3a:0b:ac:e6: db:16:32:ae:6b:a2:53:c2:f4:74:d9:84:c7:61:4a:5f: 60:d3:bb:02:f5:8c:f6:56:30:8d:a7:69:b1:36:39:fc: 02:0c:fa:7d:3d:24:90:40:b8:1c:5b:26:9b:ac:d8:bd: 03:86:35:5e:c2:51:36:de:1f:ba:e8:84:6d:1e:c8:e9: 52:57:a6:7b:9b:03:59:67:b2:e7:eb:b2:da:aa:4d:89: fe:95:f2:87:af:64:77:04:ab:de:d8:22:db:7b:24:47: 1d:fa:51:61:10:bd:d3:1e:ea:8f:70:6c:d7:b6:5f:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:07:8e:5f:4d:cc:01:7b:24:5e:9a:df:70:65:fe:36: 72:cd:d0:54:82:c3:e0:32:02:1c:4b:54:a0:e0:1a:88: c8:30:d3:bd:fd:55:72:71:68:0a:bf:d6:9e:41:dc:5a: 11:a8:ab:58:13:38:e2:be:98:66:b1:d2:77:ec:47:bd: 3d:ea:cd:4e:47:e3:3e:97:8f:1e:f1:de:48:4d:29:ef: 7f:e2:bb:8b:bf:ac:8a:95:d4:79:20:f3:70:c7:86:f4: 0f:a2:71:23:4c:49:6d:63:b1:02:aa:30:b2:e5:f7:5c: d3:e0:52:2b:01:de:5c:22:e0:cc:ee:bd:ca:b3:07:a2: 68:a6:9c:b1:62:45:d7:aa:21:4e:f7:12:6b:0b:c5:03: b2:36:4a:0f:8f:3c:4c:5b:b8:90:64:87:5f:a4:4b:0e: 76:3c:89:62:62:31:87:92:cc:c7:7b:32:a7:74:a2:38: 0c:65:ac:bf:7f:03:32:10:53:7d:c5:c4:aa:e4:14:ac: 7f:12:f0:9d:1b:8b:67:b5:2d:56:46:54:20:61:04:7f: d7:36:b3:7a:55:40:81:25:47:e1:8e:1e:22:bf:dd:f0: 42:bc:ae:a0:e6:6d:99:6f:0f:ad:e7:7e:67:66:3b:e8: 57:bc:53:1a:2c:e5:6d:1a:cf:22:07:97:76:24:44:09 Fingerprint (SHA-256): 40:60:2E:B2:BD:AD:72:27:F8:A6:6A:97:4F:92:42:6F:02:35:32:E5:33:26:99:42:76:7C:8E:D0:25:F0:1A:89 Fingerprint (SHA1): 39:2D:DB:DC:75:CF:04:4F:4F:1E:9E:01:E1:8A:03:3D:6F:04:35:4E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #8760: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8761: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064592 (0x670ef50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 11:55:24 2016 Not After : Fri Jan 08 11:55:24 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:9b:08:79:ee:81:33:18:60:2d:9f:7b:fa:ae:ce:0c: ac:d7:c8:31:bb:25:7b:f9:af:a8:b1:f6:34:be:77:55: 0d:a2:74:e9:b9:dd:4e:88:a0:1e:90:4e:c6:8d:69:c0: f1:61:b8:17:db:9a:9c:42:a7:4f:ab:ff:62:6c:5a:07: de:57:81:94:85:e0:a1:29:5a:ee:cf:63:95:3c:28:e2: 8d:81:7b:ef:e8:17:dc:0b:c0:aa:ec:2f:e7:2b:de:36: f4:81:26:e5:51:11:6f:ba:97:d0:9e:49:63:c3:0e:42: 65:de:1b:cf:41:29:1a:d4:71:05:b6:ed:f2:ac:15:8d: f9:87:8c:e8:66:66:b4:f0:c5:52:91:29:93:d8:f1:97: 7a:dd:6f:df:3b:74:a8:5d:81:7c:79:ac:b2:b9:83:cd: b8:e9:d0:22:61:e7:a5:9f:88:35:4c:7b:73:8d:0b:17: e0:21:60:10:0f:89:28:23:49:e0:fb:b5:e3:78:0c:4c: 8a:25:da:c3:44:97:db:9a:c3:74:d4:b4:37:13:e5:2b: 77:60:da:ef:66:4e:9d:32:03:d0:85:c9:67:ba:09:32: 49:a5:9f:f8:bd:17:a5:ee:9e:82:76:c0:6d:6c:59:92: ca:20:71:67:bd:19:f5:03:bc:ac:8f:22:1f:5c:15:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:fd:bb:83:6d:ea:14:86:4b:45:6a:d2:f9:5b:7a:2d: 9f:92:de:5e:e3:bf:aa:4d:4d:27:5e:6f:e8:f0:2c:13: a2:50:88:ce:93:62:18:c4:00:95:6e:8e:c5:c7:32:14: ba:e5:21:f9:20:8c:85:9a:67:a1:04:22:b1:ba:14:e4: 7a:db:88:da:98:44:7b:c5:a1:83:2c:cd:6d:93:c3:e4: 6c:29:72:5b:0c:94:c5:2c:2f:de:a5:e1:a5:95:20:d7: ef:b7:8e:76:4e:16:96:44:86:6f:81:dc:1f:ff:d8:86: 8c:d2:ba:a9:d1:23:00:3e:21:1a:7a:13:76:94:2b:7b: ce:64:67:a0:cd:0a:78:96:0b:24:62:86:f3:ec:cd:8e: c7:34:0d:52:f1:2c:ff:08:0f:43:28:2c:52:79:14:c8: 9b:80:5f:e9:4f:e9:94:40:b1:7d:5f:5d:1f:5b:35:e5: 90:ec:89:e9:c4:42:6a:c5:00:92:14:93:cd:af:f1:39: b6:87:c0:54:63:17:7a:68:2d:1c:13:c5:d5:5e:3e:93: c5:bd:25:41:bf:71:c7:1c:42:7f:2f:c8:3d:96:5a:d1: 07:6a:a6:28:0f:70:fe:fe:5c:2a:ba:55:f6:cb:4b:59: 87:a1:66:28:14:f2:2d:fa:32:8c:8a:80:2d:ff:29:d3 Fingerprint (SHA-256): 34:D7:CD:BC:69:FC:B6:CB:63:D0:96:B0:4D:56:41:8D:19:2F:1E:8F:A8:1B:DD:96:C5:FF:70:C9:A9:B3:48:54 Fingerprint (SHA1): 1E:F9:26:80:D7:9D:B8:95:E1:D0:38:BE:1E:2C:1F:DA:60:2A:19:73 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8762: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064592 (0x670ef50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 11:55:24 2016 Not After : Fri Jan 08 11:55:24 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:9b:08:79:ee:81:33:18:60:2d:9f:7b:fa:ae:ce:0c: ac:d7:c8:31:bb:25:7b:f9:af:a8:b1:f6:34:be:77:55: 0d:a2:74:e9:b9:dd:4e:88:a0:1e:90:4e:c6:8d:69:c0: f1:61:b8:17:db:9a:9c:42:a7:4f:ab:ff:62:6c:5a:07: de:57:81:94:85:e0:a1:29:5a:ee:cf:63:95:3c:28:e2: 8d:81:7b:ef:e8:17:dc:0b:c0:aa:ec:2f:e7:2b:de:36: f4:81:26:e5:51:11:6f:ba:97:d0:9e:49:63:c3:0e:42: 65:de:1b:cf:41:29:1a:d4:71:05:b6:ed:f2:ac:15:8d: f9:87:8c:e8:66:66:b4:f0:c5:52:91:29:93:d8:f1:97: 7a:dd:6f:df:3b:74:a8:5d:81:7c:79:ac:b2:b9:83:cd: b8:e9:d0:22:61:e7:a5:9f:88:35:4c:7b:73:8d:0b:17: e0:21:60:10:0f:89:28:23:49:e0:fb:b5:e3:78:0c:4c: 8a:25:da:c3:44:97:db:9a:c3:74:d4:b4:37:13:e5:2b: 77:60:da:ef:66:4e:9d:32:03:d0:85:c9:67:ba:09:32: 49:a5:9f:f8:bd:17:a5:ee:9e:82:76:c0:6d:6c:59:92: ca:20:71:67:bd:19:f5:03:bc:ac:8f:22:1f:5c:15:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:fd:bb:83:6d:ea:14:86:4b:45:6a:d2:f9:5b:7a:2d: 9f:92:de:5e:e3:bf:aa:4d:4d:27:5e:6f:e8:f0:2c:13: a2:50:88:ce:93:62:18:c4:00:95:6e:8e:c5:c7:32:14: ba:e5:21:f9:20:8c:85:9a:67:a1:04:22:b1:ba:14:e4: 7a:db:88:da:98:44:7b:c5:a1:83:2c:cd:6d:93:c3:e4: 6c:29:72:5b:0c:94:c5:2c:2f:de:a5:e1:a5:95:20:d7: ef:b7:8e:76:4e:16:96:44:86:6f:81:dc:1f:ff:d8:86: 8c:d2:ba:a9:d1:23:00:3e:21:1a:7a:13:76:94:2b:7b: ce:64:67:a0:cd:0a:78:96:0b:24:62:86:f3:ec:cd:8e: c7:34:0d:52:f1:2c:ff:08:0f:43:28:2c:52:79:14:c8: 9b:80:5f:e9:4f:e9:94:40:b1:7d:5f:5d:1f:5b:35:e5: 90:ec:89:e9:c4:42:6a:c5:00:92:14:93:cd:af:f1:39: b6:87:c0:54:63:17:7a:68:2d:1c:13:c5:d5:5e:3e:93: c5:bd:25:41:bf:71:c7:1c:42:7f:2f:c8:3d:96:5a:d1: 07:6a:a6:28:0f:70:fe:fe:5c:2a:ba:55:f6:cb:4b:59: 87:a1:66:28:14:f2:2d:fa:32:8c:8a:80:2d:ff:29:d3 Fingerprint (SHA-256): 34:D7:CD:BC:69:FC:B6:CB:63:D0:96:B0:4D:56:41:8D:19:2F:1E:8F:A8:1B:DD:96:C5:FF:70:C9:A9:B3:48:54 Fingerprint (SHA1): 1E:F9:26:80:D7:9D:B8:95:E1:D0:38:BE:1E:2C:1F:DA:60:2A:19:73 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8763: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064593 (0x670ef51) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 11:55:32 2016 Not After : Fri Jan 08 11:55:32 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:07:77:09:55:c6:4e:94:8c:32:da:67:22:a3:8e:dd: 4d:4b:af:64:bc:bf:f9:e8:b6:09:e6:28:7d:19:68:f7: c4:24:fd:da:c0:6a:54:8e:09:3c:41:76:dc:17:68:0a: 5a:ca:d0:2b:17:ff:8f:d2:07:f0:91:66:d1:65:47:3c: bb:a1:2d:bc:6d:19:62:8c:3c:cf:24:3d:4e:05:db:e0: d0:a2:6d:b5:49:5b:30:02:0a:30:cd:24:d0:52:38:db: a4:56:19:63:38:d0:38:24:32:e8:bb:32:29:8b:32:9e: a7:6e:5c:30:16:47:0b:cd:e6:33:66:f4:9f:fa:f9:d0: 13:ec:42:da:f3:b1:d3:0a:30:ed:f2:1f:84:77:f1:f5: 2c:be:b5:1d:e0:11:f7:b6:95:a7:af:13:a2:32:b9:65: 97:3f:95:3b:2f:68:d5:c0:88:aa:66:b1:55:2f:7d:07: 4b:22:ee:6a:0c:a0:48:db:0a:ae:8d:75:25:2e:b4:61: 57:72:a5:49:cb:c8:7f:e4:51:61:fd:52:c3:f8:2a:77: 27:05:c1:9c:64:f9:cd:43:94:1a:ca:d7:6f:db:ef:75: f4:d9:29:2d:5e:62:7a:97:b9:be:b6:7b:6a:ba:2d:ab: ef:2b:7f:08:40:47:b3:6e:32:21:78:71:e9:d7:f7:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:74:64:a2:a7:b5:c9:46:8d:de:8e:ab:02:08:bd:ee: 9d:e4:42:e3:13:29:3e:6b:90:71:03:4f:5f:13:95:b5: 73:03:8c:4c:ca:cd:a6:35:58:f4:0c:53:8a:93:ad:0e: 9e:2a:fa:62:ab:62:7b:36:05:9c:64:c5:5a:00:ca:9a: 98:d7:bc:e7:84:f8:e8:47:d7:26:ef:ad:13:e2:16:ec: 22:f0:d0:6e:10:69:cf:7d:be:7f:74:d0:4e:7b:4e:e2: 7d:af:4e:4e:bd:14:2b:63:f3:b5:44:a7:2a:7e:66:1f: 34:32:3c:3c:66:51:51:78:d8:4f:63:d6:cb:0d:fa:36: 9c:9d:99:a6:c2:fa:68:0e:64:33:9b:b3:d2:03:d7:d2: 07:37:f5:d8:6f:cf:71:ea:d4:18:8b:df:13:61:08:ea: 38:f0:12:aa:8b:47:6b:a9:57:80:a6:69:6f:0b:6c:21: 06:aa:22:b8:a6:90:95:05:8e:2f:5b:10:a3:62:a5:13: 89:26:87:8f:5e:ee:e8:f5:c6:a6:97:4b:9b:e7:67:6a: dd:ab:a4:03:b7:77:a1:e7:c9:5a:82:76:af:07:20:ce: ba:88:a0:82:91:32:3b:61:1e:2d:8f:58:03:43:83:98: 29:8b:06:ca:ba:25:30:01:70:ad:23:a9:2f:3f:39:d8 Fingerprint (SHA-256): 5D:1E:91:4D:7F:E9:9F:33:B8:16:F3:A2:B9:90:9D:74:E8:5A:30:1C:8E:C7:30:53:3E:E9:0B:BC:13:80:DC:AB Fingerprint (SHA1): DA:11:67:E3:CB:69:FB:54:55:DE:6F:57:4D:31:DF:FD:4C:9E:4A:46 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8764: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064593 (0x670ef51) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 11:55:32 2016 Not After : Fri Jan 08 11:55:32 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:07:77:09:55:c6:4e:94:8c:32:da:67:22:a3:8e:dd: 4d:4b:af:64:bc:bf:f9:e8:b6:09:e6:28:7d:19:68:f7: c4:24:fd:da:c0:6a:54:8e:09:3c:41:76:dc:17:68:0a: 5a:ca:d0:2b:17:ff:8f:d2:07:f0:91:66:d1:65:47:3c: bb:a1:2d:bc:6d:19:62:8c:3c:cf:24:3d:4e:05:db:e0: d0:a2:6d:b5:49:5b:30:02:0a:30:cd:24:d0:52:38:db: a4:56:19:63:38:d0:38:24:32:e8:bb:32:29:8b:32:9e: a7:6e:5c:30:16:47:0b:cd:e6:33:66:f4:9f:fa:f9:d0: 13:ec:42:da:f3:b1:d3:0a:30:ed:f2:1f:84:77:f1:f5: 2c:be:b5:1d:e0:11:f7:b6:95:a7:af:13:a2:32:b9:65: 97:3f:95:3b:2f:68:d5:c0:88:aa:66:b1:55:2f:7d:07: 4b:22:ee:6a:0c:a0:48:db:0a:ae:8d:75:25:2e:b4:61: 57:72:a5:49:cb:c8:7f:e4:51:61:fd:52:c3:f8:2a:77: 27:05:c1:9c:64:f9:cd:43:94:1a:ca:d7:6f:db:ef:75: f4:d9:29:2d:5e:62:7a:97:b9:be:b6:7b:6a:ba:2d:ab: ef:2b:7f:08:40:47:b3:6e:32:21:78:71:e9:d7:f7:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:74:64:a2:a7:b5:c9:46:8d:de:8e:ab:02:08:bd:ee: 9d:e4:42:e3:13:29:3e:6b:90:71:03:4f:5f:13:95:b5: 73:03:8c:4c:ca:cd:a6:35:58:f4:0c:53:8a:93:ad:0e: 9e:2a:fa:62:ab:62:7b:36:05:9c:64:c5:5a:00:ca:9a: 98:d7:bc:e7:84:f8:e8:47:d7:26:ef:ad:13:e2:16:ec: 22:f0:d0:6e:10:69:cf:7d:be:7f:74:d0:4e:7b:4e:e2: 7d:af:4e:4e:bd:14:2b:63:f3:b5:44:a7:2a:7e:66:1f: 34:32:3c:3c:66:51:51:78:d8:4f:63:d6:cb:0d:fa:36: 9c:9d:99:a6:c2:fa:68:0e:64:33:9b:b3:d2:03:d7:d2: 07:37:f5:d8:6f:cf:71:ea:d4:18:8b:df:13:61:08:ea: 38:f0:12:aa:8b:47:6b:a9:57:80:a6:69:6f:0b:6c:21: 06:aa:22:b8:a6:90:95:05:8e:2f:5b:10:a3:62:a5:13: 89:26:87:8f:5e:ee:e8:f5:c6:a6:97:4b:9b:e7:67:6a: dd:ab:a4:03:b7:77:a1:e7:c9:5a:82:76:af:07:20:ce: ba:88:a0:82:91:32:3b:61:1e:2d:8f:58:03:43:83:98: 29:8b:06:ca:ba:25:30:01:70:ad:23:a9:2f:3f:39:d8 Fingerprint (SHA-256): 5D:1E:91:4D:7F:E9:9F:33:B8:16:F3:A2:B9:90:9D:74:E8:5A:30:1C:8E:C7:30:53:3E:E9:0B:BC:13:80:DC:AB Fingerprint (SHA1): DA:11:67:E3:CB:69:FB:54:55:DE:6F:57:4D:31:DF:FD:4C:9E:4A:46 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8765: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064594 (0x670ef52) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 11:55:37 2016 Not After : Fri Jan 08 11:55:37 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:7f:05:6d:65:09:b1:d8:b3:2d:95:01:1d:8a:e4: f2:a1:ed:5c:65:0a:96:53:e7:2b:42:b4:24:18:0c:d5: 09:2d:25:2c:23:97:b5:1f:d8:27:fa:94:5a:65:f3:57: 31:16:eb:5a:5b:b2:18:86:7c:e0:c5:a0:e5:6e:96:2e: 11:e4:b2:e3:67:20:bb:60:3b:d0:95:12:f1:e9:39:9c: e6:e8:45:9b:fb:ea:81:b1:ee:18:23:3f:33:1f:95:3a: 0a:c9:55:a0:3e:aa:03:c8:64:f0:42:a9:6c:d9:18:54: a6:c8:af:50:7d:b2:33:b4:e3:12:3a:cf:b5:59:7a:dc: de:a7:e1:19:16:21:ab:09:e8:fb:bc:a4:3a:0b:ac:e6: db:16:32:ae:6b:a2:53:c2:f4:74:d9:84:c7:61:4a:5f: 60:d3:bb:02:f5:8c:f6:56:30:8d:a7:69:b1:36:39:fc: 02:0c:fa:7d:3d:24:90:40:b8:1c:5b:26:9b:ac:d8:bd: 03:86:35:5e:c2:51:36:de:1f:ba:e8:84:6d:1e:c8:e9: 52:57:a6:7b:9b:03:59:67:b2:e7:eb:b2:da:aa:4d:89: fe:95:f2:87:af:64:77:04:ab:de:d8:22:db:7b:24:47: 1d:fa:51:61:10:bd:d3:1e:ea:8f:70:6c:d7:b6:5f:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:07:8e:5f:4d:cc:01:7b:24:5e:9a:df:70:65:fe:36: 72:cd:d0:54:82:c3:e0:32:02:1c:4b:54:a0:e0:1a:88: c8:30:d3:bd:fd:55:72:71:68:0a:bf:d6:9e:41:dc:5a: 11:a8:ab:58:13:38:e2:be:98:66:b1:d2:77:ec:47:bd: 3d:ea:cd:4e:47:e3:3e:97:8f:1e:f1:de:48:4d:29:ef: 7f:e2:bb:8b:bf:ac:8a:95:d4:79:20:f3:70:c7:86:f4: 0f:a2:71:23:4c:49:6d:63:b1:02:aa:30:b2:e5:f7:5c: d3:e0:52:2b:01:de:5c:22:e0:cc:ee:bd:ca:b3:07:a2: 68:a6:9c:b1:62:45:d7:aa:21:4e:f7:12:6b:0b:c5:03: b2:36:4a:0f:8f:3c:4c:5b:b8:90:64:87:5f:a4:4b:0e: 76:3c:89:62:62:31:87:92:cc:c7:7b:32:a7:74:a2:38: 0c:65:ac:bf:7f:03:32:10:53:7d:c5:c4:aa:e4:14:ac: 7f:12:f0:9d:1b:8b:67:b5:2d:56:46:54:20:61:04:7f: d7:36:b3:7a:55:40:81:25:47:e1:8e:1e:22:bf:dd:f0: 42:bc:ae:a0:e6:6d:99:6f:0f:ad:e7:7e:67:66:3b:e8: 57:bc:53:1a:2c:e5:6d:1a:cf:22:07:97:76:24:44:09 Fingerprint (SHA-256): 40:60:2E:B2:BD:AD:72:27:F8:A6:6A:97:4F:92:42:6F:02:35:32:E5:33:26:99:42:76:7C:8E:D0:25:F0:1A:89 Fingerprint (SHA1): 39:2D:DB:DC:75:CF:04:4F:4F:1E:9E:01:E1:8A:03:3D:6F:04:35:4E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #8766: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064594 (0x670ef52) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 11:55:37 2016 Not After : Fri Jan 08 11:55:37 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:92:7f:05:6d:65:09:b1:d8:b3:2d:95:01:1d:8a:e4: f2:a1:ed:5c:65:0a:96:53:e7:2b:42:b4:24:18:0c:d5: 09:2d:25:2c:23:97:b5:1f:d8:27:fa:94:5a:65:f3:57: 31:16:eb:5a:5b:b2:18:86:7c:e0:c5:a0:e5:6e:96:2e: 11:e4:b2:e3:67:20:bb:60:3b:d0:95:12:f1:e9:39:9c: e6:e8:45:9b:fb:ea:81:b1:ee:18:23:3f:33:1f:95:3a: 0a:c9:55:a0:3e:aa:03:c8:64:f0:42:a9:6c:d9:18:54: a6:c8:af:50:7d:b2:33:b4:e3:12:3a:cf:b5:59:7a:dc: de:a7:e1:19:16:21:ab:09:e8:fb:bc:a4:3a:0b:ac:e6: db:16:32:ae:6b:a2:53:c2:f4:74:d9:84:c7:61:4a:5f: 60:d3:bb:02:f5:8c:f6:56:30:8d:a7:69:b1:36:39:fc: 02:0c:fa:7d:3d:24:90:40:b8:1c:5b:26:9b:ac:d8:bd: 03:86:35:5e:c2:51:36:de:1f:ba:e8:84:6d:1e:c8:e9: 52:57:a6:7b:9b:03:59:67:b2:e7:eb:b2:da:aa:4d:89: fe:95:f2:87:af:64:77:04:ab:de:d8:22:db:7b:24:47: 1d:fa:51:61:10:bd:d3:1e:ea:8f:70:6c:d7:b6:5f:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:07:8e:5f:4d:cc:01:7b:24:5e:9a:df:70:65:fe:36: 72:cd:d0:54:82:c3:e0:32:02:1c:4b:54:a0:e0:1a:88: c8:30:d3:bd:fd:55:72:71:68:0a:bf:d6:9e:41:dc:5a: 11:a8:ab:58:13:38:e2:be:98:66:b1:d2:77:ec:47:bd: 3d:ea:cd:4e:47:e3:3e:97:8f:1e:f1:de:48:4d:29:ef: 7f:e2:bb:8b:bf:ac:8a:95:d4:79:20:f3:70:c7:86:f4: 0f:a2:71:23:4c:49:6d:63:b1:02:aa:30:b2:e5:f7:5c: d3:e0:52:2b:01:de:5c:22:e0:cc:ee:bd:ca:b3:07:a2: 68:a6:9c:b1:62:45:d7:aa:21:4e:f7:12:6b:0b:c5:03: b2:36:4a:0f:8f:3c:4c:5b:b8:90:64:87:5f:a4:4b:0e: 76:3c:89:62:62:31:87:92:cc:c7:7b:32:a7:74:a2:38: 0c:65:ac:bf:7f:03:32:10:53:7d:c5:c4:aa:e4:14:ac: 7f:12:f0:9d:1b:8b:67:b5:2d:56:46:54:20:61:04:7f: d7:36:b3:7a:55:40:81:25:47:e1:8e:1e:22:bf:dd:f0: 42:bc:ae:a0:e6:6d:99:6f:0f:ad:e7:7e:67:66:3b:e8: 57:bc:53:1a:2c:e5:6d:1a:cf:22:07:97:76:24:44:09 Fingerprint (SHA-256): 40:60:2E:B2:BD:AD:72:27:F8:A6:6A:97:4F:92:42:6F:02:35:32:E5:33:26:99:42:76:7C:8E:D0:25:F0:1A:89 Fingerprint (SHA1): 39:2D:DB:DC:75:CF:04:4F:4F:1E:9E:01:E1:8A:03:3D:6F:04:35:4E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #8767: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #8768: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064597 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8769: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #8770: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8771: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8772: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108064598 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8773: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8774: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8775: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8776: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108064599 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8777: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8778: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #8779: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8780: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 108064600 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8781: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8782: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #8783: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8784: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108064601 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8785: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8786: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #8787: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8788: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108064602 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8789: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8790: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #8791: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8792: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 108064603 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8793: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8794: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8795: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #8796: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #8797: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8798: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #8799: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064597 (0x670ef55) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 11:56:26 2016 Not After : Fri Jan 08 11:56:26 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:3a:1d:e4:e2:0d:b7:8b:17:61:1f:07:15:2e:dd:fa: f1:7d:a9:50:c9:6a:4d:01:19:8a:d6:f6:63:c6:cf:84: 4d:50:64:bc:0c:38:c5:e8:1d:ac:90:6e:d0:d6:64:8a: 6f:c6:93:6c:27:fc:9c:c3:36:1e:1f:94:5f:5e:60:a6: 91:f2:75:51:1b:7a:c9:f1:2d:57:13:8b:65:9f:89:fa: d0:97:22:14:21:52:2a:15:c8:02:94:76:86:28:88:0d: 7f:93:49:38:20:c1:25:80:42:fb:b1:cb:83:38:8b:26: ff:fb:7e:ce:e9:02:e7:1d:92:af:4b:44:4b:7d:55:f0: e4:92:80:4f:d7:1a:af:69:d5:8b:9e:92:3b:07:99:bc: 91:b5:d2:95:7c:52:dc:e0:b8:dc:5c:80:1f:d5:42:a1: 80:8b:c7:41:38:89:e3:9d:46:4d:f2:57:07:a2:63:5f: 62:5f:49:80:a1:a3:b2:d2:9d:ba:d3:5c:b8:6e:fe:11: 1f:07:94:1b:4e:17:0d:5a:76:b8:91:da:d5:6e:5e:8e: 20:ab:21:0e:d9:81:97:03:2a:e8:10:ce:cb:b3:94:48: 44:44:26:da:52:07:45:f0:19:55:bf:f1:0a:cc:ee:d9: a7:f5:05:ab:a6:08:e9:f4:7e:84:67:b2:39:a6:fc:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:5c:ab:fd:04:2f:97:e6:3d:55:6d:c1:64:af:ee:f7: d5:9d:00:75:e9:eb:7b:64:01:87:62:7d:db:34:6c:7c: af:73:00:4a:0b:41:2f:f3:a4:f7:54:9c:4a:95:a1:1f: dd:c1:9b:2f:81:3c:38:c5:00:03:30:e8:f0:4c:7f:52: 38:14:4e:31:c5:a7:f6:ee:eb:94:a9:ee:dc:14:6c:d8: 96:75:0a:a1:bb:a9:52:bc:8d:dd:82:f5:ee:86:e3:99: 7d:01:f0:3c:7d:a2:5c:4b:aa:31:fc:ed:35:79:fa:10: 9d:52:61:72:e2:29:5f:21:ec:ba:0c:df:c1:cf:d0:5c: ff:0c:f6:d6:c2:94:3c:09:cb:52:92:68:33:0a:97:83: 8a:21:f7:54:21:b4:a0:b5:d4:7b:e7:de:92:e8:89:f4: df:2c:90:6d:72:01:e8:2b:2b:96:97:08:b0:27:8d:73: ec:d0:b5:44:a4:c8:95:98:be:e5:4f:78:5a:96:69:bd: e2:4b:6c:df:17:49:87:5b:26:43:34:55:89:34:81:3f: 10:af:17:a6:99:5a:d7:59:f0:7f:d2:9d:3e:22:71:ae: 0c:3a:da:52:b5:d0:20:c4:14:f5:c5:af:3a:56:ee:99: 2d:90:91:f2:4a:1d:38:d2:32:33:b0:7b:91:50:64:6b Fingerprint (SHA-256): 8D:34:44:C3:CB:A1:59:B6:AE:E0:AF:F8:CF:93:A7:97:CD:0C:0B:2D:74:EC:3F:AC:89:B8:3B:B7:52:B0:FB:D7 Fingerprint (SHA1): DA:21:F7:A6:E1:F1:EE:8D:30:C1:46:46:C4:C1:D2:D8:04:ED:4C:D8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8800: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8801: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8802: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8803: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064597 (0x670ef55) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 11:56:26 2016 Not After : Fri Jan 08 11:56:26 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:3a:1d:e4:e2:0d:b7:8b:17:61:1f:07:15:2e:dd:fa: f1:7d:a9:50:c9:6a:4d:01:19:8a:d6:f6:63:c6:cf:84: 4d:50:64:bc:0c:38:c5:e8:1d:ac:90:6e:d0:d6:64:8a: 6f:c6:93:6c:27:fc:9c:c3:36:1e:1f:94:5f:5e:60:a6: 91:f2:75:51:1b:7a:c9:f1:2d:57:13:8b:65:9f:89:fa: d0:97:22:14:21:52:2a:15:c8:02:94:76:86:28:88:0d: 7f:93:49:38:20:c1:25:80:42:fb:b1:cb:83:38:8b:26: ff:fb:7e:ce:e9:02:e7:1d:92:af:4b:44:4b:7d:55:f0: e4:92:80:4f:d7:1a:af:69:d5:8b:9e:92:3b:07:99:bc: 91:b5:d2:95:7c:52:dc:e0:b8:dc:5c:80:1f:d5:42:a1: 80:8b:c7:41:38:89:e3:9d:46:4d:f2:57:07:a2:63:5f: 62:5f:49:80:a1:a3:b2:d2:9d:ba:d3:5c:b8:6e:fe:11: 1f:07:94:1b:4e:17:0d:5a:76:b8:91:da:d5:6e:5e:8e: 20:ab:21:0e:d9:81:97:03:2a:e8:10:ce:cb:b3:94:48: 44:44:26:da:52:07:45:f0:19:55:bf:f1:0a:cc:ee:d9: a7:f5:05:ab:a6:08:e9:f4:7e:84:67:b2:39:a6:fc:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:5c:ab:fd:04:2f:97:e6:3d:55:6d:c1:64:af:ee:f7: d5:9d:00:75:e9:eb:7b:64:01:87:62:7d:db:34:6c:7c: af:73:00:4a:0b:41:2f:f3:a4:f7:54:9c:4a:95:a1:1f: dd:c1:9b:2f:81:3c:38:c5:00:03:30:e8:f0:4c:7f:52: 38:14:4e:31:c5:a7:f6:ee:eb:94:a9:ee:dc:14:6c:d8: 96:75:0a:a1:bb:a9:52:bc:8d:dd:82:f5:ee:86:e3:99: 7d:01:f0:3c:7d:a2:5c:4b:aa:31:fc:ed:35:79:fa:10: 9d:52:61:72:e2:29:5f:21:ec:ba:0c:df:c1:cf:d0:5c: ff:0c:f6:d6:c2:94:3c:09:cb:52:92:68:33:0a:97:83: 8a:21:f7:54:21:b4:a0:b5:d4:7b:e7:de:92:e8:89:f4: df:2c:90:6d:72:01:e8:2b:2b:96:97:08:b0:27:8d:73: ec:d0:b5:44:a4:c8:95:98:be:e5:4f:78:5a:96:69:bd: e2:4b:6c:df:17:49:87:5b:26:43:34:55:89:34:81:3f: 10:af:17:a6:99:5a:d7:59:f0:7f:d2:9d:3e:22:71:ae: 0c:3a:da:52:b5:d0:20:c4:14:f5:c5:af:3a:56:ee:99: 2d:90:91:f2:4a:1d:38:d2:32:33:b0:7b:91:50:64:6b Fingerprint (SHA-256): 8D:34:44:C3:CB:A1:59:B6:AE:E0:AF:F8:CF:93:A7:97:CD:0C:0B:2D:74:EC:3F:AC:89:B8:3B:B7:52:B0:FB:D7 Fingerprint (SHA1): DA:21:F7:A6:E1:F1:EE:8D:30:C1:46:46:C4:C1:D2:D8:04:ED:4C:D8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8804: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8805: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #8806: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064604 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8807: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #8808: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8809: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8810: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108064605 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8811: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8812: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #8813: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8814: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 108064606 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8815: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8816: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #8817: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8818: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 108064607 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8819: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8820: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8821: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8822: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 108064608 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8823: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8824: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #8825: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8826: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 108064609 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8827: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8828: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #8829: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8830: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 108064610 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8831: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8832: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8833: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8834: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 108064611 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8835: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8836: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #8837: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8838: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 108064612 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8839: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8840: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #8841: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8842: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 108064613 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8843: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8844: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #8845: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8846: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 108064614 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8847: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8848: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #8849: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8850: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 108064615 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8851: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8852: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #8853: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8854: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 108064616 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8855: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8856: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #8857: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8858: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 108064617 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8859: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8860: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #8861: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8862: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 108064618 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8863: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8864: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #8865: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8866: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 108064619 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8867: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8868: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #8869: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8870: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 108064620 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8871: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8872: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #8873: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8874: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 108064621 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8875: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8876: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #8877: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8878: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 108064622 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8879: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8880: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #8881: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8882: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 108064623 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8883: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8884: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #8885: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8886: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 108064624 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8887: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8888: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #8889: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8890: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 108064625 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8891: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8892: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #8893: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8894: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 108064626 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8895: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8896: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #8897: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8898: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 108064627 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8899: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8900: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #8901: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8902: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 108064628 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8903: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8904: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #8905: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8906: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 108064629 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8907: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8908: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #8909: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8910: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 108064630 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8911: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8912: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #8913: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8914: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 108064631 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8915: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8916: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #8917: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8918: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 108064632 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8919: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8920: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #8921: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8922: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 108064633 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8923: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8924: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8925: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064604 (0x670ef5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 11:57:31 2016 Not After : Fri Jan 08 11:57:31 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:1d:18:52:74:6e:d8:ce:62:1c:a9:ce:d9:62:bf:1b: 8f:e2:c8:b8:0f:ef:b3:b1:29:c9:15:20:66:74:ba:6d: 7b:f0:f8:96:fb:29:ba:d3:f2:67:87:86:1d:46:21:db: 32:f0:f3:61:7d:2a:cc:d0:6a:2e:b8:38:df:dd:70:27: e5:2d:e0:2a:84:a0:1a:3b:f0:1c:62:1f:fb:11:af:c3: 78:45:4d:19:9c:c8:1f:b5:2e:5f:11:e5:a1:90:eb:bf: 8e:08:0e:1d:69:f4:96:45:f5:08:f8:30:a8:25:f0:5b: 9e:c0:9a:86:25:a0:84:41:bd:f6:98:48:77:a0:c5:76: 62:05:32:f4:1f:28:b5:bc:83:ee:b5:d8:d3:98:fa:8b: 94:cc:36:7d:a1:91:26:8a:9d:b0:2a:c9:1b:67:78:d6: d7:92:0b:f0:0e:9f:81:8d:61:30:a5:33:62:39:1a:cc: 9e:ec:8f:d7:eb:24:64:72:e8:d7:62:f6:5d:23:f5:e7: c7:d8:53:5d:d6:de:20:68:3f:34:8b:6f:96:97:a8:2e: 41:1c:56:5e:b1:eb:4f:d3:5f:ee:7a:46:f6:46:18:5f: 47:3a:3c:f4:9c:88:4a:bd:3a:22:fb:cd:34:b5:e5:98: 82:35:39:41:b9:21:78:97:01:26:c3:6e:19:26:32:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:42:1c:c6:19:be:a2:d5:62:6b:5d:7b:61:a9:0a:c0: ed:da:1a:a9:10:ca:88:5f:26:fc:0b:71:21:06:66:c9: 61:7c:24:ff:64:c0:71:e4:46:04:90:17:b8:f8:30:a4: d0:d6:4d:34:95:bf:ce:65:1c:e2:53:4b:72:b6:a9:59: 2b:41:6c:4f:f2:98:e0:8e:73:be:9a:fe:fe:f9:a8:74: fa:e3:f1:0f:fe:71:24:a5:6c:a0:02:f2:21:3d:64:fe: 76:f6:12:33:d7:8b:ba:78:56:45:cc:e9:2a:64:a0:b5: a4:1c:26:62:d4:b0:32:1f:1e:93:3f:fd:db:16:dd:6d: 6c:28:a4:55:77:2a:a7:87:59:9b:20:bb:0f:27:1e:91: 90:ba:a7:44:25:df:bc:e0:9b:0a:b0:2f:af:92:10:06: a7:c4:cd:0a:e6:2a:9d:f2:d6:5f:17:b7:28:3d:4f:e2: 5e:41:4a:85:ad:01:12:94:db:62:af:95:13:8e:a5:56: c3:86:91:bf:7b:1c:89:4e:37:51:49:10:a1:2f:e6:39: 6a:35:fd:71:13:27:bd:8f:de:b8:57:af:be:9e:31:6e: 58:3d:f7:6d:81:f7:f4:ce:85:21:d5:42:8a:08:ca:d3: ce:67:89:3f:07:e3:a6:2a:04:52:b8:0f:b0:b6:8d:d6 Fingerprint (SHA-256): 6B:54:06:0A:5C:F1:8E:CD:5F:C3:AD:B5:E5:A7:D0:E4:08:8A:01:F6:E4:E8:0F:B4:86:A8:60:A7:05:18:60:34 Fingerprint (SHA1): 6A:F0:B4:60:BA:95:4C:38:1E:8F:05:31:C3:48:2F:6E:83:41:19:6F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8926: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8927: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064604 (0x670ef5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 11:57:31 2016 Not After : Fri Jan 08 11:57:31 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:1d:18:52:74:6e:d8:ce:62:1c:a9:ce:d9:62:bf:1b: 8f:e2:c8:b8:0f:ef:b3:b1:29:c9:15:20:66:74:ba:6d: 7b:f0:f8:96:fb:29:ba:d3:f2:67:87:86:1d:46:21:db: 32:f0:f3:61:7d:2a:cc:d0:6a:2e:b8:38:df:dd:70:27: e5:2d:e0:2a:84:a0:1a:3b:f0:1c:62:1f:fb:11:af:c3: 78:45:4d:19:9c:c8:1f:b5:2e:5f:11:e5:a1:90:eb:bf: 8e:08:0e:1d:69:f4:96:45:f5:08:f8:30:a8:25:f0:5b: 9e:c0:9a:86:25:a0:84:41:bd:f6:98:48:77:a0:c5:76: 62:05:32:f4:1f:28:b5:bc:83:ee:b5:d8:d3:98:fa:8b: 94:cc:36:7d:a1:91:26:8a:9d:b0:2a:c9:1b:67:78:d6: d7:92:0b:f0:0e:9f:81:8d:61:30:a5:33:62:39:1a:cc: 9e:ec:8f:d7:eb:24:64:72:e8:d7:62:f6:5d:23:f5:e7: c7:d8:53:5d:d6:de:20:68:3f:34:8b:6f:96:97:a8:2e: 41:1c:56:5e:b1:eb:4f:d3:5f:ee:7a:46:f6:46:18:5f: 47:3a:3c:f4:9c:88:4a:bd:3a:22:fb:cd:34:b5:e5:98: 82:35:39:41:b9:21:78:97:01:26:c3:6e:19:26:32:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:42:1c:c6:19:be:a2:d5:62:6b:5d:7b:61:a9:0a:c0: ed:da:1a:a9:10:ca:88:5f:26:fc:0b:71:21:06:66:c9: 61:7c:24:ff:64:c0:71:e4:46:04:90:17:b8:f8:30:a4: d0:d6:4d:34:95:bf:ce:65:1c:e2:53:4b:72:b6:a9:59: 2b:41:6c:4f:f2:98:e0:8e:73:be:9a:fe:fe:f9:a8:74: fa:e3:f1:0f:fe:71:24:a5:6c:a0:02:f2:21:3d:64:fe: 76:f6:12:33:d7:8b:ba:78:56:45:cc:e9:2a:64:a0:b5: a4:1c:26:62:d4:b0:32:1f:1e:93:3f:fd:db:16:dd:6d: 6c:28:a4:55:77:2a:a7:87:59:9b:20:bb:0f:27:1e:91: 90:ba:a7:44:25:df:bc:e0:9b:0a:b0:2f:af:92:10:06: a7:c4:cd:0a:e6:2a:9d:f2:d6:5f:17:b7:28:3d:4f:e2: 5e:41:4a:85:ad:01:12:94:db:62:af:95:13:8e:a5:56: c3:86:91:bf:7b:1c:89:4e:37:51:49:10:a1:2f:e6:39: 6a:35:fd:71:13:27:bd:8f:de:b8:57:af:be:9e:31:6e: 58:3d:f7:6d:81:f7:f4:ce:85:21:d5:42:8a:08:ca:d3: ce:67:89:3f:07:e3:a6:2a:04:52:b8:0f:b0:b6:8d:d6 Fingerprint (SHA-256): 6B:54:06:0A:5C:F1:8E:CD:5F:C3:AD:B5:E5:A7:D0:E4:08:8A:01:F6:E4:E8:0F:B4:86:A8:60:A7:05:18:60:34 Fingerprint (SHA1): 6A:F0:B4:60:BA:95:4C:38:1E:8F:05:31:C3:48:2F:6E:83:41:19:6F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8928: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8929: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8930: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8931: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064604 (0x670ef5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 11:57:31 2016 Not After : Fri Jan 08 11:57:31 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:1d:18:52:74:6e:d8:ce:62:1c:a9:ce:d9:62:bf:1b: 8f:e2:c8:b8:0f:ef:b3:b1:29:c9:15:20:66:74:ba:6d: 7b:f0:f8:96:fb:29:ba:d3:f2:67:87:86:1d:46:21:db: 32:f0:f3:61:7d:2a:cc:d0:6a:2e:b8:38:df:dd:70:27: e5:2d:e0:2a:84:a0:1a:3b:f0:1c:62:1f:fb:11:af:c3: 78:45:4d:19:9c:c8:1f:b5:2e:5f:11:e5:a1:90:eb:bf: 8e:08:0e:1d:69:f4:96:45:f5:08:f8:30:a8:25:f0:5b: 9e:c0:9a:86:25:a0:84:41:bd:f6:98:48:77:a0:c5:76: 62:05:32:f4:1f:28:b5:bc:83:ee:b5:d8:d3:98:fa:8b: 94:cc:36:7d:a1:91:26:8a:9d:b0:2a:c9:1b:67:78:d6: d7:92:0b:f0:0e:9f:81:8d:61:30:a5:33:62:39:1a:cc: 9e:ec:8f:d7:eb:24:64:72:e8:d7:62:f6:5d:23:f5:e7: c7:d8:53:5d:d6:de:20:68:3f:34:8b:6f:96:97:a8:2e: 41:1c:56:5e:b1:eb:4f:d3:5f:ee:7a:46:f6:46:18:5f: 47:3a:3c:f4:9c:88:4a:bd:3a:22:fb:cd:34:b5:e5:98: 82:35:39:41:b9:21:78:97:01:26:c3:6e:19:26:32:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:42:1c:c6:19:be:a2:d5:62:6b:5d:7b:61:a9:0a:c0: ed:da:1a:a9:10:ca:88:5f:26:fc:0b:71:21:06:66:c9: 61:7c:24:ff:64:c0:71:e4:46:04:90:17:b8:f8:30:a4: d0:d6:4d:34:95:bf:ce:65:1c:e2:53:4b:72:b6:a9:59: 2b:41:6c:4f:f2:98:e0:8e:73:be:9a:fe:fe:f9:a8:74: fa:e3:f1:0f:fe:71:24:a5:6c:a0:02:f2:21:3d:64:fe: 76:f6:12:33:d7:8b:ba:78:56:45:cc:e9:2a:64:a0:b5: a4:1c:26:62:d4:b0:32:1f:1e:93:3f:fd:db:16:dd:6d: 6c:28:a4:55:77:2a:a7:87:59:9b:20:bb:0f:27:1e:91: 90:ba:a7:44:25:df:bc:e0:9b:0a:b0:2f:af:92:10:06: a7:c4:cd:0a:e6:2a:9d:f2:d6:5f:17:b7:28:3d:4f:e2: 5e:41:4a:85:ad:01:12:94:db:62:af:95:13:8e:a5:56: c3:86:91:bf:7b:1c:89:4e:37:51:49:10:a1:2f:e6:39: 6a:35:fd:71:13:27:bd:8f:de:b8:57:af:be:9e:31:6e: 58:3d:f7:6d:81:f7:f4:ce:85:21:d5:42:8a:08:ca:d3: ce:67:89:3f:07:e3:a6:2a:04:52:b8:0f:b0:b6:8d:d6 Fingerprint (SHA-256): 6B:54:06:0A:5C:F1:8E:CD:5F:C3:AD:B5:E5:A7:D0:E4:08:8A:01:F6:E4:E8:0F:B4:86:A8:60:A7:05:18:60:34 Fingerprint (SHA1): 6A:F0:B4:60:BA:95:4C:38:1E:8F:05:31:C3:48:2F:6E:83:41:19:6F Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8932: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8933: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8934: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8935: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064604 (0x670ef5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 11:57:31 2016 Not After : Fri Jan 08 11:57:31 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:1d:18:52:74:6e:d8:ce:62:1c:a9:ce:d9:62:bf:1b: 8f:e2:c8:b8:0f:ef:b3:b1:29:c9:15:20:66:74:ba:6d: 7b:f0:f8:96:fb:29:ba:d3:f2:67:87:86:1d:46:21:db: 32:f0:f3:61:7d:2a:cc:d0:6a:2e:b8:38:df:dd:70:27: e5:2d:e0:2a:84:a0:1a:3b:f0:1c:62:1f:fb:11:af:c3: 78:45:4d:19:9c:c8:1f:b5:2e:5f:11:e5:a1:90:eb:bf: 8e:08:0e:1d:69:f4:96:45:f5:08:f8:30:a8:25:f0:5b: 9e:c0:9a:86:25:a0:84:41:bd:f6:98:48:77:a0:c5:76: 62:05:32:f4:1f:28:b5:bc:83:ee:b5:d8:d3:98:fa:8b: 94:cc:36:7d:a1:91:26:8a:9d:b0:2a:c9:1b:67:78:d6: d7:92:0b:f0:0e:9f:81:8d:61:30:a5:33:62:39:1a:cc: 9e:ec:8f:d7:eb:24:64:72:e8:d7:62:f6:5d:23:f5:e7: c7:d8:53:5d:d6:de:20:68:3f:34:8b:6f:96:97:a8:2e: 41:1c:56:5e:b1:eb:4f:d3:5f:ee:7a:46:f6:46:18:5f: 47:3a:3c:f4:9c:88:4a:bd:3a:22:fb:cd:34:b5:e5:98: 82:35:39:41:b9:21:78:97:01:26:c3:6e:19:26:32:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:42:1c:c6:19:be:a2:d5:62:6b:5d:7b:61:a9:0a:c0: ed:da:1a:a9:10:ca:88:5f:26:fc:0b:71:21:06:66:c9: 61:7c:24:ff:64:c0:71:e4:46:04:90:17:b8:f8:30:a4: d0:d6:4d:34:95:bf:ce:65:1c:e2:53:4b:72:b6:a9:59: 2b:41:6c:4f:f2:98:e0:8e:73:be:9a:fe:fe:f9:a8:74: fa:e3:f1:0f:fe:71:24:a5:6c:a0:02:f2:21:3d:64:fe: 76:f6:12:33:d7:8b:ba:78:56:45:cc:e9:2a:64:a0:b5: a4:1c:26:62:d4:b0:32:1f:1e:93:3f:fd:db:16:dd:6d: 6c:28:a4:55:77:2a:a7:87:59:9b:20:bb:0f:27:1e:91: 90:ba:a7:44:25:df:bc:e0:9b:0a:b0:2f:af:92:10:06: a7:c4:cd:0a:e6:2a:9d:f2:d6:5f:17:b7:28:3d:4f:e2: 5e:41:4a:85:ad:01:12:94:db:62:af:95:13:8e:a5:56: c3:86:91:bf:7b:1c:89:4e:37:51:49:10:a1:2f:e6:39: 6a:35:fd:71:13:27:bd:8f:de:b8:57:af:be:9e:31:6e: 58:3d:f7:6d:81:f7:f4:ce:85:21:d5:42:8a:08:ca:d3: ce:67:89:3f:07:e3:a6:2a:04:52:b8:0f:b0:b6:8d:d6 Fingerprint (SHA-256): 6B:54:06:0A:5C:F1:8E:CD:5F:C3:AD:B5:E5:A7:D0:E4:08:8A:01:F6:E4:E8:0F:B4:86:A8:60:A7:05:18:60:34 Fingerprint (SHA1): 6A:F0:B4:60:BA:95:4C:38:1E:8F:05:31:C3:48:2F:6E:83:41:19:6F Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8936: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064604 (0x670ef5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 11:57:31 2016 Not After : Fri Jan 08 11:57:31 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:1d:18:52:74:6e:d8:ce:62:1c:a9:ce:d9:62:bf:1b: 8f:e2:c8:b8:0f:ef:b3:b1:29:c9:15:20:66:74:ba:6d: 7b:f0:f8:96:fb:29:ba:d3:f2:67:87:86:1d:46:21:db: 32:f0:f3:61:7d:2a:cc:d0:6a:2e:b8:38:df:dd:70:27: e5:2d:e0:2a:84:a0:1a:3b:f0:1c:62:1f:fb:11:af:c3: 78:45:4d:19:9c:c8:1f:b5:2e:5f:11:e5:a1:90:eb:bf: 8e:08:0e:1d:69:f4:96:45:f5:08:f8:30:a8:25:f0:5b: 9e:c0:9a:86:25:a0:84:41:bd:f6:98:48:77:a0:c5:76: 62:05:32:f4:1f:28:b5:bc:83:ee:b5:d8:d3:98:fa:8b: 94:cc:36:7d:a1:91:26:8a:9d:b0:2a:c9:1b:67:78:d6: d7:92:0b:f0:0e:9f:81:8d:61:30:a5:33:62:39:1a:cc: 9e:ec:8f:d7:eb:24:64:72:e8:d7:62:f6:5d:23:f5:e7: c7:d8:53:5d:d6:de:20:68:3f:34:8b:6f:96:97:a8:2e: 41:1c:56:5e:b1:eb:4f:d3:5f:ee:7a:46:f6:46:18:5f: 47:3a:3c:f4:9c:88:4a:bd:3a:22:fb:cd:34:b5:e5:98: 82:35:39:41:b9:21:78:97:01:26:c3:6e:19:26:32:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:42:1c:c6:19:be:a2:d5:62:6b:5d:7b:61:a9:0a:c0: ed:da:1a:a9:10:ca:88:5f:26:fc:0b:71:21:06:66:c9: 61:7c:24:ff:64:c0:71:e4:46:04:90:17:b8:f8:30:a4: d0:d6:4d:34:95:bf:ce:65:1c:e2:53:4b:72:b6:a9:59: 2b:41:6c:4f:f2:98:e0:8e:73:be:9a:fe:fe:f9:a8:74: fa:e3:f1:0f:fe:71:24:a5:6c:a0:02:f2:21:3d:64:fe: 76:f6:12:33:d7:8b:ba:78:56:45:cc:e9:2a:64:a0:b5: a4:1c:26:62:d4:b0:32:1f:1e:93:3f:fd:db:16:dd:6d: 6c:28:a4:55:77:2a:a7:87:59:9b:20:bb:0f:27:1e:91: 90:ba:a7:44:25:df:bc:e0:9b:0a:b0:2f:af:92:10:06: a7:c4:cd:0a:e6:2a:9d:f2:d6:5f:17:b7:28:3d:4f:e2: 5e:41:4a:85:ad:01:12:94:db:62:af:95:13:8e:a5:56: c3:86:91:bf:7b:1c:89:4e:37:51:49:10:a1:2f:e6:39: 6a:35:fd:71:13:27:bd:8f:de:b8:57:af:be:9e:31:6e: 58:3d:f7:6d:81:f7:f4:ce:85:21:d5:42:8a:08:ca:d3: ce:67:89:3f:07:e3:a6:2a:04:52:b8:0f:b0:b6:8d:d6 Fingerprint (SHA-256): 6B:54:06:0A:5C:F1:8E:CD:5F:C3:AD:B5:E5:A7:D0:E4:08:8A:01:F6:E4:E8:0F:B4:86:A8:60:A7:05:18:60:34 Fingerprint (SHA1): 6A:F0:B4:60:BA:95:4C:38:1E:8F:05:31:C3:48:2F:6E:83:41:19:6F Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8937: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8938: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064604 (0x670ef5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 11:57:31 2016 Not After : Fri Jan 08 11:57:31 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:1d:18:52:74:6e:d8:ce:62:1c:a9:ce:d9:62:bf:1b: 8f:e2:c8:b8:0f:ef:b3:b1:29:c9:15:20:66:74:ba:6d: 7b:f0:f8:96:fb:29:ba:d3:f2:67:87:86:1d:46:21:db: 32:f0:f3:61:7d:2a:cc:d0:6a:2e:b8:38:df:dd:70:27: e5:2d:e0:2a:84:a0:1a:3b:f0:1c:62:1f:fb:11:af:c3: 78:45:4d:19:9c:c8:1f:b5:2e:5f:11:e5:a1:90:eb:bf: 8e:08:0e:1d:69:f4:96:45:f5:08:f8:30:a8:25:f0:5b: 9e:c0:9a:86:25:a0:84:41:bd:f6:98:48:77:a0:c5:76: 62:05:32:f4:1f:28:b5:bc:83:ee:b5:d8:d3:98:fa:8b: 94:cc:36:7d:a1:91:26:8a:9d:b0:2a:c9:1b:67:78:d6: d7:92:0b:f0:0e:9f:81:8d:61:30:a5:33:62:39:1a:cc: 9e:ec:8f:d7:eb:24:64:72:e8:d7:62:f6:5d:23:f5:e7: c7:d8:53:5d:d6:de:20:68:3f:34:8b:6f:96:97:a8:2e: 41:1c:56:5e:b1:eb:4f:d3:5f:ee:7a:46:f6:46:18:5f: 47:3a:3c:f4:9c:88:4a:bd:3a:22:fb:cd:34:b5:e5:98: 82:35:39:41:b9:21:78:97:01:26:c3:6e:19:26:32:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:42:1c:c6:19:be:a2:d5:62:6b:5d:7b:61:a9:0a:c0: ed:da:1a:a9:10:ca:88:5f:26:fc:0b:71:21:06:66:c9: 61:7c:24:ff:64:c0:71:e4:46:04:90:17:b8:f8:30:a4: d0:d6:4d:34:95:bf:ce:65:1c:e2:53:4b:72:b6:a9:59: 2b:41:6c:4f:f2:98:e0:8e:73:be:9a:fe:fe:f9:a8:74: fa:e3:f1:0f:fe:71:24:a5:6c:a0:02:f2:21:3d:64:fe: 76:f6:12:33:d7:8b:ba:78:56:45:cc:e9:2a:64:a0:b5: a4:1c:26:62:d4:b0:32:1f:1e:93:3f:fd:db:16:dd:6d: 6c:28:a4:55:77:2a:a7:87:59:9b:20:bb:0f:27:1e:91: 90:ba:a7:44:25:df:bc:e0:9b:0a:b0:2f:af:92:10:06: a7:c4:cd:0a:e6:2a:9d:f2:d6:5f:17:b7:28:3d:4f:e2: 5e:41:4a:85:ad:01:12:94:db:62:af:95:13:8e:a5:56: c3:86:91:bf:7b:1c:89:4e:37:51:49:10:a1:2f:e6:39: 6a:35:fd:71:13:27:bd:8f:de:b8:57:af:be:9e:31:6e: 58:3d:f7:6d:81:f7:f4:ce:85:21:d5:42:8a:08:ca:d3: ce:67:89:3f:07:e3:a6:2a:04:52:b8:0f:b0:b6:8d:d6 Fingerprint (SHA-256): 6B:54:06:0A:5C:F1:8E:CD:5F:C3:AD:B5:E5:A7:D0:E4:08:8A:01:F6:E4:E8:0F:B4:86:A8:60:A7:05:18:60:34 Fingerprint (SHA1): 6A:F0:B4:60:BA:95:4C:38:1E:8F:05:31:C3:48:2F:6E:83:41:19:6F Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8939: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8940: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8941: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8942: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064604 (0x670ef5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 11:57:31 2016 Not After : Fri Jan 08 11:57:31 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:1d:18:52:74:6e:d8:ce:62:1c:a9:ce:d9:62:bf:1b: 8f:e2:c8:b8:0f:ef:b3:b1:29:c9:15:20:66:74:ba:6d: 7b:f0:f8:96:fb:29:ba:d3:f2:67:87:86:1d:46:21:db: 32:f0:f3:61:7d:2a:cc:d0:6a:2e:b8:38:df:dd:70:27: e5:2d:e0:2a:84:a0:1a:3b:f0:1c:62:1f:fb:11:af:c3: 78:45:4d:19:9c:c8:1f:b5:2e:5f:11:e5:a1:90:eb:bf: 8e:08:0e:1d:69:f4:96:45:f5:08:f8:30:a8:25:f0:5b: 9e:c0:9a:86:25:a0:84:41:bd:f6:98:48:77:a0:c5:76: 62:05:32:f4:1f:28:b5:bc:83:ee:b5:d8:d3:98:fa:8b: 94:cc:36:7d:a1:91:26:8a:9d:b0:2a:c9:1b:67:78:d6: d7:92:0b:f0:0e:9f:81:8d:61:30:a5:33:62:39:1a:cc: 9e:ec:8f:d7:eb:24:64:72:e8:d7:62:f6:5d:23:f5:e7: c7:d8:53:5d:d6:de:20:68:3f:34:8b:6f:96:97:a8:2e: 41:1c:56:5e:b1:eb:4f:d3:5f:ee:7a:46:f6:46:18:5f: 47:3a:3c:f4:9c:88:4a:bd:3a:22:fb:cd:34:b5:e5:98: 82:35:39:41:b9:21:78:97:01:26:c3:6e:19:26:32:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:42:1c:c6:19:be:a2:d5:62:6b:5d:7b:61:a9:0a:c0: ed:da:1a:a9:10:ca:88:5f:26:fc:0b:71:21:06:66:c9: 61:7c:24:ff:64:c0:71:e4:46:04:90:17:b8:f8:30:a4: d0:d6:4d:34:95:bf:ce:65:1c:e2:53:4b:72:b6:a9:59: 2b:41:6c:4f:f2:98:e0:8e:73:be:9a:fe:fe:f9:a8:74: fa:e3:f1:0f:fe:71:24:a5:6c:a0:02:f2:21:3d:64:fe: 76:f6:12:33:d7:8b:ba:78:56:45:cc:e9:2a:64:a0:b5: a4:1c:26:62:d4:b0:32:1f:1e:93:3f:fd:db:16:dd:6d: 6c:28:a4:55:77:2a:a7:87:59:9b:20:bb:0f:27:1e:91: 90:ba:a7:44:25:df:bc:e0:9b:0a:b0:2f:af:92:10:06: a7:c4:cd:0a:e6:2a:9d:f2:d6:5f:17:b7:28:3d:4f:e2: 5e:41:4a:85:ad:01:12:94:db:62:af:95:13:8e:a5:56: c3:86:91:bf:7b:1c:89:4e:37:51:49:10:a1:2f:e6:39: 6a:35:fd:71:13:27:bd:8f:de:b8:57:af:be:9e:31:6e: 58:3d:f7:6d:81:f7:f4:ce:85:21:d5:42:8a:08:ca:d3: ce:67:89:3f:07:e3:a6:2a:04:52:b8:0f:b0:b6:8d:d6 Fingerprint (SHA-256): 6B:54:06:0A:5C:F1:8E:CD:5F:C3:AD:B5:E5:A7:D0:E4:08:8A:01:F6:E4:E8:0F:B4:86:A8:60:A7:05:18:60:34 Fingerprint (SHA1): 6A:F0:B4:60:BA:95:4C:38:1E:8F:05:31:C3:48:2F:6E:83:41:19:6F Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8943: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064604 (0x670ef5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 11:57:31 2016 Not After : Fri Jan 08 11:57:31 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:1d:18:52:74:6e:d8:ce:62:1c:a9:ce:d9:62:bf:1b: 8f:e2:c8:b8:0f:ef:b3:b1:29:c9:15:20:66:74:ba:6d: 7b:f0:f8:96:fb:29:ba:d3:f2:67:87:86:1d:46:21:db: 32:f0:f3:61:7d:2a:cc:d0:6a:2e:b8:38:df:dd:70:27: e5:2d:e0:2a:84:a0:1a:3b:f0:1c:62:1f:fb:11:af:c3: 78:45:4d:19:9c:c8:1f:b5:2e:5f:11:e5:a1:90:eb:bf: 8e:08:0e:1d:69:f4:96:45:f5:08:f8:30:a8:25:f0:5b: 9e:c0:9a:86:25:a0:84:41:bd:f6:98:48:77:a0:c5:76: 62:05:32:f4:1f:28:b5:bc:83:ee:b5:d8:d3:98:fa:8b: 94:cc:36:7d:a1:91:26:8a:9d:b0:2a:c9:1b:67:78:d6: d7:92:0b:f0:0e:9f:81:8d:61:30:a5:33:62:39:1a:cc: 9e:ec:8f:d7:eb:24:64:72:e8:d7:62:f6:5d:23:f5:e7: c7:d8:53:5d:d6:de:20:68:3f:34:8b:6f:96:97:a8:2e: 41:1c:56:5e:b1:eb:4f:d3:5f:ee:7a:46:f6:46:18:5f: 47:3a:3c:f4:9c:88:4a:bd:3a:22:fb:cd:34:b5:e5:98: 82:35:39:41:b9:21:78:97:01:26:c3:6e:19:26:32:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:42:1c:c6:19:be:a2:d5:62:6b:5d:7b:61:a9:0a:c0: ed:da:1a:a9:10:ca:88:5f:26:fc:0b:71:21:06:66:c9: 61:7c:24:ff:64:c0:71:e4:46:04:90:17:b8:f8:30:a4: d0:d6:4d:34:95:bf:ce:65:1c:e2:53:4b:72:b6:a9:59: 2b:41:6c:4f:f2:98:e0:8e:73:be:9a:fe:fe:f9:a8:74: fa:e3:f1:0f:fe:71:24:a5:6c:a0:02:f2:21:3d:64:fe: 76:f6:12:33:d7:8b:ba:78:56:45:cc:e9:2a:64:a0:b5: a4:1c:26:62:d4:b0:32:1f:1e:93:3f:fd:db:16:dd:6d: 6c:28:a4:55:77:2a:a7:87:59:9b:20:bb:0f:27:1e:91: 90:ba:a7:44:25:df:bc:e0:9b:0a:b0:2f:af:92:10:06: a7:c4:cd:0a:e6:2a:9d:f2:d6:5f:17:b7:28:3d:4f:e2: 5e:41:4a:85:ad:01:12:94:db:62:af:95:13:8e:a5:56: c3:86:91:bf:7b:1c:89:4e:37:51:49:10:a1:2f:e6:39: 6a:35:fd:71:13:27:bd:8f:de:b8:57:af:be:9e:31:6e: 58:3d:f7:6d:81:f7:f4:ce:85:21:d5:42:8a:08:ca:d3: ce:67:89:3f:07:e3:a6:2a:04:52:b8:0f:b0:b6:8d:d6 Fingerprint (SHA-256): 6B:54:06:0A:5C:F1:8E:CD:5F:C3:AD:B5:E5:A7:D0:E4:08:8A:01:F6:E4:E8:0F:B4:86:A8:60:A7:05:18:60:34 Fingerprint (SHA1): 6A:F0:B4:60:BA:95:4C:38:1E:8F:05:31:C3:48:2F:6E:83:41:19:6F Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8944: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064604 (0x670ef5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 11:57:31 2016 Not After : Fri Jan 08 11:57:31 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:1d:18:52:74:6e:d8:ce:62:1c:a9:ce:d9:62:bf:1b: 8f:e2:c8:b8:0f:ef:b3:b1:29:c9:15:20:66:74:ba:6d: 7b:f0:f8:96:fb:29:ba:d3:f2:67:87:86:1d:46:21:db: 32:f0:f3:61:7d:2a:cc:d0:6a:2e:b8:38:df:dd:70:27: e5:2d:e0:2a:84:a0:1a:3b:f0:1c:62:1f:fb:11:af:c3: 78:45:4d:19:9c:c8:1f:b5:2e:5f:11:e5:a1:90:eb:bf: 8e:08:0e:1d:69:f4:96:45:f5:08:f8:30:a8:25:f0:5b: 9e:c0:9a:86:25:a0:84:41:bd:f6:98:48:77:a0:c5:76: 62:05:32:f4:1f:28:b5:bc:83:ee:b5:d8:d3:98:fa:8b: 94:cc:36:7d:a1:91:26:8a:9d:b0:2a:c9:1b:67:78:d6: d7:92:0b:f0:0e:9f:81:8d:61:30:a5:33:62:39:1a:cc: 9e:ec:8f:d7:eb:24:64:72:e8:d7:62:f6:5d:23:f5:e7: c7:d8:53:5d:d6:de:20:68:3f:34:8b:6f:96:97:a8:2e: 41:1c:56:5e:b1:eb:4f:d3:5f:ee:7a:46:f6:46:18:5f: 47:3a:3c:f4:9c:88:4a:bd:3a:22:fb:cd:34:b5:e5:98: 82:35:39:41:b9:21:78:97:01:26:c3:6e:19:26:32:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:42:1c:c6:19:be:a2:d5:62:6b:5d:7b:61:a9:0a:c0: ed:da:1a:a9:10:ca:88:5f:26:fc:0b:71:21:06:66:c9: 61:7c:24:ff:64:c0:71:e4:46:04:90:17:b8:f8:30:a4: d0:d6:4d:34:95:bf:ce:65:1c:e2:53:4b:72:b6:a9:59: 2b:41:6c:4f:f2:98:e0:8e:73:be:9a:fe:fe:f9:a8:74: fa:e3:f1:0f:fe:71:24:a5:6c:a0:02:f2:21:3d:64:fe: 76:f6:12:33:d7:8b:ba:78:56:45:cc:e9:2a:64:a0:b5: a4:1c:26:62:d4:b0:32:1f:1e:93:3f:fd:db:16:dd:6d: 6c:28:a4:55:77:2a:a7:87:59:9b:20:bb:0f:27:1e:91: 90:ba:a7:44:25:df:bc:e0:9b:0a:b0:2f:af:92:10:06: a7:c4:cd:0a:e6:2a:9d:f2:d6:5f:17:b7:28:3d:4f:e2: 5e:41:4a:85:ad:01:12:94:db:62:af:95:13:8e:a5:56: c3:86:91:bf:7b:1c:89:4e:37:51:49:10:a1:2f:e6:39: 6a:35:fd:71:13:27:bd:8f:de:b8:57:af:be:9e:31:6e: 58:3d:f7:6d:81:f7:f4:ce:85:21:d5:42:8a:08:ca:d3: ce:67:89:3f:07:e3:a6:2a:04:52:b8:0f:b0:b6:8d:d6 Fingerprint (SHA-256): 6B:54:06:0A:5C:F1:8E:CD:5F:C3:AD:B5:E5:A7:D0:E4:08:8A:01:F6:E4:E8:0F:B4:86:A8:60:A7:05:18:60:34 Fingerprint (SHA1): 6A:F0:B4:60:BA:95:4C:38:1E:8F:05:31:C3:48:2F:6E:83:41:19:6F Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8945: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064604 (0x670ef5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 11:57:31 2016 Not After : Fri Jan 08 11:57:31 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:1d:18:52:74:6e:d8:ce:62:1c:a9:ce:d9:62:bf:1b: 8f:e2:c8:b8:0f:ef:b3:b1:29:c9:15:20:66:74:ba:6d: 7b:f0:f8:96:fb:29:ba:d3:f2:67:87:86:1d:46:21:db: 32:f0:f3:61:7d:2a:cc:d0:6a:2e:b8:38:df:dd:70:27: e5:2d:e0:2a:84:a0:1a:3b:f0:1c:62:1f:fb:11:af:c3: 78:45:4d:19:9c:c8:1f:b5:2e:5f:11:e5:a1:90:eb:bf: 8e:08:0e:1d:69:f4:96:45:f5:08:f8:30:a8:25:f0:5b: 9e:c0:9a:86:25:a0:84:41:bd:f6:98:48:77:a0:c5:76: 62:05:32:f4:1f:28:b5:bc:83:ee:b5:d8:d3:98:fa:8b: 94:cc:36:7d:a1:91:26:8a:9d:b0:2a:c9:1b:67:78:d6: d7:92:0b:f0:0e:9f:81:8d:61:30:a5:33:62:39:1a:cc: 9e:ec:8f:d7:eb:24:64:72:e8:d7:62:f6:5d:23:f5:e7: c7:d8:53:5d:d6:de:20:68:3f:34:8b:6f:96:97:a8:2e: 41:1c:56:5e:b1:eb:4f:d3:5f:ee:7a:46:f6:46:18:5f: 47:3a:3c:f4:9c:88:4a:bd:3a:22:fb:cd:34:b5:e5:98: 82:35:39:41:b9:21:78:97:01:26:c3:6e:19:26:32:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:42:1c:c6:19:be:a2:d5:62:6b:5d:7b:61:a9:0a:c0: ed:da:1a:a9:10:ca:88:5f:26:fc:0b:71:21:06:66:c9: 61:7c:24:ff:64:c0:71:e4:46:04:90:17:b8:f8:30:a4: d0:d6:4d:34:95:bf:ce:65:1c:e2:53:4b:72:b6:a9:59: 2b:41:6c:4f:f2:98:e0:8e:73:be:9a:fe:fe:f9:a8:74: fa:e3:f1:0f:fe:71:24:a5:6c:a0:02:f2:21:3d:64:fe: 76:f6:12:33:d7:8b:ba:78:56:45:cc:e9:2a:64:a0:b5: a4:1c:26:62:d4:b0:32:1f:1e:93:3f:fd:db:16:dd:6d: 6c:28:a4:55:77:2a:a7:87:59:9b:20:bb:0f:27:1e:91: 90:ba:a7:44:25:df:bc:e0:9b:0a:b0:2f:af:92:10:06: a7:c4:cd:0a:e6:2a:9d:f2:d6:5f:17:b7:28:3d:4f:e2: 5e:41:4a:85:ad:01:12:94:db:62:af:95:13:8e:a5:56: c3:86:91:bf:7b:1c:89:4e:37:51:49:10:a1:2f:e6:39: 6a:35:fd:71:13:27:bd:8f:de:b8:57:af:be:9e:31:6e: 58:3d:f7:6d:81:f7:f4:ce:85:21:d5:42:8a:08:ca:d3: ce:67:89:3f:07:e3:a6:2a:04:52:b8:0f:b0:b6:8d:d6 Fingerprint (SHA-256): 6B:54:06:0A:5C:F1:8E:CD:5F:C3:AD:B5:E5:A7:D0:E4:08:8A:01:F6:E4:E8:0F:B4:86:A8:60:A7:05:18:60:34 Fingerprint (SHA1): 6A:F0:B4:60:BA:95:4C:38:1E:8F:05:31:C3:48:2F:6E:83:41:19:6F Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8946: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064604 (0x670ef5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 11:57:31 2016 Not After : Fri Jan 08 11:57:31 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:1d:18:52:74:6e:d8:ce:62:1c:a9:ce:d9:62:bf:1b: 8f:e2:c8:b8:0f:ef:b3:b1:29:c9:15:20:66:74:ba:6d: 7b:f0:f8:96:fb:29:ba:d3:f2:67:87:86:1d:46:21:db: 32:f0:f3:61:7d:2a:cc:d0:6a:2e:b8:38:df:dd:70:27: e5:2d:e0:2a:84:a0:1a:3b:f0:1c:62:1f:fb:11:af:c3: 78:45:4d:19:9c:c8:1f:b5:2e:5f:11:e5:a1:90:eb:bf: 8e:08:0e:1d:69:f4:96:45:f5:08:f8:30:a8:25:f0:5b: 9e:c0:9a:86:25:a0:84:41:bd:f6:98:48:77:a0:c5:76: 62:05:32:f4:1f:28:b5:bc:83:ee:b5:d8:d3:98:fa:8b: 94:cc:36:7d:a1:91:26:8a:9d:b0:2a:c9:1b:67:78:d6: d7:92:0b:f0:0e:9f:81:8d:61:30:a5:33:62:39:1a:cc: 9e:ec:8f:d7:eb:24:64:72:e8:d7:62:f6:5d:23:f5:e7: c7:d8:53:5d:d6:de:20:68:3f:34:8b:6f:96:97:a8:2e: 41:1c:56:5e:b1:eb:4f:d3:5f:ee:7a:46:f6:46:18:5f: 47:3a:3c:f4:9c:88:4a:bd:3a:22:fb:cd:34:b5:e5:98: 82:35:39:41:b9:21:78:97:01:26:c3:6e:19:26:32:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:42:1c:c6:19:be:a2:d5:62:6b:5d:7b:61:a9:0a:c0: ed:da:1a:a9:10:ca:88:5f:26:fc:0b:71:21:06:66:c9: 61:7c:24:ff:64:c0:71:e4:46:04:90:17:b8:f8:30:a4: d0:d6:4d:34:95:bf:ce:65:1c:e2:53:4b:72:b6:a9:59: 2b:41:6c:4f:f2:98:e0:8e:73:be:9a:fe:fe:f9:a8:74: fa:e3:f1:0f:fe:71:24:a5:6c:a0:02:f2:21:3d:64:fe: 76:f6:12:33:d7:8b:ba:78:56:45:cc:e9:2a:64:a0:b5: a4:1c:26:62:d4:b0:32:1f:1e:93:3f:fd:db:16:dd:6d: 6c:28:a4:55:77:2a:a7:87:59:9b:20:bb:0f:27:1e:91: 90:ba:a7:44:25:df:bc:e0:9b:0a:b0:2f:af:92:10:06: a7:c4:cd:0a:e6:2a:9d:f2:d6:5f:17:b7:28:3d:4f:e2: 5e:41:4a:85:ad:01:12:94:db:62:af:95:13:8e:a5:56: c3:86:91:bf:7b:1c:89:4e:37:51:49:10:a1:2f:e6:39: 6a:35:fd:71:13:27:bd:8f:de:b8:57:af:be:9e:31:6e: 58:3d:f7:6d:81:f7:f4:ce:85:21:d5:42:8a:08:ca:d3: ce:67:89:3f:07:e3:a6:2a:04:52:b8:0f:b0:b6:8d:d6 Fingerprint (SHA-256): 6B:54:06:0A:5C:F1:8E:CD:5F:C3:AD:B5:E5:A7:D0:E4:08:8A:01:F6:E4:E8:0F:B4:86:A8:60:A7:05:18:60:34 Fingerprint (SHA1): 6A:F0:B4:60:BA:95:4C:38:1E:8F:05:31:C3:48:2F:6E:83:41:19:6F Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8947: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064604 (0x670ef5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 11:57:31 2016 Not After : Fri Jan 08 11:57:31 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:1d:18:52:74:6e:d8:ce:62:1c:a9:ce:d9:62:bf:1b: 8f:e2:c8:b8:0f:ef:b3:b1:29:c9:15:20:66:74:ba:6d: 7b:f0:f8:96:fb:29:ba:d3:f2:67:87:86:1d:46:21:db: 32:f0:f3:61:7d:2a:cc:d0:6a:2e:b8:38:df:dd:70:27: e5:2d:e0:2a:84:a0:1a:3b:f0:1c:62:1f:fb:11:af:c3: 78:45:4d:19:9c:c8:1f:b5:2e:5f:11:e5:a1:90:eb:bf: 8e:08:0e:1d:69:f4:96:45:f5:08:f8:30:a8:25:f0:5b: 9e:c0:9a:86:25:a0:84:41:bd:f6:98:48:77:a0:c5:76: 62:05:32:f4:1f:28:b5:bc:83:ee:b5:d8:d3:98:fa:8b: 94:cc:36:7d:a1:91:26:8a:9d:b0:2a:c9:1b:67:78:d6: d7:92:0b:f0:0e:9f:81:8d:61:30:a5:33:62:39:1a:cc: 9e:ec:8f:d7:eb:24:64:72:e8:d7:62:f6:5d:23:f5:e7: c7:d8:53:5d:d6:de:20:68:3f:34:8b:6f:96:97:a8:2e: 41:1c:56:5e:b1:eb:4f:d3:5f:ee:7a:46:f6:46:18:5f: 47:3a:3c:f4:9c:88:4a:bd:3a:22:fb:cd:34:b5:e5:98: 82:35:39:41:b9:21:78:97:01:26:c3:6e:19:26:32:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:42:1c:c6:19:be:a2:d5:62:6b:5d:7b:61:a9:0a:c0: ed:da:1a:a9:10:ca:88:5f:26:fc:0b:71:21:06:66:c9: 61:7c:24:ff:64:c0:71:e4:46:04:90:17:b8:f8:30:a4: d0:d6:4d:34:95:bf:ce:65:1c:e2:53:4b:72:b6:a9:59: 2b:41:6c:4f:f2:98:e0:8e:73:be:9a:fe:fe:f9:a8:74: fa:e3:f1:0f:fe:71:24:a5:6c:a0:02:f2:21:3d:64:fe: 76:f6:12:33:d7:8b:ba:78:56:45:cc:e9:2a:64:a0:b5: a4:1c:26:62:d4:b0:32:1f:1e:93:3f:fd:db:16:dd:6d: 6c:28:a4:55:77:2a:a7:87:59:9b:20:bb:0f:27:1e:91: 90:ba:a7:44:25:df:bc:e0:9b:0a:b0:2f:af:92:10:06: a7:c4:cd:0a:e6:2a:9d:f2:d6:5f:17:b7:28:3d:4f:e2: 5e:41:4a:85:ad:01:12:94:db:62:af:95:13:8e:a5:56: c3:86:91:bf:7b:1c:89:4e:37:51:49:10:a1:2f:e6:39: 6a:35:fd:71:13:27:bd:8f:de:b8:57:af:be:9e:31:6e: 58:3d:f7:6d:81:f7:f4:ce:85:21:d5:42:8a:08:ca:d3: ce:67:89:3f:07:e3:a6:2a:04:52:b8:0f:b0:b6:8d:d6 Fingerprint (SHA-256): 6B:54:06:0A:5C:F1:8E:CD:5F:C3:AD:B5:E5:A7:D0:E4:08:8A:01:F6:E4:E8:0F:B4:86:A8:60:A7:05:18:60:34 Fingerprint (SHA1): 6A:F0:B4:60:BA:95:4C:38:1E:8F:05:31:C3:48:2F:6E:83:41:19:6F Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8948: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8949: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8950: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064634 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8951: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8952: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #8953: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8954: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 108064635 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8955: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8956: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #8957: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8958: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 108064636 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8959: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8960: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #8961: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8962: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 108064637 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8963: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8964: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #8965: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8966: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 108064638 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8967: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8968: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #8969: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8970: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 108064639 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8971: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8972: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #8973: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8974: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 108064640 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8975: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8976: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8977: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064634 (0x670ef7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:03:58 2016 Not After : Fri Jan 08 12:03:58 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:45:17:b2:7e:c7:a8:75:09:c7:cc:31:44:3c:eb:a4: 99:fa:d8:8e:84:78:df:7f:c3:52:06:c0:dc:36:d1:7a: e5:b6:40:31:82:8a:b9:a4:98:91:5f:0b:30:9b:11:95: 80:ec:5e:9e:6f:3c:bc:83:6b:46:a2:23:e2:3d:c7:25: 53:d5:1f:3b:d6:80:4b:4f:af:7b:76:72:13:ff:30:1b: d3:89:7c:b7:80:99:4e:25:bd:dd:5a:5a:58:82:db:61: f0:09:90:0e:92:ac:90:11:84:70:79:82:a1:d9:73:6f: 01:ee:d9:72:b5:21:dc:e0:c4:bc:e3:d2:a0:82:07:dc: 0c:e2:e1:19:ad:54:0a:75:c1:77:3d:32:63:a6:28:e7: 02:bb:89:5f:85:22:c0:9a:78:5a:48:ba:ae:8a:8b:f0: 5e:98:ea:e5:37:ac:5d:0c:9c:2a:1a:ab:c6:d6:19:80: 4a:74:eb:f0:3a:10:d9:1b:ce:07:d8:1f:be:bc:6d:3d: 36:09:65:1d:08:66:1f:62:ba:b7:ce:b1:ac:9f:46:7d: c2:f4:48:37:2f:ef:03:e7:24:c0:c0:96:db:22:14:0d: f6:07:a2:32:7b:9b:25:c7:bc:a2:22:99:4c:2b:dd:90: f0:76:ab:28:d6:b4:2b:d8:2a:b8:da:b7:ab:6f:7e:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:77:4e:0b:b2:83:51:a0:13:ed:de:9a:39:f3:31:7c: f5:f4:59:a1:0e:21:a0:ef:ca:a3:c9:5d:e5:8c:4f:e7: c6:0c:e2:f8:5f:e4:d6:33:fd:2f:9b:29:49:a6:88:9a: 1e:36:3e:70:09:a0:d2:39:04:be:72:74:22:53:46:dd: 50:e1:9f:92:d3:61:cf:63:45:a1:51:9c:dc:6b:8b:61: 91:d8:80:aa:30:93:7d:b0:14:8b:ca:c0:ae:e7:b8:72: 1a:56:ee:33:c7:33:62:1b:15:63:ca:93:48:e4:cf:71: 22:06:91:65:90:82:d0:50:35:1d:ec:5f:85:51:56:f3: d3:9f:3c:b6:ab:f6:05:b5:a5:7f:32:28:c8:45:5f:b2: b0:2d:34:e4:50:4d:42:a1:c2:e8:3e:f9:69:8f:f0:47: e1:18:52:30:ae:70:47:6b:fd:32:8d:91:8b:f7:18:4e: 39:e8:6c:4f:f1:32:9f:b8:04:3a:58:a4:8e:5f:10:be: 1b:61:1d:b8:3c:2b:e2:fe:cc:18:86:62:18:26:59:bc: 57:d3:21:1a:c8:b7:21:bb:12:f3:69:26:79:3f:30:d2: 25:1c:5d:82:7c:d6:50:94:b2:6d:65:c2:3b:15:b7:86: a8:46:2a:5a:b4:9d:f6:04:f6:4b:6c:77:b6:de:bc:95 Fingerprint (SHA-256): 62:DB:DE:5D:55:79:55:06:47:EF:B7:80:56:8B:F8:EF:A0:4F:AA:B0:96:80:4C:53:4B:CC:CB:AA:43:02:EB:A7 Fingerprint (SHA1): 13:09:C5:A9:3B:2D:97:DD:CF:34:4B:1D:54:78:52:3C:69:98:20:0A Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #8978: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8979: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8980: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8981: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064634 (0x670ef7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:03:58 2016 Not After : Fri Jan 08 12:03:58 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:45:17:b2:7e:c7:a8:75:09:c7:cc:31:44:3c:eb:a4: 99:fa:d8:8e:84:78:df:7f:c3:52:06:c0:dc:36:d1:7a: e5:b6:40:31:82:8a:b9:a4:98:91:5f:0b:30:9b:11:95: 80:ec:5e:9e:6f:3c:bc:83:6b:46:a2:23:e2:3d:c7:25: 53:d5:1f:3b:d6:80:4b:4f:af:7b:76:72:13:ff:30:1b: d3:89:7c:b7:80:99:4e:25:bd:dd:5a:5a:58:82:db:61: f0:09:90:0e:92:ac:90:11:84:70:79:82:a1:d9:73:6f: 01:ee:d9:72:b5:21:dc:e0:c4:bc:e3:d2:a0:82:07:dc: 0c:e2:e1:19:ad:54:0a:75:c1:77:3d:32:63:a6:28:e7: 02:bb:89:5f:85:22:c0:9a:78:5a:48:ba:ae:8a:8b:f0: 5e:98:ea:e5:37:ac:5d:0c:9c:2a:1a:ab:c6:d6:19:80: 4a:74:eb:f0:3a:10:d9:1b:ce:07:d8:1f:be:bc:6d:3d: 36:09:65:1d:08:66:1f:62:ba:b7:ce:b1:ac:9f:46:7d: c2:f4:48:37:2f:ef:03:e7:24:c0:c0:96:db:22:14:0d: f6:07:a2:32:7b:9b:25:c7:bc:a2:22:99:4c:2b:dd:90: f0:76:ab:28:d6:b4:2b:d8:2a:b8:da:b7:ab:6f:7e:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:77:4e:0b:b2:83:51:a0:13:ed:de:9a:39:f3:31:7c: f5:f4:59:a1:0e:21:a0:ef:ca:a3:c9:5d:e5:8c:4f:e7: c6:0c:e2:f8:5f:e4:d6:33:fd:2f:9b:29:49:a6:88:9a: 1e:36:3e:70:09:a0:d2:39:04:be:72:74:22:53:46:dd: 50:e1:9f:92:d3:61:cf:63:45:a1:51:9c:dc:6b:8b:61: 91:d8:80:aa:30:93:7d:b0:14:8b:ca:c0:ae:e7:b8:72: 1a:56:ee:33:c7:33:62:1b:15:63:ca:93:48:e4:cf:71: 22:06:91:65:90:82:d0:50:35:1d:ec:5f:85:51:56:f3: d3:9f:3c:b6:ab:f6:05:b5:a5:7f:32:28:c8:45:5f:b2: b0:2d:34:e4:50:4d:42:a1:c2:e8:3e:f9:69:8f:f0:47: e1:18:52:30:ae:70:47:6b:fd:32:8d:91:8b:f7:18:4e: 39:e8:6c:4f:f1:32:9f:b8:04:3a:58:a4:8e:5f:10:be: 1b:61:1d:b8:3c:2b:e2:fe:cc:18:86:62:18:26:59:bc: 57:d3:21:1a:c8:b7:21:bb:12:f3:69:26:79:3f:30:d2: 25:1c:5d:82:7c:d6:50:94:b2:6d:65:c2:3b:15:b7:86: a8:46:2a:5a:b4:9d:f6:04:f6:4b:6c:77:b6:de:bc:95 Fingerprint (SHA-256): 62:DB:DE:5D:55:79:55:06:47:EF:B7:80:56:8B:F8:EF:A0:4F:AA:B0:96:80:4C:53:4B:CC:CB:AA:43:02:EB:A7 Fingerprint (SHA1): 13:09:C5:A9:3B:2D:97:DD:CF:34:4B:1D:54:78:52:3C:69:98:20:0A Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #8982: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8983: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8984: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8985: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064641 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8986: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8987: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8988: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8989: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108064642 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #8990: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8991: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8992: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8993: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108064643 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8994: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8995: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8996: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8997: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108064644 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8998: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8999: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9000: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #9001: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #9002: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #9003: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064641 (0x670ef81) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:05:22 2016 Not After : Fri Jan 08 12:05:22 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:17:b8:4b:c6:13:ab:59:87:e4:d1:22:f2:8f:dc:6d: 56:f4:f3:94:6c:be:1a:43:25:3d:64:31:46:f8:60:60: da:31:77:13:0c:c8:3b:08:66:29:c0:6c:49:24:7b:da: b1:5f:e3:be:c8:e6:a0:68:29:2b:64:26:85:5d:f8:f5: 37:78:94:f9:9e:b0:98:c5:8f:d5:03:e8:3e:b0:19:13: 34:36:1d:09:70:fb:40:f6:92:5c:2a:b4:fb:3f:94:87: 2c:c0:39:11:52:ae:f8:28:d4:f5:d2:e4:1c:41:99:1b: 0c:7d:71:44:6c:a3:2a:3a:07:76:a0:94:f3:c4:43:24: 3e:05:57:5a:8f:95:72:6e:bf:36:7a:31:60:dc:2b:e7: 55:6d:05:dd:d4:af:a1:69:72:aa:4c:f8:61:85:5a:77: 2b:01:f8:47:35:55:8f:f6:32:3a:68:e1:a3:1b:4b:d1: 5d:ce:26:22:83:fd:be:1c:63:8d:00:e2:43:98:25:11: b2:71:51:64:23:21:a7:73:c5:9e:5a:91:2f:79:6d:f3: d4:9d:00:44:75:2e:bc:73:37:92:8b:d3:91:d9:6e:49: 93:14:c5:9b:e8:86:a9:1a:d2:34:18:56:19:f7:6e:76: ef:c9:fa:df:b0:0f:eb:6a:bc:41:c3:fa:88:77:35:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:32:1e:4c:d9:0f:6a:66:fe:e8:91:5d:87:0e:be:f2: dd:23:b2:ee:a9:c5:83:0f:9c:10:12:6b:0d:78:d1:fa: 93:f1:3b:37:c6:08:f2:76:bb:b6:b1:b7:c5:fc:2d:7b: ce:5a:fd:88:66:0b:1f:36:61:b2:98:a9:93:c0:86:d8: 46:26:66:ec:78:0e:dc:c2:64:15:02:9d:5c:57:91:2d: 7c:08:99:23:b1:5c:74:76:8c:96:de:43:1d:c7:51:4e: 7e:d3:00:fc:c5:f1:ef:70:79:23:42:60:26:09:c4:66: 69:fc:41:86:43:cc:11:48:7f:19:1a:c5:66:3d:fc:d9: 52:b3:c2:e4:98:19:80:2b:d2:44:c9:3b:4d:68:03:86: e3:5d:94:dc:20:c5:ad:14:56:1c:d1:1a:1e:e3:dd:d1: 45:2a:a3:2a:89:c5:c2:c3:87:7a:74:c9:84:30:eb:fa: 68:3e:98:2c:7a:db:2f:d8:8f:1c:f9:3f:5c:13:ed:18: dc:e8:3e:87:90:6a:8b:ca:e6:84:f1:7b:10:7e:4f:0f: 6e:70:6c:c5:6e:80:9b:fc:f3:9b:e0:74:23:38:2a:bf: e5:2e:9d:ee:01:7c:aa:1c:2b:1d:20:05:ce:8c:00:eb: 47:fc:ef:e8:f3:80:8e:a3:4a:b2:86:2b:36:52:62:32 Fingerprint (SHA-256): 8C:5E:54:4A:C4:8C:57:D2:B9:73:7E:BD:98:75:B9:62:24:93:08:1B:DC:03:86:3E:81:15:3A:A8:26:87:CB:3D Fingerprint (SHA1): F8:BD:EC:19:88:8D:77:48:99:14:88:10:9A:43:D0:6E:EB:17:70:A4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9004: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9005: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9006: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064642 (0x670ef82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:05:33 2016 Not After : Fri Jan 08 12:05:33 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:d6:de:e5:7c:a6:5d:ff:49:a2:c8:e4:e0:bd:2f:95: b1:02:67:8d:6a:62:8d:9c:2d:b1:03:72:c0:12:b5:d5: 2b:7d:aa:d8:6b:9a:10:63:6a:4d:19:ef:51:ad:6c:bc: a3:8e:6d:62:0a:1a:7e:dc:67:d8:b3:b7:59:eb:e0:7b: 0d:9d:19:af:00:de:9f:27:a5:67:ea:92:22:20:00:2e: 30:d3:a9:ad:2c:48:01:0b:9a:bb:65:88:14:69:75:07: f5:1c:ed:7d:35:e5:1a:ad:ba:3d:7f:b4:80:1b:b1:31: c7:44:1e:29:ff:6b:c3:80:b2:43:16:3f:70:71:e0:53: e1:53:2a:1f:e0:47:95:3f:90:c3:eb:20:c1:20:d5:42: fe:0d:64:44:b9:04:94:a1:6f:bb:80:ea:8e:39:fb:4f: d8:45:51:db:55:fa:bd:73:bd:cd:54:40:a6:d8:99:71: b3:20:da:8b:f5:8e:35:75:9c:98:f2:eb:35:ad:e4:3d: 4e:93:14:15:a7:11:ab:de:84:fb:4e:eb:0c:50:69:54: 8b:dd:aa:eb:04:91:37:6b:1c:2d:c1:87:89:20:11:31: 1d:06:40:95:63:7b:4b:4e:66:db:ef:b1:51:af:bf:ec: 7b:ba:38:fc:0e:ce:a2:b8:9a:57:47:ed:49:bb:b6:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:b1:8f:00:e5:b8:37:1e:cd:3b:78:a0:d1:35:17:50: c1:85:d7:ff:cf:6e:e6:76:06:2b:cc:78:87:59:35:aa: 93:e3:bb:cb:a5:15:2c:ed:c7:d6:17:7e:d9:64:5c:d2: 88:8d:89:e7:8d:bf:94:8a:1c:7b:02:dc:c7:95:c7:2f: a7:5a:c9:f9:7a:a0:e9:25:ae:c8:eb:db:22:27:fc:7b: 80:35:cc:2e:63:48:a9:85:90:d9:6c:eb:e0:98:c6:93: bc:47:58:14:e5:b1:1f:83:60:97:8d:bb:d5:27:78:b9: 5a:b6:f1:f1:ce:22:72:0f:e2:51:8d:1f:f6:ff:ad:16: 3e:3a:78:51:87:08:a0:b3:4b:d7:84:ed:76:c7:7a:32: 6f:8d:6e:e9:46:56:cb:fb:03:37:e4:69:b1:c4:3c:7c: 4f:84:ac:e3:eb:29:63:52:e0:05:3f:f7:67:03:6a:ce: 92:67:3d:61:03:85:cf:72:bb:1a:bc:4a:93:8f:a4:b1: 82:8a:f1:a0:13:ea:f9:65:0b:a2:dd:e3:e2:d4:de:53: a3:64:b0:ec:64:81:7d:7d:48:cb:fe:1f:0d:88:85:e9: 6a:60:74:79:1d:14:e3:f7:5b:92:67:72:55:16:08:2b: 9d:ed:92:f2:36:8a:55:fb:62:f7:17:9b:6f:0c:c1:44 Fingerprint (SHA-256): 82:AF:71:0F:4D:0C:C9:8D:3D:09:09:12:00:79:0A:A4:E2:60:33:FE:2B:94:F9:63:51:C3:A9:CE:8F:73:7D:80 Fingerprint (SHA1): AD:BE:FC:33:74:D0:D5:48:E9:75:D2:15:F7:11:37:0B:A0:86:79:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9007: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9008: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064643 (0x670ef83) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 12:05:52 2016 Not After : Fri Jan 08 12:05:52 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:8c:c9:11:53:21:a3:5c:42:b6:9b:82:cb:84:1b:e0: dc:be:fb:90:65:bd:06:ce:4d:0b:93:ae:61:97:7c:df: ce:8a:fe:05:51:c8:cc:71:4e:a9:54:a2:2a:30:a1:7b: ff:4a:c6:3c:0a:91:61:7a:fd:63:51:3b:36:77:ec:ec: 55:0b:7d:19:d9:cf:7e:d9:40:1d:a1:a2:f2:2e:98:11: 25:d2:42:13:50:dc:ee:29:31:c2:f1:e1:68:4b:b4:e5: ce:fe:34:0c:4a:f6:b3:60:7a:1a:5f:8a:81:5b:f8:98: ad:e0:0c:dc:d4:cc:e8:c7:4e:7a:f1:28:6b:49:10:bf: cd:1d:c1:fa:34:a9:db:ea:5e:0e:f9:fd:a1:a5:51:8e: a4:56:0a:f2:98:20:69:41:47:cb:86:c1:e0:58:cb:ca: 1e:bd:4e:f4:0d:be:93:08:00:70:d9:7c:a3:88:46:b1: 3a:ae:eb:69:3d:f4:24:92:db:27:f2:20:c4:d8:d4:a5: 64:1b:aa:a8:71:de:a4:30:03:2d:f7:46:4d:c2:dc:85: c5:f9:07:f2:df:a6:ef:38:cb:62:d0:ae:90:cb:44:ca: dd:bc:61:10:7b:bd:a7:5f:62:b4:a3:26:05:75:9b:06: d8:0e:63:1f:b8:1d:ac:a3:14:c7:dc:d7:0d:97:aa:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:f6:0c:bd:63:ab:7f:95:13:6d:2d:d8:d8:e9:4c:9d: db:f8:9c:fd:2d:49:93:fe:f8:7c:73:1e:4b:ab:58:b3: 59:32:fb:cd:1d:5a:e6:0b:e5:2b:f1:7a:93:27:1a:e6: 5e:e8:82:2b:c1:1c:e4:ee:45:93:fc:19:f6:3e:45:cc: 04:60:1d:f3:f8:72:2d:1b:d2:17:06:91:77:7c:5a:d8: 04:cf:b0:fc:5f:5b:af:ac:e5:7c:56:77:73:ed:46:8f: b1:48:f2:b6:dd:0c:1a:c7:a8:77:00:3a:91:09:14:44: 53:41:22:17:ef:74:4b:35:ca:f4:83:4c:a5:62:5b:d9: 54:ce:b1:54:81:99:6e:78:35:53:48:df:b7:1e:57:91: c0:36:65:f3:f9:31:d5:a9:56:36:71:b3:3f:3f:3d:37: 97:1b:38:73:48:7c:3f:ca:bb:79:ac:7a:c6:e1:88:27: 08:60:f4:31:a0:36:5e:10:e7:2e:b5:cc:f3:30:3f:48: fd:fe:24:39:aa:09:00:f5:b6:25:bf:bf:0b:bc:5c:b1: 76:e5:f1:22:6d:1f:2e:49:b0:8e:72:af:4b:3b:d2:63: 3c:cd:db:8a:be:c6:2d:bf:16:7a:86:32:e2:e9:94:66: 05:4a:07:f2:f4:ff:4c:12:9b:5a:01:84:d4:c6:fa:00 Fingerprint (SHA-256): 10:12:5C:08:24:C6:0A:0C:DF:D5:E6:12:3C:19:08:99:E8:62:7F:A7:70:F1:94:4A:00:FB:6A:C7:8F:80:A1:97 Fingerprint (SHA1): 12:D9:23:E8:59:38:A8:58:AE:9B:EA:4E:9F:A6:F9:CF:86:63:0E:0F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #9009: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9010: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064645 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9011: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9012: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9013: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9014: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108064646 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9015: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9016: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9017: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9018: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108064647 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #9019: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9020: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #9021: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9022: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 108064648 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9023: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9024: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #9025: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9026: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 108064649 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9027: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9028: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9029: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #9030: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #9031: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #9032: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #9033: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064645 (0x670ef85) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:06:28 2016 Not After : Fri Jan 08 12:06:28 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:37:23:40:7e:7a:89:a1:bd:57:ac:7f:99:e4:48:9d: 79:aa:2c:69:1d:77:f6:d5:f6:2e:b7:66:ea:55:cd:f9: d8:a4:2f:c0:24:c4:84:6c:88:95:1d:7a:e9:9d:a9:9f: 3d:39:82:20:db:d5:23:b4:42:00:90:c0:ef:be:a0:14: 81:58:e0:8c:a3:d4:cf:a0:af:8c:e0:66:34:32:e0:ed: 72:cb:05:97:1f:9e:1f:59:ed:91:7f:19:fc:2d:ff:84: 4f:82:43:36:0c:5e:fc:8f:0d:3c:e4:ff:de:dc:f7:59: 5a:5c:6d:3f:c6:bb:d8:5a:51:1a:53:23:06:5b:2c:5e: ec:dd:25:2f:3f:d0:da:ca:69:7e:ec:c0:04:90:12:93: d3:ab:07:de:a6:ce:7b:a5:6b:69:33:5f:75:f4:81:5e: bb:b6:8a:03:c9:04:a0:5e:86:2c:8c:79:f7:d3:c7:6d: dc:ea:79:e6:46:4f:81:78:3f:99:56:3b:f4:cb:d1:63: 10:81:a7:66:f2:79:04:c9:63:23:2e:2c:36:d6:98:f5: f2:0b:32:db:e1:36:83:3e:cf:cd:3a:b3:95:d1:70:72: d8:0f:f1:3b:84:12:22:61:2e:76:63:1d:7b:b6:d0:04: 84:90:9b:0e:5a:83:0b:6e:82:d8:84:c5:b3:77:d8:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:77:57:51:7a:2d:ef:7e:a7:0a:a4:e6:f4:2d:ce:05: 6a:f7:4d:e7:e5:5f:1e:8d:1b:8a:0a:cb:53:0b:ab:94: 0f:03:87:f9:94:85:db:ad:c3:19:9c:dd:88:8d:e8:22: 56:1c:ae:5f:ce:5c:a6:8e:2c:37:66:ab:8c:21:c9:65: 84:99:93:28:84:c7:26:23:40:d8:a7:76:f1:f2:8a:3d: 70:87:99:83:cf:94:c1:9c:5e:d6:85:f1:36:65:4e:f3: 02:51:6e:b7:38:d4:5f:6e:ab:80:33:bc:ca:1d:cb:b4: 6e:56:de:2a:1f:9c:c1:0b:10:1a:0a:b7:b2:89:80:d6: 6b:a4:f2:51:96:0e:8e:81:34:6b:3a:aa:34:c4:8c:bf: 32:cd:c9:ee:c2:45:51:c2:8d:c4:5c:e3:4c:c2:0e:f4: d1:cb:bf:98:59:22:c1:22:23:c3:12:4f:79:86:9e:91: 48:bb:ea:5b:b5:d8:52:7a:98:ff:2b:5d:0d:bc:63:71: bf:04:85:37:11:69:59:56:18:4e:4f:5e:0b:2e:0b:2a: 43:91:fc:b3:76:8a:4d:fe:38:b3:ff:1c:f6:0f:fb:c6: a3:91:48:66:97:7f:6d:32:9a:9a:01:20:51:02:20:d3: 76:fb:e1:fe:38:14:e8:d4:8f:9b:d0:26:8a:f2:a5:12 Fingerprint (SHA-256): 6A:A9:51:A4:63:06:3A:93:4A:07:06:A5:5C:01:8E:8C:97:86:5E:6B:0C:44:6D:9F:0B:3B:6B:B7:59:3C:0E:60 Fingerprint (SHA1): EC:C8:C2:F1:87:B4:98:17:79:44:E2:E8:CC:33:F9:B7:A0:57:86:B0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9034: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9035: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064646 (0x670ef86) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:06:39 2016 Not After : Fri Jan 08 12:06:39 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:6e:29:1d:19:60:10:4d:79:37:eb:a6:2b:cd:5b:2f: c7:4e:a5:91:58:ca:4e:8d:ba:50:da:0b:16:f7:a3:77: e2:15:cc:82:75:7d:8f:3a:be:10:6f:f2:3b:6e:e5:f4: 6a:48:44:5d:7e:97:f2:36:bc:4f:44:88:6a:eb:2d:b0: 73:38:33:a5:82:f9:ee:58:f2:f6:1e:c7:f5:68:fb:ac: b0:00:66:d1:12:b0:89:43:4a:b5:08:8c:3a:82:7b:05: 06:a0:cf:1f:e2:0c:6d:59:1e:f3:8a:b3:45:a9:dc:e7: 3b:44:3c:9d:75:99:7b:1c:4e:c4:4e:9a:ea:36:c8:ff: 4a:19:ab:ed:df:6b:ea:6c:dd:ab:57:e3:8b:28:6e:56: 3c:21:de:b8:38:35:dc:b5:a9:c2:59:d7:68:cf:3b:01: 06:df:1f:d6:e2:b3:09:4f:2c:f8:7a:be:b5:98:5c:8c: 9b:36:bb:c8:30:47:dd:79:fd:59:f7:70:3e:6a:c8:bf: 71:da:29:68:a8:51:73:e9:58:5a:a4:84:9a:ad:92:d3: db:c6:dc:62:10:a2:41:28:db:c4:91:59:40:a6:cc:f7: ba:2a:05:66:2a:8a:e4:0c:43:4c:2c:39:af:70:f3:eb: 78:21:28:fd:6b:c5:8d:4d:7a:e1:bf:75:87:67:a6:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cf:84:27:53:ec:ad:3a:dc:b9:27:09:14:b8:71:1a:4b: 17:8f:6f:1d:0e:81:73:af:9f:f9:63:10:94:89:c9:fc: 13:3a:37:7d:3a:a0:1a:ab:b3:e2:74:ca:43:ef:ce:8b: 61:37:22:73:9f:39:01:75:f2:fe:42:b9:19:47:22:da: 1d:78:eb:7f:bf:cb:9b:29:ea:00:d8:43:d3:09:58:cd: dd:71:4b:57:56:f0:18:ff:7c:00:0c:b9:8b:6d:0a:4c: 41:7d:92:83:32:f0:02:b6:99:ee:e6:fc:6e:8c:95:ff: d0:62:34:f1:93:87:fe:63:94:5c:a8:bd:32:a8:14:30: cf:e9:93:34:78:b1:75:05:ed:d7:19:1a:e7:b7:55:34: 0c:0e:09:e7:30:5b:92:e5:50:b1:88:85:76:10:eb:a8: 43:11:22:ec:8f:7b:c8:e6:8b:13:ca:eb:f1:57:cc:84: 23:2d:d0:91:91:d1:ba:cd:a6:80:80:db:be:79:da:d2: af:9a:cf:fd:39:b6:95:85:04:70:33:e3:3b:94:6f:e1: 50:2d:ae:4d:18:7d:48:f3:23:b0:ad:13:b6:29:fc:c7: 28:d7:84:d9:84:c9:45:dd:ed:55:e5:5c:c0:3c:d6:bc: 75:1e:02:ba:f0:14:b3:d1:cd:07:77:92:3f:5b:d2:98 Fingerprint (SHA-256): 02:89:6E:EE:EF:C9:96:21:0D:97:C1:B7:CB:91:EE:CF:61:81:B9:A3:79:7C:82:59:0B:73:E5:B9:9F:82:50:3C Fingerprint (SHA1): BA:42:F9:DE:1A:7B:F1:C4:C0:8C:34:AA:8C:2D:8F:B0:7A:7A:40:79 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9036: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9037: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9038: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064647 (0x670ef87) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 12:06:50 2016 Not After : Fri Jan 08 12:06:50 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:53:69:3b:7f:7b:ba:6c:29:e7:0b:73:fe:f1:4d:d0: 11:8a:b2:8f:3a:1d:14:6f:24:1b:2c:f4:db:2b:74:23: 03:7b:22:16:a0:d1:89:8a:ef:9e:3e:75:a4:65:1b:24: d3:a7:53:05:94:ce:db:a3:b5:c0:36:dd:ea:a1:de:1b: 1c:54:7c:f4:60:b3:33:9d:27:45:6d:90:d5:d8:25:c1: 2a:f7:6c:d0:a4:44:4f:e1:a9:98:bd:f7:1c:30:52:cc: 14:6c:2b:61:f8:dc:ad:23:cb:97:bf:d0:be:7e:3c:b4: 1c:e4:ca:05:da:f4:99:0f:bb:31:87:83:3b:fc:bc:e5: 93:fe:00:2a:e8:e0:93:9f:11:18:99:db:02:9a:9c:a4: be:66:d4:3f:13:13:7d:58:b6:ae:81:63:dc:3d:e8:e5: 5e:22:ef:83:58:97:82:24:ae:f6:38:ea:b9:29:c6:39: 36:df:b9:80:17:38:48:7a:eb:6a:09:70:a7:66:7b:4e: fa:f7:16:79:ed:ad:6e:2c:d1:e6:d9:c5:80:86:1c:cb: 01:22:af:8f:f0:b9:a7:5e:4a:d0:59:7d:99:b1:ff:1d: 59:60:4b:bb:89:fa:fb:3b:55:4d:ca:29:2a:39:6a:a3: 13:0d:01:0e:21:fb:78:50:f6:ca:32:6a:7a:d6:a9:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:e8:c9:98:bd:9a:bd:0c:74:8d:d8:02:74:f3:bf:bf: 0d:ef:3b:9b:71:dc:f6:12:99:20:62:e0:aa:6f:94:f1: 78:61:f2:ed:ca:6e:bb:c5:79:92:25:fb:69:ac:77:40: d4:ae:2a:e2:23:f9:31:23:a0:3d:c3:fe:52:e1:d5:9b: 86:cc:12:cb:a1:ef:bc:5e:ee:60:15:95:c9:c7:64:20: 96:c2:eb:ef:85:b4:2a:e3:47:28:ee:ac:c9:50:d5:42: c5:4d:7b:f9:e7:75:88:b3:1f:05:60:2a:70:4d:5e:eb: 0a:6d:15:5a:52:ea:51:23:c7:01:b1:0f:ee:b5:c1:5c: c5:63:14:ab:63:79:85:92:ff:7b:ff:5e:16:aa:4f:59: e7:04:f7:75:35:8c:f9:c5:ba:fe:83:7c:98:c5:08:20: 53:95:f5:8d:e1:97:c8:bb:6c:b4:40:35:39:17:5d:fc: 32:94:11:74:c1:63:48:2c:90:be:93:23:79:cc:b8:3b: df:37:19:d7:c4:c2:ef:cf:d2:1b:f6:77:69:4d:50:6f: ce:02:c1:59:77:f8:15:68:ca:17:5a:4e:6b:7d:ae:64: 1c:f6:ee:66:f5:25:d1:ca:bc:61:5f:62:24:41:c1:8b: 66:6c:30:a5:25:03:cd:66:53:f7:79:a2:c4:fa:c8:10 Fingerprint (SHA-256): 5A:CB:3C:B0:50:A9:C9:5A:80:BA:A2:04:2D:46:5F:25:6B:DF:8D:72:22:CE:FA:DF:6F:1C:8D:9A:5C:F8:9A:7B Fingerprint (SHA1): 41:B4:0E:83:F3:26:F2:C6:31:DC:70:49:D0:3F:F0:70:5D:1F:81:BE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #9039: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9040: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064650 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9041: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9042: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9043: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9044: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108064651 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9045: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9046: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9047: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9048: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108064652 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA1Root-108064559.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9049: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9050: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #9051: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9052: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108064653 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9053: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9054: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #9055: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064650 (0x670ef8a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:07:26 2016 Not After : Fri Jan 08 12:07:26 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:eb:2f:59:ac:93:17:4b:08:e7:f4:7b:28:1e:34:14: f5:93:c0:3e:af:d7:6d:70:47:9f:c5:97:40:c0:9a:6b: 52:9d:39:a3:5b:4a:11:92:79:18:53:75:5c:ab:8a:62: 0f:15:f4:19:92:c2:05:d6:bf:5c:79:08:46:3a:0f:47: b4:88:6a:69:91:a9:17:6e:b2:b7:d8:d0:f1:b9:e7:36: a4:c3:06:8f:04:0e:fb:48:bf:2d:ae:16:d1:73:c1:e7: c3:da:82:48:69:f6:c7:3e:5b:da:fa:58:55:2e:50:e1: 20:4d:35:a3:51:fd:b3:c6:5c:ed:66:8b:9b:40:ec:3f: 8d:75:24:53:fd:62:c1:46:2d:4c:4b:6a:66:64:e9:54: 2d:68:c9:ed:35:72:ee:53:03:4d:c6:65:90:1a:7e:8a: bb:a4:3f:2a:09:f2:5f:f4:cc:f3:cc:85:7e:ae:d6:6e: e0:51:62:95:ce:79:e4:17:07:5a:c3:8b:74:ab:b8:0b: b0:7b:88:d2:63:c6:49:bc:1e:52:15:2b:f9:1b:91:f9: 11:2e:2e:13:8e:11:f4:8d:22:0b:bc:2d:23:7c:4d:c9: 83:f2:e9:67:e6:29:41:c5:b1:07:23:03:c1:2a:d2:7c: 77:93:15:e9:05:b5:66:80:56:fd:f1:dc:78:50:1e:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:0d:ed:7c:d7:67:8f:6f:ec:fc:e0:cd:95:b6:2c:7a: c2:11:94:97:c3:3a:a7:0e:32:80:ed:fc:c3:41:da:54: 2b:b7:50:fb:a0:54:cc:ed:f4:e2:dc:5b:a5:88:4d:32: 99:33:b1:37:52:04:d2:5a:28:dc:6f:1a:a3:bb:5a:0d: 06:87:68:04:e0:d1:63:de:60:21:5f:d6:26:10:7e:15: 57:3a:5a:b0:98:fa:4b:6a:94:3f:38:3a:3e:48:8f:96: 3d:bb:2f:1d:b9:58:4e:16:65:58:5b:b8:b3:56:85:4f: ef:df:af:eb:21:40:cf:21:85:67:51:dc:e1:22:43:82: b7:ac:bc:b9:6f:81:4f:91:88:e4:6c:08:0a:35:59:cb: 85:0d:37:80:87:20:da:28:8e:2e:04:d2:bd:82:f3:c2: d1:3c:00:5e:48:ab:36:fa:cb:42:77:56:03:56:a4:2c: 3e:33:63:95:9d:c1:d4:55:ed:ac:b1:74:d2:13:3b:5b: d8:a0:c9:0b:73:10:9a:93:db:bc:fd:8f:06:9f:f9:0b: 75:a8:03:f2:36:2e:7a:4f:b2:d9:a7:b3:b4:cd:67:20: c0:a9:26:73:b1:7b:63:5b:31:2e:93:cb:a9:c7:a1:14: a8:2b:ed:08:8a:ae:0c:13:0b:57:6e:e6:b7:b9:25:09 Fingerprint (SHA-256): E9:B8:99:1F:59:72:CE:11:D7:44:BE:A6:23:1E:DC:07:40:40:29:BA:D3:85:50:75:30:32:7C:F3:39:CA:9D:74 Fingerprint (SHA1): D5:25:6D:D6:22:B7:71:CC:8A:91:16:41:73:49:C4:E0:60:DA:D6:8B Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9056: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #9057: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064654 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9058: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #9059: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #9060: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064655 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9061: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #9062: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #9063: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9064: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108064656 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9065: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9066: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108064657 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9067: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9068: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #9069: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9070: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9071: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108064658 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-Bridge-108064560.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9072: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9073: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9074: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9075: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108064659 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9076: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9077: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #9078: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #9079: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064655 (0x670ef8f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:08:28 2016 Not After : Fri Jan 08 12:08:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:f7:37:fc:0f:4c:96:6f:9e:4c:62:ef:51:6f:c2:99: 11:c5:fe:f4:8e:64:70:b0:cf:57:a3:66:51:9c:37:07: 60:72:5d:41:5f:7c:61:32:b1:4c:40:6e:7e:37:5d:42: 59:b7:18:cf:f1:61:1c:e7:39:f8:3c:1a:25:f5:2a:37: d7:f3:f2:63:32:0f:18:8b:a1:14:6b:45:41:87:7f:69: 86:f4:11:94:43:3a:28:65:f8:2a:af:fb:bd:c2:98:b6: ea:76:bf:1d:67:c9:a9:e5:34:a5:d1:e5:36:e0:fc:53: af:36:61:c9:1d:35:17:42:ca:58:cb:15:6b:55:5f:73: be:bf:72:fe:12:69:3b:69:d9:ee:e1:a1:82:d7:b0:57: 14:d2:64:9c:59:44:9a:c7:d3:72:62:5f:ab:c0:30:4f: e6:aa:b1:5d:6f:7c:16:93:63:ae:de:71:c1:3c:1a:2d: 56:c1:44:8c:81:e1:e5:40:e4:ea:da:23:09:b3:43:35: 52:16:f7:80:6f:39:69:a4:4b:72:af:c3:c4:53:ea:47: ef:5d:70:19:e8:07:3a:5b:f8:ce:1a:d5:26:b2:98:21: 92:b5:69:4f:9b:a5:1b:9a:fc:60:43:cf:a5:31:87:64: f5:a4:ed:be:ec:36:4b:e3:70:3a:2e:b6:62:08:29:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:b9:d6:32:54:c1:cd:8e:4a:bb:b9:51:c5:db:5c:6e: 91:e1:eb:37:4b:1c:43:e1:5e:9f:e0:18:11:da:48:08: 73:ce:70:9a:ed:91:ba:e1:bf:55:8a:24:1a:77:f2:7b: 10:80:8e:4f:d4:94:35:bf:50:25:ac:20:ea:d1:fc:a1: 99:38:48:30:47:05:c0:ce:e7:d2:8b:a5:23:72:09:1b: 8c:c5:5a:f3:1d:e5:ea:1d:3d:e3:a4:f0:f8:e9:b3:a0: 13:e6:d8:3b:1e:62:67:71:6c:4d:69:7d:cc:8f:36:c2: 71:de:66:ae:02:43:a8:ba:f6:3a:b0:a8:11:2a:7a:0b: 4d:22:70:49:ad:3c:2b:9f:ab:1a:47:aa:c3:fc:f6:c9: e4:e7:f3:1c:bc:07:c9:9d:53:b0:ba:33:fc:47:f8:3c: 0b:be:ed:89:2c:fc:a8:f0:19:59:a8:1b:1a:16:0e:28: df:2b:64:dc:b5:10:89:3d:e0:e4:85:f6:68:3e:e6:d8: 15:1f:5f:29:0c:4d:0a:e5:66:8b:31:16:6a:21:3e:b1: 48:90:be:ce:06:38:fc:a8:92:18:d4:e4:50:7c:c4:32: 83:63:b2:86:8b:18:fa:7c:a6:9b:e0:f4:ca:fd:63:d9: 63:9f:cf:ca:58:39:4a:1d:d3:31:6a:8f:b8:b4:26:be Fingerprint (SHA-256): F7:B9:C9:FE:DD:57:B3:F7:64:3B:83:FB:3F:D3:2E:B3:D4:C1:1B:AA:A4:5E:BF:FE:AE:88:69:F7:A7:83:CA:32 Fingerprint (SHA1): CA:7E:15:74:E6:8E:87:B7:D1:11:03:83:E3:1C:93:20:F7:83:C9:E3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9080: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064655 (0x670ef8f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:08:28 2016 Not After : Fri Jan 08 12:08:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:f7:37:fc:0f:4c:96:6f:9e:4c:62:ef:51:6f:c2:99: 11:c5:fe:f4:8e:64:70:b0:cf:57:a3:66:51:9c:37:07: 60:72:5d:41:5f:7c:61:32:b1:4c:40:6e:7e:37:5d:42: 59:b7:18:cf:f1:61:1c:e7:39:f8:3c:1a:25:f5:2a:37: d7:f3:f2:63:32:0f:18:8b:a1:14:6b:45:41:87:7f:69: 86:f4:11:94:43:3a:28:65:f8:2a:af:fb:bd:c2:98:b6: ea:76:bf:1d:67:c9:a9:e5:34:a5:d1:e5:36:e0:fc:53: af:36:61:c9:1d:35:17:42:ca:58:cb:15:6b:55:5f:73: be:bf:72:fe:12:69:3b:69:d9:ee:e1:a1:82:d7:b0:57: 14:d2:64:9c:59:44:9a:c7:d3:72:62:5f:ab:c0:30:4f: e6:aa:b1:5d:6f:7c:16:93:63:ae:de:71:c1:3c:1a:2d: 56:c1:44:8c:81:e1:e5:40:e4:ea:da:23:09:b3:43:35: 52:16:f7:80:6f:39:69:a4:4b:72:af:c3:c4:53:ea:47: ef:5d:70:19:e8:07:3a:5b:f8:ce:1a:d5:26:b2:98:21: 92:b5:69:4f:9b:a5:1b:9a:fc:60:43:cf:a5:31:87:64: f5:a4:ed:be:ec:36:4b:e3:70:3a:2e:b6:62:08:29:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:b9:d6:32:54:c1:cd:8e:4a:bb:b9:51:c5:db:5c:6e: 91:e1:eb:37:4b:1c:43:e1:5e:9f:e0:18:11:da:48:08: 73:ce:70:9a:ed:91:ba:e1:bf:55:8a:24:1a:77:f2:7b: 10:80:8e:4f:d4:94:35:bf:50:25:ac:20:ea:d1:fc:a1: 99:38:48:30:47:05:c0:ce:e7:d2:8b:a5:23:72:09:1b: 8c:c5:5a:f3:1d:e5:ea:1d:3d:e3:a4:f0:f8:e9:b3:a0: 13:e6:d8:3b:1e:62:67:71:6c:4d:69:7d:cc:8f:36:c2: 71:de:66:ae:02:43:a8:ba:f6:3a:b0:a8:11:2a:7a:0b: 4d:22:70:49:ad:3c:2b:9f:ab:1a:47:aa:c3:fc:f6:c9: e4:e7:f3:1c:bc:07:c9:9d:53:b0:ba:33:fc:47:f8:3c: 0b:be:ed:89:2c:fc:a8:f0:19:59:a8:1b:1a:16:0e:28: df:2b:64:dc:b5:10:89:3d:e0:e4:85:f6:68:3e:e6:d8: 15:1f:5f:29:0c:4d:0a:e5:66:8b:31:16:6a:21:3e:b1: 48:90:be:ce:06:38:fc:a8:92:18:d4:e4:50:7c:c4:32: 83:63:b2:86:8b:18:fa:7c:a6:9b:e0:f4:ca:fd:63:d9: 63:9f:cf:ca:58:39:4a:1d:d3:31:6a:8f:b8:b4:26:be Fingerprint (SHA-256): F7:B9:C9:FE:DD:57:B3:F7:64:3B:83:FB:3F:D3:2E:B3:D4:C1:1B:AA:A4:5E:BF:FE:AE:88:69:F7:A7:83:CA:32 Fingerprint (SHA1): CA:7E:15:74:E6:8E:87:B7:D1:11:03:83:E3:1C:93:20:F7:83:C9:E3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9081: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #9082: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064660 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9083: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #9084: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #9085: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064661 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9086: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #9087: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #9088: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9089: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108064662 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9090: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9091: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108064663 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9092: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9093: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #9094: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9095: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9096: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108064664 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-Bridge-108064561.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9097: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9098: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9099: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9100: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108064665 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9101: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9102: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9103: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9104: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108064666 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-BridgeNavy-108064562.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9105: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9106: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9107: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9108: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108064667 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9109: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9110: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #9111: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #9112: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064661 (0x670ef95) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:09:25 2016 Not After : Fri Jan 08 12:09:25 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:5b:82:42:03:4d:52:47:6a:3d:86:ee:ab:96:33:93: f4:ae:dd:48:79:77:9b:75:9e:4b:f6:0d:c3:bc:db:e8: 22:a4:c8:1e:de:ba:a7:d6:ae:25:d7:0c:42:c0:05:94: e2:9b:55:d9:35:a9:07:d7:c1:96:95:4b:e6:0b:d8:69: 8e:32:d4:9d:79:c4:7d:37:01:f9:fa:fa:f1:08:83:75: 2b:07:79:1c:82:f7:6e:6a:b3:ee:d6:48:5e:41:71:63: b5:64:41:77:5b:da:ff:d0:42:f6:51:ba:b5:b5:60:c0: 0d:d2:21:82:cf:ef:41:7e:46:70:62:e5:06:a9:1b:d4: 6c:b7:45:9d:07:c4:01:ea:31:9c:ee:bc:47:4d:d0:c5: 4e:3d:e8:b4:d2:3f:fc:92:55:75:59:11:d9:5a:81:db: aa:21:73:0f:5c:7b:09:65:d1:dc:10:05:f5:c3:de:2c: 9e:6b:ff:62:2e:df:7d:b5:f8:13:0c:55:ea:a0:f4:cd: b8:4a:4c:4d:52:19:54:18:d0:a1:38:18:22:09:04:30: 4b:37:10:99:96:6d:98:5e:da:b7:77:08:66:47:af:ce: b1:8b:7b:c0:58:d4:5b:e6:a3:1d:02:17:f8:2a:1c:57: 11:16:a5:83:4b:ce:d7:53:c7:32:41:42:d2:52:d8:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:da:0f:cd:28:d5:38:64:1b:65:06:16:ab:54:c5:8e: 1c:42:b0:9b:b0:ef:1f:4c:c9:8b:36:82:d9:19:6f:14: b5:5e:5a:98:a0:0b:4e:03:7c:1f:3d:94:a8:f1:30:b1: ce:6f:f5:71:d5:25:b8:0b:b1:72:58:cb:37:26:5e:91: 0f:40:a7:0d:cb:fb:ba:a1:13:5b:79:b0:c7:e8:22:d7: 40:ac:fb:15:39:ec:88:f6:f1:be:cf:dd:e1:bb:28:79: 37:a3:75:14:25:6d:d5:0e:3c:51:59:56:fb:2b:b5:05: e8:89:42:26:e0:c8:ba:7d:e2:0b:ec:0c:44:06:cf:60: bc:84:42:d6:91:10:f7:37:97:13:01:61:5e:67:44:5a: 67:62:0f:78:80:9b:61:de:73:2b:94:2c:af:47:2f:ca: b2:ed:58:5c:c5:bc:b9:ed:80:95:1f:fb:fc:bb:b2:38: 08:af:b3:6a:f3:cf:e6:f1:93:2c:82:c4:97:1b:ae:c8: 03:e1:6e:bf:02:b3:03:76:03:38:98:4a:f3:6c:6c:0e: f1:19:68:4e:c5:ba:76:67:9d:dc:07:1e:62:46:6c:2b: 73:2f:25:a9:92:93:bc:da:ab:08:f6:77:18:f3:77:3e: ae:d7:e7:0a:cd:17:a8:fe:27:af:75:ca:96:4b:b3:29 Fingerprint (SHA-256): 6C:ED:88:EF:D5:A4:B7:03:A0:E3:FD:87:F9:5D:A2:99:BA:85:C9:2D:C9:CD:C9:E8:11:17:F5:13:CE:3E:51:11 Fingerprint (SHA1): 53:7B:45:5B:6C:B9:1A:33:EC:42:7F:AA:3E:FD:DE:46:87:C1:9B:03 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9113: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064661 (0x670ef95) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:09:25 2016 Not After : Fri Jan 08 12:09:25 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:5b:82:42:03:4d:52:47:6a:3d:86:ee:ab:96:33:93: f4:ae:dd:48:79:77:9b:75:9e:4b:f6:0d:c3:bc:db:e8: 22:a4:c8:1e:de:ba:a7:d6:ae:25:d7:0c:42:c0:05:94: e2:9b:55:d9:35:a9:07:d7:c1:96:95:4b:e6:0b:d8:69: 8e:32:d4:9d:79:c4:7d:37:01:f9:fa:fa:f1:08:83:75: 2b:07:79:1c:82:f7:6e:6a:b3:ee:d6:48:5e:41:71:63: b5:64:41:77:5b:da:ff:d0:42:f6:51:ba:b5:b5:60:c0: 0d:d2:21:82:cf:ef:41:7e:46:70:62:e5:06:a9:1b:d4: 6c:b7:45:9d:07:c4:01:ea:31:9c:ee:bc:47:4d:d0:c5: 4e:3d:e8:b4:d2:3f:fc:92:55:75:59:11:d9:5a:81:db: aa:21:73:0f:5c:7b:09:65:d1:dc:10:05:f5:c3:de:2c: 9e:6b:ff:62:2e:df:7d:b5:f8:13:0c:55:ea:a0:f4:cd: b8:4a:4c:4d:52:19:54:18:d0:a1:38:18:22:09:04:30: 4b:37:10:99:96:6d:98:5e:da:b7:77:08:66:47:af:ce: b1:8b:7b:c0:58:d4:5b:e6:a3:1d:02:17:f8:2a:1c:57: 11:16:a5:83:4b:ce:d7:53:c7:32:41:42:d2:52:d8:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:da:0f:cd:28:d5:38:64:1b:65:06:16:ab:54:c5:8e: 1c:42:b0:9b:b0:ef:1f:4c:c9:8b:36:82:d9:19:6f:14: b5:5e:5a:98:a0:0b:4e:03:7c:1f:3d:94:a8:f1:30:b1: ce:6f:f5:71:d5:25:b8:0b:b1:72:58:cb:37:26:5e:91: 0f:40:a7:0d:cb:fb:ba:a1:13:5b:79:b0:c7:e8:22:d7: 40:ac:fb:15:39:ec:88:f6:f1:be:cf:dd:e1:bb:28:79: 37:a3:75:14:25:6d:d5:0e:3c:51:59:56:fb:2b:b5:05: e8:89:42:26:e0:c8:ba:7d:e2:0b:ec:0c:44:06:cf:60: bc:84:42:d6:91:10:f7:37:97:13:01:61:5e:67:44:5a: 67:62:0f:78:80:9b:61:de:73:2b:94:2c:af:47:2f:ca: b2:ed:58:5c:c5:bc:b9:ed:80:95:1f:fb:fc:bb:b2:38: 08:af:b3:6a:f3:cf:e6:f1:93:2c:82:c4:97:1b:ae:c8: 03:e1:6e:bf:02:b3:03:76:03:38:98:4a:f3:6c:6c:0e: f1:19:68:4e:c5:ba:76:67:9d:dc:07:1e:62:46:6c:2b: 73:2f:25:a9:92:93:bc:da:ab:08:f6:77:18:f3:77:3e: ae:d7:e7:0a:cd:17:a8:fe:27:af:75:ca:96:4b:b3:29 Fingerprint (SHA-256): 6C:ED:88:EF:D5:A4:B7:03:A0:E3:FD:87:F9:5D:A2:99:BA:85:C9:2D:C9:CD:C9:E8:11:17:F5:13:CE:3E:51:11 Fingerprint (SHA1): 53:7B:45:5B:6C:B9:1A:33:EC:42:7F:AA:3E:FD:DE:46:87:C1:9B:03 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9114: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #9115: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064660 (0x670ef94) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 12:09:20 2016 Not After : Fri Jan 08 12:09:20 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:f6:33:ec:99:d3:9a:d9:87:66:ca:42:5d:b9:7b:7f: f5:c9:3b:ae:7a:8e:32:4f:6d:93:fe:53:27:09:1b:25: d5:01:d2:38:09:b7:60:c4:90:57:d9:da:09:6c:32:81: c8:c9:9d:8b:40:55:ce:fd:b3:d6:cb:96:0b:8b:bb:b8: f7:29:d3:43:8a:c2:7c:b6:6e:37:49:06:47:37:ee:32: 48:19:7f:45:a6:f5:a0:dd:de:e9:28:a3:e3:ef:14:68: ac:d0:38:1e:e4:e9:f4:21:3e:00:a5:11:13:6b:eb:65: 7c:cf:71:5f:95:2a:d5:21:62:8e:ff:93:91:46:67:6f: c1:c4:e6:29:65:a4:d7:5b:4c:cf:7d:6a:bd:f3:e1:c9: a9:a2:84:f6:41:60:b1:07:16:af:97:eb:ea:85:13:46: 2f:3c:2e:e9:ea:50:36:d7:8d:95:d7:b7:b8:8e:70:a9: a8:b3:f5:ac:d2:6e:83:ed:53:ae:92:c6:25:3d:91:86: 51:61:d2:b3:d5:5a:70:e4:91:4d:b5:4a:2d:ac:dc:58: e6:99:93:44:3f:4c:f3:29:97:d8:68:ca:e5:75:2e:ef: f3:55:aa:84:46:9e:cd:8b:1f:8e:e4:50:31:d6:90:92: 4f:4a:b8:9d:99:2e:b4:bc:27:06:42:07:d4:19:81:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:52:8a:ce:78:2b:c1:11:ed:28:24:fc:ba:6d:7a:3a: df:24:63:42:53:ef:08:dd:ee:44:a6:a9:cb:27:c9:c0: a8:17:ac:f9:f3:2c:f2:c0:50:f3:39:a7:3f:4e:ad:d5: ba:b4:04:15:80:b5:42:f6:06:a4:01:f1:11:64:0e:d3: a2:c1:57:f4:15:14:b6:cf:0a:48:37:85:fa:05:3d:ab: 7f:9f:8b:df:3c:54:69:37:3a:22:af:6f:17:d3:f9:3d: 9a:65:eb:35:90:1d:75:9b:99:ba:4c:ef:3d:08:f5:e1: d5:b6:e6:ac:36:b4:97:68:b3:84:35:bf:94:21:63:45: 03:fc:ec:7a:3c:e4:01:e4:41:ac:b3:07:f5:33:f2:52: ad:38:8e:3a:7c:49:f1:89:b7:0c:4a:78:a9:8a:ef:08: b6:dd:c5:7e:4a:6d:d7:71:e2:28:c4:5f:9a:1a:ce:b6: 58:75:db:aa:95:dc:8c:75:86:3f:48:0d:eb:21:3f:f5: 39:8e:71:2a:fa:c5:cd:b7:c0:57:26:c8:23:db:72:fb: 9e:73:c9:86:dd:e8:0c:d5:d0:de:3f:b1:52:0d:8e:1c: f1:1e:fb:69:ac:53:fe:d8:b0:51:b1:b6:b1:7b:34:c6: 1f:c8:40:36:79:15:7d:96:8a:af:66:17:10:4c:3c:a4 Fingerprint (SHA-256): A1:D8:4F:47:30:E5:1F:49:41:64:57:92:4B:56:0D:51:FB:8B:9A:51:5F:B5:48:23:21:67:45:C4:51:49:76:90 Fingerprint (SHA1): 81:D9:A1:0D:61:CA:54:F4:BF:BE:7C:26:A3:16:2E:33:7C:DB:CC:1C Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9116: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064661 (0x670ef95) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:09:25 2016 Not After : Fri Jan 08 12:09:25 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:5b:82:42:03:4d:52:47:6a:3d:86:ee:ab:96:33:93: f4:ae:dd:48:79:77:9b:75:9e:4b:f6:0d:c3:bc:db:e8: 22:a4:c8:1e:de:ba:a7:d6:ae:25:d7:0c:42:c0:05:94: e2:9b:55:d9:35:a9:07:d7:c1:96:95:4b:e6:0b:d8:69: 8e:32:d4:9d:79:c4:7d:37:01:f9:fa:fa:f1:08:83:75: 2b:07:79:1c:82:f7:6e:6a:b3:ee:d6:48:5e:41:71:63: b5:64:41:77:5b:da:ff:d0:42:f6:51:ba:b5:b5:60:c0: 0d:d2:21:82:cf:ef:41:7e:46:70:62:e5:06:a9:1b:d4: 6c:b7:45:9d:07:c4:01:ea:31:9c:ee:bc:47:4d:d0:c5: 4e:3d:e8:b4:d2:3f:fc:92:55:75:59:11:d9:5a:81:db: aa:21:73:0f:5c:7b:09:65:d1:dc:10:05:f5:c3:de:2c: 9e:6b:ff:62:2e:df:7d:b5:f8:13:0c:55:ea:a0:f4:cd: b8:4a:4c:4d:52:19:54:18:d0:a1:38:18:22:09:04:30: 4b:37:10:99:96:6d:98:5e:da:b7:77:08:66:47:af:ce: b1:8b:7b:c0:58:d4:5b:e6:a3:1d:02:17:f8:2a:1c:57: 11:16:a5:83:4b:ce:d7:53:c7:32:41:42:d2:52:d8:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:da:0f:cd:28:d5:38:64:1b:65:06:16:ab:54:c5:8e: 1c:42:b0:9b:b0:ef:1f:4c:c9:8b:36:82:d9:19:6f:14: b5:5e:5a:98:a0:0b:4e:03:7c:1f:3d:94:a8:f1:30:b1: ce:6f:f5:71:d5:25:b8:0b:b1:72:58:cb:37:26:5e:91: 0f:40:a7:0d:cb:fb:ba:a1:13:5b:79:b0:c7:e8:22:d7: 40:ac:fb:15:39:ec:88:f6:f1:be:cf:dd:e1:bb:28:79: 37:a3:75:14:25:6d:d5:0e:3c:51:59:56:fb:2b:b5:05: e8:89:42:26:e0:c8:ba:7d:e2:0b:ec:0c:44:06:cf:60: bc:84:42:d6:91:10:f7:37:97:13:01:61:5e:67:44:5a: 67:62:0f:78:80:9b:61:de:73:2b:94:2c:af:47:2f:ca: b2:ed:58:5c:c5:bc:b9:ed:80:95:1f:fb:fc:bb:b2:38: 08:af:b3:6a:f3:cf:e6:f1:93:2c:82:c4:97:1b:ae:c8: 03:e1:6e:bf:02:b3:03:76:03:38:98:4a:f3:6c:6c:0e: f1:19:68:4e:c5:ba:76:67:9d:dc:07:1e:62:46:6c:2b: 73:2f:25:a9:92:93:bc:da:ab:08:f6:77:18:f3:77:3e: ae:d7:e7:0a:cd:17:a8:fe:27:af:75:ca:96:4b:b3:29 Fingerprint (SHA-256): 6C:ED:88:EF:D5:A4:B7:03:A0:E3:FD:87:F9:5D:A2:99:BA:85:C9:2D:C9:CD:C9:E8:11:17:F5:13:CE:3E:51:11 Fingerprint (SHA1): 53:7B:45:5B:6C:B9:1A:33:EC:42:7F:AA:3E:FD:DE:46:87:C1:9B:03 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9117: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064661 (0x670ef95) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:09:25 2016 Not After : Fri Jan 08 12:09:25 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:5b:82:42:03:4d:52:47:6a:3d:86:ee:ab:96:33:93: f4:ae:dd:48:79:77:9b:75:9e:4b:f6:0d:c3:bc:db:e8: 22:a4:c8:1e:de:ba:a7:d6:ae:25:d7:0c:42:c0:05:94: e2:9b:55:d9:35:a9:07:d7:c1:96:95:4b:e6:0b:d8:69: 8e:32:d4:9d:79:c4:7d:37:01:f9:fa:fa:f1:08:83:75: 2b:07:79:1c:82:f7:6e:6a:b3:ee:d6:48:5e:41:71:63: b5:64:41:77:5b:da:ff:d0:42:f6:51:ba:b5:b5:60:c0: 0d:d2:21:82:cf:ef:41:7e:46:70:62:e5:06:a9:1b:d4: 6c:b7:45:9d:07:c4:01:ea:31:9c:ee:bc:47:4d:d0:c5: 4e:3d:e8:b4:d2:3f:fc:92:55:75:59:11:d9:5a:81:db: aa:21:73:0f:5c:7b:09:65:d1:dc:10:05:f5:c3:de:2c: 9e:6b:ff:62:2e:df:7d:b5:f8:13:0c:55:ea:a0:f4:cd: b8:4a:4c:4d:52:19:54:18:d0:a1:38:18:22:09:04:30: 4b:37:10:99:96:6d:98:5e:da:b7:77:08:66:47:af:ce: b1:8b:7b:c0:58:d4:5b:e6:a3:1d:02:17:f8:2a:1c:57: 11:16:a5:83:4b:ce:d7:53:c7:32:41:42:d2:52:d8:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:da:0f:cd:28:d5:38:64:1b:65:06:16:ab:54:c5:8e: 1c:42:b0:9b:b0:ef:1f:4c:c9:8b:36:82:d9:19:6f:14: b5:5e:5a:98:a0:0b:4e:03:7c:1f:3d:94:a8:f1:30:b1: ce:6f:f5:71:d5:25:b8:0b:b1:72:58:cb:37:26:5e:91: 0f:40:a7:0d:cb:fb:ba:a1:13:5b:79:b0:c7:e8:22:d7: 40:ac:fb:15:39:ec:88:f6:f1:be:cf:dd:e1:bb:28:79: 37:a3:75:14:25:6d:d5:0e:3c:51:59:56:fb:2b:b5:05: e8:89:42:26:e0:c8:ba:7d:e2:0b:ec:0c:44:06:cf:60: bc:84:42:d6:91:10:f7:37:97:13:01:61:5e:67:44:5a: 67:62:0f:78:80:9b:61:de:73:2b:94:2c:af:47:2f:ca: b2:ed:58:5c:c5:bc:b9:ed:80:95:1f:fb:fc:bb:b2:38: 08:af:b3:6a:f3:cf:e6:f1:93:2c:82:c4:97:1b:ae:c8: 03:e1:6e:bf:02:b3:03:76:03:38:98:4a:f3:6c:6c:0e: f1:19:68:4e:c5:ba:76:67:9d:dc:07:1e:62:46:6c:2b: 73:2f:25:a9:92:93:bc:da:ab:08:f6:77:18:f3:77:3e: ae:d7:e7:0a:cd:17:a8:fe:27:af:75:ca:96:4b:b3:29 Fingerprint (SHA-256): 6C:ED:88:EF:D5:A4:B7:03:A0:E3:FD:87:F9:5D:A2:99:BA:85:C9:2D:C9:CD:C9:E8:11:17:F5:13:CE:3E:51:11 Fingerprint (SHA1): 53:7B:45:5B:6C:B9:1A:33:EC:42:7F:AA:3E:FD:DE:46:87:C1:9B:03 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9118: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #9119: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064668 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9120: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #9121: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #9122: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064669 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9123: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #9124: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #9125: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9126: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 108064670 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9127: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9128: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #9129: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9130: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 108064671 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9131: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9132: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #9133: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9134: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 108064672 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #9135: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9136: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 108064673 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #9137: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9138: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #9139: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9140: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9141: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108064674 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9142: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9143: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9144: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9145: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108064675 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9146: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9147: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9148: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9149: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108064676 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9150: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9151: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9152: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9153: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108064677 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9154: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9155: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9156: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064668 (0x670ef9c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 12:10:29 2016 Not After : Fri Jan 08 12:10:29 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:4a:3a:19:68:1d:20:a2:a2:46:8d:d2:38:df:78:f9: 44:74:ac:df:04:4a:34:57:d3:36:00:65:23:a4:29:dc: a9:e3:fe:e0:51:72:c6:f3:b2:f7:5e:b8:47:2b:db:6b: 37:32:31:68:af:77:20:72:91:95:a3:61:f6:4b:68:09: 30:9f:a9:4d:15:39:7c:b9:5f:4a:73:bd:65:04:a4:12: a5:f8:11:61:66:69:1f:3e:69:30:bc:c3:ea:cc:6f:49: 2f:4b:b3:8b:ac:f8:fb:7e:8b:9b:87:39:45:46:26:c3: 79:79:e3:57:7e:14:34:68:04:47:13:89:71:bb:fd:07: d4:ee:94:77:01:23:96:8f:36:25:60:ac:03:f7:9d:ca: ca:36:63:a4:6d:00:cb:1a:d1:9b:a5:58:19:87:33:fe: d0:8d:b9:d6:44:77:21:47:29:8f:41:92:e7:b2:79:2e: b6:9f:0b:d6:b1:81:f7:06:89:b1:b8:7e:29:89:30:f8: 03:9c:8f:8a:6a:af:ae:12:3c:fb:09:85:22:fc:48:81: 44:dd:fb:a6:9f:7c:67:33:a0:2b:bf:91:21:d3:d4:49: b7:6c:26:b8:51:cc:88:cb:9e:27:9f:e5:59:b4:29:53: 03:5a:9e:03:7e:24:48:0e:24:be:fa:9c:86:ed:62:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:0f:bc:b4:4a:0c:f7:f9:02:b5:b3:12:44:66:ef:1e: 24:68:13:dc:56:45:ca:41:11:c6:3c:a7:d8:b0:08:17: 27:59:ee:86:a3:8d:7b:01:8a:c0:2e:42:6e:7d:fd:ef: f3:27:c2:02:5b:33:be:a0:e4:23:6d:47:26:c0:06:97: cf:74:0f:8d:c1:0b:03:44:de:ed:ea:da:fb:9f:4f:0d: 4d:0e:0f:0c:ac:e8:6c:02:3a:26:11:fa:31:6d:b7:79: 94:7d:c6:26:46:9a:01:24:12:c4:b6:fc:ed:cd:5c:a8: 49:fc:69:b2:5f:5c:42:94:69:37:8b:04:78:43:14:c1: 26:00:54:a1:cf:57:68:bd:a2:21:79:25:a6:c0:23:1e: 22:2d:d8:fa:f0:43:c8:5e:fd:20:52:6a:43:82:7c:a1: 8a:e9:8b:b7:bf:09:74:2d:af:b9:3e:28:b1:a5:ad:ad: db:f0:d4:8e:7e:08:4c:e6:6d:e4:d5:ed:de:dd:d4:dd: 3e:2e:6d:3f:5d:1f:5b:ca:90:60:90:4b:a5:08:3b:9e: 59:d3:fc:18:4e:00:6c:c3:4f:fb:e7:a8:ec:d9:a0:8e: 93:21:26:14:be:24:7d:1b:f2:4e:c3:bb:1e:0d:4f:52: d0:7e:f6:d5:44:90:24:c5:d5:f0:92:54:4e:34:69:15 Fingerprint (SHA-256): CE:9B:BB:5C:0D:99:D9:8D:CE:B5:18:39:F3:16:9B:B7:EA:0C:52:A5:EE:05:B4:CB:7E:05:C8:AA:51:F0:10:1A Fingerprint (SHA1): 4B:82:9D:7E:86:73:FB:36:64:9D:DB:80:7B:07:1A:EB:18:52:FA:3A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #9157: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9158: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9159: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9160: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9161: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9162: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9163: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9164: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9165: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064669 (0x670ef9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:10:36 2016 Not After : Fri Jan 08 12:10:36 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:50:fd:0b:47:23:45:09:79:c1:83:a8:76:57:1f:f5: d5:e0:93:a8:76:39:3c:8c:2f:fb:47:ac:34:81:1c:17: ba:2d:4b:93:68:cd:3d:2f:c4:37:24:27:33:9d:ed:6e: 34:df:b6:90:74:9b:ca:b9:aa:f8:33:35:02:17:92:84: a7:7d:c2:9c:c4:be:d1:3a:6d:e0:af:96:9a:98:c4:13: 16:5e:c4:2d:03:b2:c0:0c:b3:53:5f:b6:78:92:5c:11: 93:1b:be:46:a0:24:c5:d3:7c:0a:cd:23:56:da:b8:8b: e7:b8:9a:c5:d5:3d:9c:da:87:df:3b:f6:45:e6:82:75: a7:a0:14:c0:2b:06:42:46:68:48:62:ad:49:fb:f1:98: 7c:b4:9a:3b:e0:a5:ef:b2:14:23:19:f3:b7:74:52:d3: 44:21:0c:d8:78:01:46:87:5f:7b:9a:a1:34:a7:e1:ff: 56:7d:4a:dc:76:bb:2d:10:08:a4:5d:ef:4d:b1:98:a8: ff:17:fd:a8:34:16:0a:77:e8:7e:64:15:f7:09:b0:68: e6:11:3e:a0:92:ae:3a:80:ed:ba:08:f5:a5:fa:6e:37: 0f:3a:d1:48:04:2a:fe:25:cf:87:65:ea:55:1f:36:73: 57:ac:a5:6e:b6:cd:5d:38:5b:2a:1c:48:e3:80:d4:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:5d:8a:1a:60:bd:f4:4d:92:a1:25:c6:95:4b:a6:62: 17:51:07:5e:49:3a:81:22:99:6a:7a:e9:28:1f:c4:0e: 23:41:8e:8a:8f:e5:f4:33:5b:2d:0f:a8:0f:5c:ca:cd: 35:74:d7:bd:6c:6a:06:27:bf:00:05:a3:01:bc:3b:5e: 5c:4d:72:bc:cb:59:26:7a:e0:6f:fd:f5:ec:a5:8a:18: e4:cf:2e:cf:38:12:18:4a:75:52:ec:7d:66:f7:f5:ed: e7:3b:9e:43:9c:da:f5:86:b4:f4:d0:17:7c:cb:33:45: e7:90:d0:f5:a3:3d:2c:1d:7d:19:d1:fd:ca:d7:e2:f7: f3:ad:d5:74:bc:b3:83:67:96:5d:4e:ff:62:07:32:81: 41:8d:4a:39:d9:89:21:41:8c:9c:f3:0d:d8:1b:3a:ee: b6:58:5d:70:24:7f:2b:b0:be:8f:19:3d:09:84:c6:b1: 36:5f:ad:84:df:54:22:cd:4c:6a:1b:b5:b0:69:0e:80: 4b:f8:ad:4e:56:e2:df:35:53:1d:85:43:04:50:53:cb: 23:ce:82:50:7e:dc:3f:21:6e:c5:c1:73:e7:e2:8d:ed: 1a:c9:d4:97:6a:67:f5:b4:d5:07:dd:c6:94:a6:c8:d3: f1:d2:bb:de:4b:b6:2f:36:15:ef:b6:30:ee:20:9f:79 Fingerprint (SHA-256): 41:D2:99:6F:FD:2D:B2:29:EF:27:90:74:76:64:9B:5F:0C:C1:03:DA:B0:35:09:AB:14:0C:0F:EF:F1:4E:A6:C8 Fingerprint (SHA1): B8:C4:F7:37:ED:A0:B1:BC:51:57:11:7B:84:2B:8D:54:FA:DC:6B:DE Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #9166: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9167: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9168: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9169: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9170: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9171: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9172: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #9173: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #9174: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #9175: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #9176: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #9177: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #9178: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #9179: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #9180: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #9181: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #9182: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #9183: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9184: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064678 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9185: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9186: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9187: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9188: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108064679 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9189: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9190: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9191: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9192: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108064680 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9193: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9194: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9195: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9196: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 108064681 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9197: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9198: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9199: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9200: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108064682 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9201: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9202: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #9203: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9204: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 108064683 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9205: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9206: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #9207: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9208: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 108064684 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9209: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9210: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #9211: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9212: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 108064685 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9213: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9214: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #9215: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9216: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 108064686 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9217: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9218: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9219: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064678 (0x670efa6) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:11:59 2016 Not After : Fri Jan 08 12:11:59 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 90:22:e0:2a:37:1d:64:3c:b6:e7:52:8a:f2:8e:11:e7: 58:1f:4b:0d:db:47:31:f7:4d:5d:66:b8:e3:8d:c6:7c: d0:44:80:90:6b:06:39:3e:a8:84:da:f5:f4:04:3a:cc: cc:ed:ae:44:6d:ed:b2:5a:6d:cf:05:13:f9:56:33:78: 5a:b5:f0:66:4f:48:7f:a0:34:4f:20:8e:b0:e2:69:96: 20:68:d8:fd:54:cb:2d:fe:dc:5e:c6:1f:49:c6:38:bf: 51:1f:fe:b0:1b:0a:87:e1:da:e7:ae:e6:3e:7b:5d:0d: 07:ee:cc:e4:10:9b:5d:b8:f2:05:09:4d:18:96:22:63: 38:a0:3b:2b:7a:e4:03:6f:03:86:c1:b7:4c:87:64:fc: e3:47:f6:1d:30:30:00:54:17:be:ee:3a:a9:06:17:fa: 85:40:10:4a:09:a4:aa:6b:5e:82:8c:56:69:61:96:30: 9c:a1:06:8e:53:71:72:4a:2a:6f:8c:3c:17:91:b8:26: 0a:3b:8b:9f:64:f7:b9:dd:56:30:f8:52:97:c8:08:00: 04:09:87:58:65:e0:24:6d:3d:8a:b1:15:0b:27:f0:74: d5:25:79:b4:10:6e:5a:8c:97:fe:0f:71:0b:17:31:f0: 09:09:06:e9:ee:d5:bb:dd:d8:d4:83:87:6b:ff:bd:4a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:46:10:f5:6f:9e:a7:6c:77:6c:20:7f:4c: 59:45:e2:81:86:50:50:af:f6:6d:36:7e:26:a1:db:7b: 02:1d:00:da:50:97:c3:de:53:9c:c6:b3:68:91:b3:46: e4:64:c9:51:64:d6:d2:68:8d:ae:a1:0d:00:bf:dc Fingerprint (SHA-256): 8C:D7:24:60:57:7A:2F:DE:B5:79:3C:72:C8:6B:F1:27:D4:89:A2:36:5F:97:4C:86:28:2B:5A:64:3A:12:B6:27 Fingerprint (SHA1): E9:D1:B9:50:2D:E6:84:C8:82:43:79:07:7D:D9:54:DA:59:5E:E1:12 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9220: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064678 (0x670efa6) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:11:59 2016 Not After : Fri Jan 08 12:11:59 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 90:22:e0:2a:37:1d:64:3c:b6:e7:52:8a:f2:8e:11:e7: 58:1f:4b:0d:db:47:31:f7:4d:5d:66:b8:e3:8d:c6:7c: d0:44:80:90:6b:06:39:3e:a8:84:da:f5:f4:04:3a:cc: cc:ed:ae:44:6d:ed:b2:5a:6d:cf:05:13:f9:56:33:78: 5a:b5:f0:66:4f:48:7f:a0:34:4f:20:8e:b0:e2:69:96: 20:68:d8:fd:54:cb:2d:fe:dc:5e:c6:1f:49:c6:38:bf: 51:1f:fe:b0:1b:0a:87:e1:da:e7:ae:e6:3e:7b:5d:0d: 07:ee:cc:e4:10:9b:5d:b8:f2:05:09:4d:18:96:22:63: 38:a0:3b:2b:7a:e4:03:6f:03:86:c1:b7:4c:87:64:fc: e3:47:f6:1d:30:30:00:54:17:be:ee:3a:a9:06:17:fa: 85:40:10:4a:09:a4:aa:6b:5e:82:8c:56:69:61:96:30: 9c:a1:06:8e:53:71:72:4a:2a:6f:8c:3c:17:91:b8:26: 0a:3b:8b:9f:64:f7:b9:dd:56:30:f8:52:97:c8:08:00: 04:09:87:58:65:e0:24:6d:3d:8a:b1:15:0b:27:f0:74: d5:25:79:b4:10:6e:5a:8c:97:fe:0f:71:0b:17:31:f0: 09:09:06:e9:ee:d5:bb:dd:d8:d4:83:87:6b:ff:bd:4a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:46:10:f5:6f:9e:a7:6c:77:6c:20:7f:4c: 59:45:e2:81:86:50:50:af:f6:6d:36:7e:26:a1:db:7b: 02:1d:00:da:50:97:c3:de:53:9c:c6:b3:68:91:b3:46: e4:64:c9:51:64:d6:d2:68:8d:ae:a1:0d:00:bf:dc Fingerprint (SHA-256): 8C:D7:24:60:57:7A:2F:DE:B5:79:3C:72:C8:6B:F1:27:D4:89:A2:36:5F:97:4C:86:28:2B:5A:64:3A:12:B6:27 Fingerprint (SHA1): E9:D1:B9:50:2D:E6:84:C8:82:43:79:07:7D:D9:54:DA:59:5E:E1:12 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9221: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064678 (0x670efa6) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:11:59 2016 Not After : Fri Jan 08 12:11:59 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 90:22:e0:2a:37:1d:64:3c:b6:e7:52:8a:f2:8e:11:e7: 58:1f:4b:0d:db:47:31:f7:4d:5d:66:b8:e3:8d:c6:7c: d0:44:80:90:6b:06:39:3e:a8:84:da:f5:f4:04:3a:cc: cc:ed:ae:44:6d:ed:b2:5a:6d:cf:05:13:f9:56:33:78: 5a:b5:f0:66:4f:48:7f:a0:34:4f:20:8e:b0:e2:69:96: 20:68:d8:fd:54:cb:2d:fe:dc:5e:c6:1f:49:c6:38:bf: 51:1f:fe:b0:1b:0a:87:e1:da:e7:ae:e6:3e:7b:5d:0d: 07:ee:cc:e4:10:9b:5d:b8:f2:05:09:4d:18:96:22:63: 38:a0:3b:2b:7a:e4:03:6f:03:86:c1:b7:4c:87:64:fc: e3:47:f6:1d:30:30:00:54:17:be:ee:3a:a9:06:17:fa: 85:40:10:4a:09:a4:aa:6b:5e:82:8c:56:69:61:96:30: 9c:a1:06:8e:53:71:72:4a:2a:6f:8c:3c:17:91:b8:26: 0a:3b:8b:9f:64:f7:b9:dd:56:30:f8:52:97:c8:08:00: 04:09:87:58:65:e0:24:6d:3d:8a:b1:15:0b:27:f0:74: d5:25:79:b4:10:6e:5a:8c:97:fe:0f:71:0b:17:31:f0: 09:09:06:e9:ee:d5:bb:dd:d8:d4:83:87:6b:ff:bd:4a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:46:10:f5:6f:9e:a7:6c:77:6c:20:7f:4c: 59:45:e2:81:86:50:50:af:f6:6d:36:7e:26:a1:db:7b: 02:1d:00:da:50:97:c3:de:53:9c:c6:b3:68:91:b3:46: e4:64:c9:51:64:d6:d2:68:8d:ae:a1:0d:00:bf:dc Fingerprint (SHA-256): 8C:D7:24:60:57:7A:2F:DE:B5:79:3C:72:C8:6B:F1:27:D4:89:A2:36:5F:97:4C:86:28:2B:5A:64:3A:12:B6:27 Fingerprint (SHA1): E9:D1:B9:50:2D:E6:84:C8:82:43:79:07:7D:D9:54:DA:59:5E:E1:12 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #9222: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064678 (0x670efa6) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:11:59 2016 Not After : Fri Jan 08 12:11:59 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 90:22:e0:2a:37:1d:64:3c:b6:e7:52:8a:f2:8e:11:e7: 58:1f:4b:0d:db:47:31:f7:4d:5d:66:b8:e3:8d:c6:7c: d0:44:80:90:6b:06:39:3e:a8:84:da:f5:f4:04:3a:cc: cc:ed:ae:44:6d:ed:b2:5a:6d:cf:05:13:f9:56:33:78: 5a:b5:f0:66:4f:48:7f:a0:34:4f:20:8e:b0:e2:69:96: 20:68:d8:fd:54:cb:2d:fe:dc:5e:c6:1f:49:c6:38:bf: 51:1f:fe:b0:1b:0a:87:e1:da:e7:ae:e6:3e:7b:5d:0d: 07:ee:cc:e4:10:9b:5d:b8:f2:05:09:4d:18:96:22:63: 38:a0:3b:2b:7a:e4:03:6f:03:86:c1:b7:4c:87:64:fc: e3:47:f6:1d:30:30:00:54:17:be:ee:3a:a9:06:17:fa: 85:40:10:4a:09:a4:aa:6b:5e:82:8c:56:69:61:96:30: 9c:a1:06:8e:53:71:72:4a:2a:6f:8c:3c:17:91:b8:26: 0a:3b:8b:9f:64:f7:b9:dd:56:30:f8:52:97:c8:08:00: 04:09:87:58:65:e0:24:6d:3d:8a:b1:15:0b:27:f0:74: d5:25:79:b4:10:6e:5a:8c:97:fe:0f:71:0b:17:31:f0: 09:09:06:e9:ee:d5:bb:dd:d8:d4:83:87:6b:ff:bd:4a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:46:10:f5:6f:9e:a7:6c:77:6c:20:7f:4c: 59:45:e2:81:86:50:50:af:f6:6d:36:7e:26:a1:db:7b: 02:1d:00:da:50:97:c3:de:53:9c:c6:b3:68:91:b3:46: e4:64:c9:51:64:d6:d2:68:8d:ae:a1:0d:00:bf:dc Fingerprint (SHA-256): 8C:D7:24:60:57:7A:2F:DE:B5:79:3C:72:C8:6B:F1:27:D4:89:A2:36:5F:97:4C:86:28:2B:5A:64:3A:12:B6:27 Fingerprint (SHA1): E9:D1:B9:50:2D:E6:84:C8:82:43:79:07:7D:D9:54:DA:59:5E:E1:12 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #9223: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9224: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9225: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9226: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #9227: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9228: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9229: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9230: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9231: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9232: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9233: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9234: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #9235: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9236: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9237: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9238: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #9239: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9240: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9241: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9242: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9243: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9244: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9245: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9246: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #9247: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9248: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9249: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9250: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108121415Z nextupdate=20170108121416Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 12:14:15 2016 Next Update: Sun Jan 08 12:14:16 2017 CRL Extensions: chains.sh: #9251: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108121416Z nextupdate=20170108121416Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 12:14:16 2016 Next Update: Sun Jan 08 12:14:16 2017 CRL Extensions: chains.sh: #9252: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108121417Z nextupdate=20170108121417Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 12:14:17 2016 Next Update: Sun Jan 08 12:14:17 2017 CRL Extensions: chains.sh: #9253: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108121417Z nextupdate=20170108121417Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 12:14:17 2016 Next Update: Sun Jan 08 12:14:17 2017 CRL Extensions: chains.sh: #9254: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108121418Z addcert 14 20160108121418Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 12:14:18 2016 Next Update: Sun Jan 08 12:14:17 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Jan 08 12:14:18 2016 CRL Extensions: chains.sh: #9255: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108121419Z addcert 15 20160108121419Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 12:14:19 2016 Next Update: Sun Jan 08 12:14:16 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Jan 08 12:14:19 2016 CRL Extensions: chains.sh: #9256: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9257: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9258: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #9259: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #9260: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #9261: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #9262: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #9263: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #9264: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #9265: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:13:09 2016 Not After : Fri Jan 08 12:13:09 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:94:fd:a2:d3:5d:91:38:25:12:de:1c:9e:4e:0d:30: d2:fe:4c:6b:d8:51:d8:5c:fb:73:88:42:41:cf:03:05: c8:c0:65:50:56:0f:ff:d3:0a:bc:19:29:4e:a5:0e:00: 67:00:70:a2:21:17:5c:71:42:48:18:e9:61:8a:66:70: 89:c1:34:a1:ab:af:81:f2:58:6b:79:c5:7c:e8:d2:66: 64:71:f0:bb:de:d7:cf:3d:cd:8a:8c:4c:c9:6f:06:fe: 9b:5d:af:21:ad:a0:32:de:9b:40:58:d9:36:05:92:be: fb:70:c9:df:f5:25:89:9c:f5:c1:4e:fa:e4:2b:81:f4: 1a:7b:3d:9a:6b:69:17:e4:28:0b:87:be:2d:30:a7:85: d0:91:5a:db:1c:b4:5b:da:6d:75:de:0c:f5:7d:ff:a6: 8e:c0:1e:ab:db:78:ea:a8:cc:95:09:41:fc:7d:37:fd: a9:36:04:1e:42:93:c4:97:be:1c:b6:a4:5e:0f:ae:45: ae:ae:a3:4b:9f:98:18:fe:a4:d8:9c:ed:36:5b:36:6d: f7:58:a8:dd:15:36:af:64:11:c8:74:81:cf:b6:c7:11: 0c:0f:4a:3c:3a:e0:c2:f7:00:32:b3:3d:48:2c:0d:f8: 59:c4:50:f0:13:12:28:e5:c8:69:2f:fe:b6:95:b6:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:92:c3:1a:1c:c7:f3:27:5a:a4:ff:15:39:aa:dc:1a: 5b:9c:2e:5e:fd:c2:36:2b:fa:01:50:60:64:bc:d2:d1: 9a:33:ea:18:a4:67:97:3d:a2:4c:81:0c:78:e1:c6:ac: 71:09:24:b3:36:66:56:5e:10:cc:b5:ea:87:f2:04:4b: 5a:59:2f:6d:34:38:e3:cd:07:e2:22:c7:01:ae:67:e0: 98:64:ff:a8:51:da:ea:a6:a1:14:a3:71:99:f5:a2:cc: cf:b6:0d:68:24:88:b0:6d:d6:90:69:6f:dc:cb:15:89: 7f:17:ff:57:c7:6a:b3:95:22:b8:ea:8a:9b:f3:5d:0a: 83:0e:08:ff:0f:a7:60:e6:24:9e:dc:a7:19:d2:87:5f: 6c:d5:cd:e3:ef:4b:55:fa:33:8d:34:87:65:c9:cf:9e: 86:ac:aa:65:6a:e1:63:91:d0:3b:90:42:26:48:2b:96: a3:9a:4d:2f:11:c3:3e:80:4d:e2:0c:c6:cd:f3:51:19: 10:fd:cb:50:06:cf:01:2b:74:14:14:97:8b:42:03:3d: 06:88:6c:01:1a:d5:95:10:3f:ef:5d:df:7e:6c:ea:2a: 0f:26:af:9c:50:29:6d:e4:1a:23:8e:1d:0f:70:f4:50: b8:e9:7b:21:46:e7:a8:15:d2:9f:be:1c:34:60:82:7b Fingerprint (SHA-256): C6:81:27:36:BA:82:4C:1F:8D:CC:18:66:1A:B2:EE:FD:75:86:40:99:26:DE:A1:5F:7B:59:E9:63:9C:66:A0:0E Fingerprint (SHA1): 8E:A2:97:8E:E2:A3:1F:F2:E1:A7:DA:6F:5A:89:76:A1:F9:B3:57:87 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #9266: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #9267: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:13:09 2016 Not After : Fri Jan 08 12:13:09 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:94:fd:a2:d3:5d:91:38:25:12:de:1c:9e:4e:0d:30: d2:fe:4c:6b:d8:51:d8:5c:fb:73:88:42:41:cf:03:05: c8:c0:65:50:56:0f:ff:d3:0a:bc:19:29:4e:a5:0e:00: 67:00:70:a2:21:17:5c:71:42:48:18:e9:61:8a:66:70: 89:c1:34:a1:ab:af:81:f2:58:6b:79:c5:7c:e8:d2:66: 64:71:f0:bb:de:d7:cf:3d:cd:8a:8c:4c:c9:6f:06:fe: 9b:5d:af:21:ad:a0:32:de:9b:40:58:d9:36:05:92:be: fb:70:c9:df:f5:25:89:9c:f5:c1:4e:fa:e4:2b:81:f4: 1a:7b:3d:9a:6b:69:17:e4:28:0b:87:be:2d:30:a7:85: d0:91:5a:db:1c:b4:5b:da:6d:75:de:0c:f5:7d:ff:a6: 8e:c0:1e:ab:db:78:ea:a8:cc:95:09:41:fc:7d:37:fd: a9:36:04:1e:42:93:c4:97:be:1c:b6:a4:5e:0f:ae:45: ae:ae:a3:4b:9f:98:18:fe:a4:d8:9c:ed:36:5b:36:6d: f7:58:a8:dd:15:36:af:64:11:c8:74:81:cf:b6:c7:11: 0c:0f:4a:3c:3a:e0:c2:f7:00:32:b3:3d:48:2c:0d:f8: 59:c4:50:f0:13:12:28:e5:c8:69:2f:fe:b6:95:b6:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:92:c3:1a:1c:c7:f3:27:5a:a4:ff:15:39:aa:dc:1a: 5b:9c:2e:5e:fd:c2:36:2b:fa:01:50:60:64:bc:d2:d1: 9a:33:ea:18:a4:67:97:3d:a2:4c:81:0c:78:e1:c6:ac: 71:09:24:b3:36:66:56:5e:10:cc:b5:ea:87:f2:04:4b: 5a:59:2f:6d:34:38:e3:cd:07:e2:22:c7:01:ae:67:e0: 98:64:ff:a8:51:da:ea:a6:a1:14:a3:71:99:f5:a2:cc: cf:b6:0d:68:24:88:b0:6d:d6:90:69:6f:dc:cb:15:89: 7f:17:ff:57:c7:6a:b3:95:22:b8:ea:8a:9b:f3:5d:0a: 83:0e:08:ff:0f:a7:60:e6:24:9e:dc:a7:19:d2:87:5f: 6c:d5:cd:e3:ef:4b:55:fa:33:8d:34:87:65:c9:cf:9e: 86:ac:aa:65:6a:e1:63:91:d0:3b:90:42:26:48:2b:96: a3:9a:4d:2f:11:c3:3e:80:4d:e2:0c:c6:cd:f3:51:19: 10:fd:cb:50:06:cf:01:2b:74:14:14:97:8b:42:03:3d: 06:88:6c:01:1a:d5:95:10:3f:ef:5d:df:7e:6c:ea:2a: 0f:26:af:9c:50:29:6d:e4:1a:23:8e:1d:0f:70:f4:50: b8:e9:7b:21:46:e7:a8:15:d2:9f:be:1c:34:60:82:7b Fingerprint (SHA-256): C6:81:27:36:BA:82:4C:1F:8D:CC:18:66:1A:B2:EE:FD:75:86:40:99:26:DE:A1:5F:7B:59:E9:63:9C:66:A0:0E Fingerprint (SHA1): 8E:A2:97:8E:E2:A3:1F:F2:E1:A7:DA:6F:5A:89:76:A1:F9:B3:57:87 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #9268: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #9269: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9270: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064687 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9271: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9272: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #9273: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9274: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 108064688 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9275: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9276: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9277: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108064578.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #9278: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108064563.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9279: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9280: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #9281: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108064578.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #9282: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 108064689 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9283: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9284: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9285: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108064578.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #9286: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108064564.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9287: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9288: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #9289: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9290: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 108064690 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9291: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9292: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9293: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108064578.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #9294: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108064565.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9295: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9296: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9297: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108064578.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #9298: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108064566.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9299: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9300: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108121635Z nextupdate=20170108121635Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 12:16:35 2016 Next Update: Sun Jan 08 12:16:35 2017 CRL Extensions: chains.sh: #9301: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108121636Z nextupdate=20170108121636Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 12:16:36 2016 Next Update: Sun Jan 08 12:16:36 2017 CRL Extensions: chains.sh: #9302: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108121636Z nextupdate=20170108121636Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 12:16:36 2016 Next Update: Sun Jan 08 12:16:36 2017 CRL Extensions: chains.sh: #9303: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108121637Z nextupdate=20170108121637Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 12:16:37 2016 Next Update: Sun Jan 08 12:16:37 2017 CRL Extensions: chains.sh: #9304: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108121638Z addcert 20 20160108121638Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 12:16:38 2016 Next Update: Sun Jan 08 12:16:36 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 12:16:38 2016 CRL Extensions: chains.sh: #9305: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108121639Z addcert 40 20160108121639Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 12:16:39 2016 Next Update: Sun Jan 08 12:16:36 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 12:16:38 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 12:16:39 2016 CRL Extensions: chains.sh: #9306: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9307: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9308: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #9309: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064687 (0x670efaf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:14:38 2016 Not After : Fri Jan 08 12:14:38 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:3e:e3:5a:8c:b7:f6:13:e3:01:86:7b:e6:e1:98:23: 8c:a5:00:17:5b:b0:bb:70:c0:32:e2:dc:28:c5:40:b7: 0e:80:7d:81:43:bc:9a:b5:60:27:f2:6b:d2:a4:5f:34: 53:2b:e8:05:b2:8e:bf:fe:c6:8e:fb:a5:42:d2:b8:bc: 54:da:0b:7a:ce:28:3f:62:1c:fa:cc:95:e0:3c:f2:c4: a9:3e:4c:3f:bc:d6:ae:c9:5b:f6:9a:5e:ed:a4:e5:e2: f6:52:b9:89:36:da:e3:38:26:13:18:3d:32:71:e8:de: 4f:ad:ba:37:68:d0:5d:56:49:fb:b9:da:10:a2:3a:32: 86:c2:38:28:e7:b7:f5:d2:96:9e:27:7a:b4:b5:c8:ba: 18:0f:53:41:76:74:48:74:07:04:75:6b:4c:e3:59:e3: de:35:f5:11:20:72:04:82:46:f5:34:97:87:4d:21:c9: 67:07:cf:b5:73:75:36:3b:5b:8b:5e:b3:26:e6:77:7d: 1d:78:34:be:eb:44:f5:c6:8d:c1:c2:ba:f1:8c:ed:c3: d4:83:da:32:aa:43:cc:3f:45:70:8a:95:5e:c2:ae:36: 85:29:90:b7:ec:80:e7:53:43:0d:78:8d:41:2c:4d:b7: a2:e8:a6:f0:75:3a:9b:6c:39:6d:1d:98:cf:ff:eb:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:73:46:e9:a0:48:49:36:45:0b:85:23:3f:a4:a7:3c: 2b:9a:e1:ec:03:db:3b:f5:31:1c:f0:62:aa:aa:9d:fe: 72:dd:3f:a9:8a:0a:3a:f3:82:02:b4:37:3a:7e:74:40: a2:fc:17:73:5c:91:77:46:b3:7c:95:3b:8f:23:5d:12: 5b:35:81:a1:db:e5:1e:06:ec:cb:85:91:c7:cc:93:bf: bf:b3:40:1e:53:d4:9f:6e:84:da:63:76:bb:2f:f3:cd: 1e:0a:10:7b:2e:62:52:6b:26:83:26:b1:97:58:58:63: 99:d9:c4:02:7f:7e:fe:49:04:8d:8a:c9:e6:3c:2a:17: bb:15:62:f9:ce:3a:7d:3e:65:82:5f:2c:00:f7:54:c1: 21:98:2e:6d:c9:80:0b:8a:5f:6f:03:ab:9a:88:52:de: f8:d8:f1:5d:11:a2:ca:61:96:3c:1f:f6:98:87:00:c3: ed:78:35:14:40:0a:f9:a8:86:14:0d:df:a5:09:ee:e7: 99:4e:65:45:1f:02:f1:41:d5:b2:34:3e:f3:30:61:e0: 37:27:bc:cb:b5:b3:12:2f:b9:c2:b4:b1:58:76:1f:c7: 51:5c:3f:ad:1a:19:4a:a3:24:fb:cb:48:a5:c0:df:15: 03:7a:62:72:8e:cc:30:7a:6b:c8:0e:47:ad:f4:82:24 Fingerprint (SHA-256): AE:FB:AE:E7:33:19:70:2D:00:A3:33:16:B3:6A:90:E0:51:7A:55:B2:EA:0A:79:50:7F:A9:1F:61:9D:A9:64:5A Fingerprint (SHA1): 16:CA:DB:7D:3C:5F:07:72:2E:89:10:46:72:A8:0B:15:62:81:CC:CB Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #9310: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #9311: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064687 (0x670efaf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:14:38 2016 Not After : Fri Jan 08 12:14:38 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:3e:e3:5a:8c:b7:f6:13:e3:01:86:7b:e6:e1:98:23: 8c:a5:00:17:5b:b0:bb:70:c0:32:e2:dc:28:c5:40:b7: 0e:80:7d:81:43:bc:9a:b5:60:27:f2:6b:d2:a4:5f:34: 53:2b:e8:05:b2:8e:bf:fe:c6:8e:fb:a5:42:d2:b8:bc: 54:da:0b:7a:ce:28:3f:62:1c:fa:cc:95:e0:3c:f2:c4: a9:3e:4c:3f:bc:d6:ae:c9:5b:f6:9a:5e:ed:a4:e5:e2: f6:52:b9:89:36:da:e3:38:26:13:18:3d:32:71:e8:de: 4f:ad:ba:37:68:d0:5d:56:49:fb:b9:da:10:a2:3a:32: 86:c2:38:28:e7:b7:f5:d2:96:9e:27:7a:b4:b5:c8:ba: 18:0f:53:41:76:74:48:74:07:04:75:6b:4c:e3:59:e3: de:35:f5:11:20:72:04:82:46:f5:34:97:87:4d:21:c9: 67:07:cf:b5:73:75:36:3b:5b:8b:5e:b3:26:e6:77:7d: 1d:78:34:be:eb:44:f5:c6:8d:c1:c2:ba:f1:8c:ed:c3: d4:83:da:32:aa:43:cc:3f:45:70:8a:95:5e:c2:ae:36: 85:29:90:b7:ec:80:e7:53:43:0d:78:8d:41:2c:4d:b7: a2:e8:a6:f0:75:3a:9b:6c:39:6d:1d:98:cf:ff:eb:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:73:46:e9:a0:48:49:36:45:0b:85:23:3f:a4:a7:3c: 2b:9a:e1:ec:03:db:3b:f5:31:1c:f0:62:aa:aa:9d:fe: 72:dd:3f:a9:8a:0a:3a:f3:82:02:b4:37:3a:7e:74:40: a2:fc:17:73:5c:91:77:46:b3:7c:95:3b:8f:23:5d:12: 5b:35:81:a1:db:e5:1e:06:ec:cb:85:91:c7:cc:93:bf: bf:b3:40:1e:53:d4:9f:6e:84:da:63:76:bb:2f:f3:cd: 1e:0a:10:7b:2e:62:52:6b:26:83:26:b1:97:58:58:63: 99:d9:c4:02:7f:7e:fe:49:04:8d:8a:c9:e6:3c:2a:17: bb:15:62:f9:ce:3a:7d:3e:65:82:5f:2c:00:f7:54:c1: 21:98:2e:6d:c9:80:0b:8a:5f:6f:03:ab:9a:88:52:de: f8:d8:f1:5d:11:a2:ca:61:96:3c:1f:f6:98:87:00:c3: ed:78:35:14:40:0a:f9:a8:86:14:0d:df:a5:09:ee:e7: 99:4e:65:45:1f:02:f1:41:d5:b2:34:3e:f3:30:61:e0: 37:27:bc:cb:b5:b3:12:2f:b9:c2:b4:b1:58:76:1f:c7: 51:5c:3f:ad:1a:19:4a:a3:24:fb:cb:48:a5:c0:df:15: 03:7a:62:72:8e:cc:30:7a:6b:c8:0e:47:ad:f4:82:24 Fingerprint (SHA-256): AE:FB:AE:E7:33:19:70:2D:00:A3:33:16:B3:6A:90:E0:51:7A:55:B2:EA:0A:79:50:7F:A9:1F:61:9D:A9:64:5A Fingerprint (SHA1): 16:CA:DB:7D:3C:5F:07:72:2E:89:10:46:72:A8:0B:15:62:81:CC:CB Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #9312: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #9313: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #9314: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064691 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9315: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #9316: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9317: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9318: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108064692 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9319: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9320: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9321: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9322: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108064693 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9323: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9324: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9325: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9326: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 108064694 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9327: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9328: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #9329: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064695 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9330: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #9331: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #9332: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9333: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 108064696 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9334: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9335: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9336: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9337: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 108064697 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9338: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9339: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #9340: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #9341: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #9342: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064691 (0x670efb3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:16:59 2016 Not After : Fri Jan 08 12:16:59 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:ab:57:a0:3e:bf:3e:47:20:05:f4:41:06:5b:e9:60: bf:4d:50:e5:a1:5e:94:59:05:c1:09:8b:d4:db:bd:b6: f5:a1:80:28:7e:56:b8:1a:15:d4:e0:71:00:1e:44:77: 48:0e:e0:f5:51:a6:ec:5f:42:f1:6e:4b:22:2b:a9:77: bb:e5:77:88:07:28:8e:bb:6c:94:ed:be:2e:62:60:57: 7c:fd:e8:cb:10:8f:14:27:64:6f:e4:8a:b0:47:21:55: b6:86:a3:97:55:8f:64:92:d2:7c:d1:7a:0d:c6:cb:a2: f4:27:e8:2f:e9:9d:f6:fd:e5:92:3f:ae:ec:84:b6:2d: 02:4f:78:33:34:70:2e:2b:98:d1:cf:20:10:0e:a9:12: a9:12:6a:b7:b6:e9:21:80:9d:d0:1e:a9:4d:3d:96:43: 6a:ad:b1:b9:6d:5d:da:61:98:c1:0c:2c:bc:df:9b:a0: ce:67:b3:56:35:69:fe:dc:dc:8b:97:62:d6:02:bf:b9: 09:01:30:ea:e5:bc:7e:80:63:9d:9d:82:03:12:cd:73: 0e:b9:37:46:11:4f:cd:e4:7c:22:30:5a:ea:7a:0c:cc: 6c:1d:4c:d0:34:cb:27:4b:f9:50:ef:02:f1:1b:45:4a: b2:04:e5:5c:4a:bf:33:da:99:4e:1c:e2:60:8e:52:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:5b:86:c6:d6:47:4e:5c:02:d3:d5:fd:cf:67:33:94: 05:f3:2c:9c:02:d3:31:3d:23:c7:06:16:cf:d3:c0:0f: 18:00:68:35:3e:38:3a:99:4e:67:e3:eb:f7:97:71:dc: 9f:c5:55:84:91:32:bc:d3:8e:70:1d:85:fb:c3:9a:dd: bc:c5:77:a4:b0:ff:f6:72:8a:08:8d:30:c8:fc:31:2d: dd:64:7c:fd:4f:c1:3a:97:16:04:fa:42:33:a0:c5:ed: 5f:26:10:3f:36:d5:5e:ec:6b:30:15:9b:1f:b8:66:49: e1:69:27:50:2d:a4:cf:74:2d:f7:07:53:a7:d4:7c:54: 7a:3c:29:24:ba:33:d7:81:3f:59:4d:d4:2e:0b:b7:a6: 3a:41:03:cf:a2:09:01:9a:f8:41:19:44:cb:30:2c:37: df:e6:f8:bf:ec:26:94:2d:6b:c0:04:65:73:db:0a:41: 9b:c1:54:a3:a9:2c:9f:60:32:b3:5e:ad:87:2f:c1:76: 38:53:79:6e:a8:78:72:a3:f3:db:e2:73:6e:77:80:7b: bb:80:b4:50:64:9e:1a:2a:2a:1f:ac:62:f4:7c:be:f2: ea:d1:88:d6:c2:38:0a:ff:67:b6:1c:09:14:84:38:02: 1e:d2:dd:94:ab:e9:66:44:4c:6f:1b:1a:a5:d6:1d:ea Fingerprint (SHA-256): 05:5B:38:AE:09:A9:36:A6:16:9C:23:8C:CA:8F:A0:FF:84:9C:D8:C7:E1:D0:7D:3D:0A:54:73:37:03:55:D8:32 Fingerprint (SHA1): 5E:EF:4C:79:78:65:96:EF:21:A7:51:C5:3F:F9:4C:BE:CD:30:ED:10 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9343: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064693 (0x670efb5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 12:17:15 2016 Not After : Fri Jan 08 12:17:15 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:da:cf:1f:7f:81:c1:bb:63:58:21:22:42:20:46:1d: c2:08:4a:73:e0:c2:80:e0:db:7d:bf:10:2e:ab:49:6e: ca:0f:9a:62:b8:ba:0e:de:9f:53:99:b3:f7:f6:38:9f: 69:f5:f4:2f:0c:dc:9b:50:1a:fb:a5:8d:e8:cf:21:3a: 46:ac:94:3a:66:41:f6:c6:89:55:4e:4d:23:d0:59:a3: d5:fb:dd:22:1d:d8:ab:34:fe:5b:00:51:bd:15:c0:44: 3c:ed:6e:34:0a:a9:91:95:02:05:97:15:49:82:f8:70: 86:db:bb:25:2c:5b:b0:f6:23:c0:be:b6:1c:a5:7c:a3: f1:9b:a7:6f:a1:cf:c0:de:25:2c:ff:eb:df:f2:ec:66: 10:c4:f7:7d:52:b4:f2:6d:a4:11:83:55:4f:3a:03:56: 03:a7:28:5c:a6:75:01:88:41:a9:5d:83:7d:de:7a:c7: c9:67:b7:b4:db:f0:7f:c3:f5:6c:29:dd:aa:48:12:2c: 37:74:b0:09:cb:8f:de:ae:20:d5:ae:e1:a8:8e:1e:7b: c9:b8:49:4a:ce:d3:3c:e3:0b:8e:95:b6:f1:1c:c0:a9: 90:5d:bc:be:9b:aa:74:f1:ba:65:29:f2:5e:bf:b3:4b: 05:03:10:84:c5:fc:24:6d:0c:15:4d:cb:5b:8a:84:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:ae:46:fc:8f:eb:f1:09:fd:b5:6c:f3:dc:e3:cc:8e: d7:25:b1:f6:cd:99:41:50:6e:3e:df:7a:11:f9:e1:fd: 78:ea:76:f6:98:f0:96:ab:c5:d9:5e:a5:68:73:bd:94: 5c:87:ff:b6:f2:f5:68:c6:3b:ec:3b:fa:b4:35:30:65: 1f:f1:18:c0:b4:11:c7:47:3f:50:4b:e0:8c:b0:d0:a1: 63:06:43:f8:61:f7:a8:ed:e3:6d:34:e6:c2:f7:45:92: db:f8:c6:be:e6:6c:b4:f9:a9:fd:16:ae:93:ad:0f:9f: 89:3f:20:ec:b6:5f:e6:a7:16:5e:6a:73:09:a9:26:0e: 64:a4:19:1a:68:e7:5b:c8:35:98:aa:9b:54:fc:4c:a4: 19:a6:4d:40:50:7b:a8:02:ae:15:ba:24:9b:49:2a:51: 7e:e9:1a:98:1a:39:e9:3a:29:c1:6a:0c:03:3b:22:6a: 75:bd:a0:e6:7c:35:b4:ba:12:0f:07:29:40:d4:f8:41: 4c:47:70:83:bc:cb:53:29:8c:60:bf:ba:6b:43:b1:7a: 43:7f:2e:ba:b5:10:79:31:a4:04:8f:64:0c:4f:a1:d6: 2c:0a:74:e1:b2:a0:51:a2:a4:a2:67:2d:e5:e6:3a:f8: 2d:15:07:bf:8e:05:1b:e7:f6:4d:e5:58:72:ca:1e:94 Fingerprint (SHA-256): F5:15:6F:24:5F:8B:6E:A2:49:AA:4E:A4:AA:A2:41:B1:08:DF:B9:D6:9E:EF:23:35:8C:FC:20:A4:7B:A1:BC:B6 Fingerprint (SHA1): C9:D9:0B:F2:41:8C:D4:95:3D:52:1D:8C:E6:6D:89:F5:4F:61:96:D7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #9344: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064691 (0x670efb3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:16:59 2016 Not After : Fri Jan 08 12:16:59 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:ab:57:a0:3e:bf:3e:47:20:05:f4:41:06:5b:e9:60: bf:4d:50:e5:a1:5e:94:59:05:c1:09:8b:d4:db:bd:b6: f5:a1:80:28:7e:56:b8:1a:15:d4:e0:71:00:1e:44:77: 48:0e:e0:f5:51:a6:ec:5f:42:f1:6e:4b:22:2b:a9:77: bb:e5:77:88:07:28:8e:bb:6c:94:ed:be:2e:62:60:57: 7c:fd:e8:cb:10:8f:14:27:64:6f:e4:8a:b0:47:21:55: b6:86:a3:97:55:8f:64:92:d2:7c:d1:7a:0d:c6:cb:a2: f4:27:e8:2f:e9:9d:f6:fd:e5:92:3f:ae:ec:84:b6:2d: 02:4f:78:33:34:70:2e:2b:98:d1:cf:20:10:0e:a9:12: a9:12:6a:b7:b6:e9:21:80:9d:d0:1e:a9:4d:3d:96:43: 6a:ad:b1:b9:6d:5d:da:61:98:c1:0c:2c:bc:df:9b:a0: ce:67:b3:56:35:69:fe:dc:dc:8b:97:62:d6:02:bf:b9: 09:01:30:ea:e5:bc:7e:80:63:9d:9d:82:03:12:cd:73: 0e:b9:37:46:11:4f:cd:e4:7c:22:30:5a:ea:7a:0c:cc: 6c:1d:4c:d0:34:cb:27:4b:f9:50:ef:02:f1:1b:45:4a: b2:04:e5:5c:4a:bf:33:da:99:4e:1c:e2:60:8e:52:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:5b:86:c6:d6:47:4e:5c:02:d3:d5:fd:cf:67:33:94: 05:f3:2c:9c:02:d3:31:3d:23:c7:06:16:cf:d3:c0:0f: 18:00:68:35:3e:38:3a:99:4e:67:e3:eb:f7:97:71:dc: 9f:c5:55:84:91:32:bc:d3:8e:70:1d:85:fb:c3:9a:dd: bc:c5:77:a4:b0:ff:f6:72:8a:08:8d:30:c8:fc:31:2d: dd:64:7c:fd:4f:c1:3a:97:16:04:fa:42:33:a0:c5:ed: 5f:26:10:3f:36:d5:5e:ec:6b:30:15:9b:1f:b8:66:49: e1:69:27:50:2d:a4:cf:74:2d:f7:07:53:a7:d4:7c:54: 7a:3c:29:24:ba:33:d7:81:3f:59:4d:d4:2e:0b:b7:a6: 3a:41:03:cf:a2:09:01:9a:f8:41:19:44:cb:30:2c:37: df:e6:f8:bf:ec:26:94:2d:6b:c0:04:65:73:db:0a:41: 9b:c1:54:a3:a9:2c:9f:60:32:b3:5e:ad:87:2f:c1:76: 38:53:79:6e:a8:78:72:a3:f3:db:e2:73:6e:77:80:7b: bb:80:b4:50:64:9e:1a:2a:2a:1f:ac:62:f4:7c:be:f2: ea:d1:88:d6:c2:38:0a:ff:67:b6:1c:09:14:84:38:02: 1e:d2:dd:94:ab:e9:66:44:4c:6f:1b:1a:a5:d6:1d:ea Fingerprint (SHA-256): 05:5B:38:AE:09:A9:36:A6:16:9C:23:8C:CA:8F:A0:FF:84:9C:D8:C7:E1:D0:7D:3D:0A:54:73:37:03:55:D8:32 Fingerprint (SHA1): 5E:EF:4C:79:78:65:96:EF:21:A7:51:C5:3F:F9:4C:BE:CD:30:ED:10 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9345: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #9346: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064691 (0x670efb3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:16:59 2016 Not After : Fri Jan 08 12:16:59 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:ab:57:a0:3e:bf:3e:47:20:05:f4:41:06:5b:e9:60: bf:4d:50:e5:a1:5e:94:59:05:c1:09:8b:d4:db:bd:b6: f5:a1:80:28:7e:56:b8:1a:15:d4:e0:71:00:1e:44:77: 48:0e:e0:f5:51:a6:ec:5f:42:f1:6e:4b:22:2b:a9:77: bb:e5:77:88:07:28:8e:bb:6c:94:ed:be:2e:62:60:57: 7c:fd:e8:cb:10:8f:14:27:64:6f:e4:8a:b0:47:21:55: b6:86:a3:97:55:8f:64:92:d2:7c:d1:7a:0d:c6:cb:a2: f4:27:e8:2f:e9:9d:f6:fd:e5:92:3f:ae:ec:84:b6:2d: 02:4f:78:33:34:70:2e:2b:98:d1:cf:20:10:0e:a9:12: a9:12:6a:b7:b6:e9:21:80:9d:d0:1e:a9:4d:3d:96:43: 6a:ad:b1:b9:6d:5d:da:61:98:c1:0c:2c:bc:df:9b:a0: ce:67:b3:56:35:69:fe:dc:dc:8b:97:62:d6:02:bf:b9: 09:01:30:ea:e5:bc:7e:80:63:9d:9d:82:03:12:cd:73: 0e:b9:37:46:11:4f:cd:e4:7c:22:30:5a:ea:7a:0c:cc: 6c:1d:4c:d0:34:cb:27:4b:f9:50:ef:02:f1:1b:45:4a: b2:04:e5:5c:4a:bf:33:da:99:4e:1c:e2:60:8e:52:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:5b:86:c6:d6:47:4e:5c:02:d3:d5:fd:cf:67:33:94: 05:f3:2c:9c:02:d3:31:3d:23:c7:06:16:cf:d3:c0:0f: 18:00:68:35:3e:38:3a:99:4e:67:e3:eb:f7:97:71:dc: 9f:c5:55:84:91:32:bc:d3:8e:70:1d:85:fb:c3:9a:dd: bc:c5:77:a4:b0:ff:f6:72:8a:08:8d:30:c8:fc:31:2d: dd:64:7c:fd:4f:c1:3a:97:16:04:fa:42:33:a0:c5:ed: 5f:26:10:3f:36:d5:5e:ec:6b:30:15:9b:1f:b8:66:49: e1:69:27:50:2d:a4:cf:74:2d:f7:07:53:a7:d4:7c:54: 7a:3c:29:24:ba:33:d7:81:3f:59:4d:d4:2e:0b:b7:a6: 3a:41:03:cf:a2:09:01:9a:f8:41:19:44:cb:30:2c:37: df:e6:f8:bf:ec:26:94:2d:6b:c0:04:65:73:db:0a:41: 9b:c1:54:a3:a9:2c:9f:60:32:b3:5e:ad:87:2f:c1:76: 38:53:79:6e:a8:78:72:a3:f3:db:e2:73:6e:77:80:7b: bb:80:b4:50:64:9e:1a:2a:2a:1f:ac:62:f4:7c:be:f2: ea:d1:88:d6:c2:38:0a:ff:67:b6:1c:09:14:84:38:02: 1e:d2:dd:94:ab:e9:66:44:4c:6f:1b:1a:a5:d6:1d:ea Fingerprint (SHA-256): 05:5B:38:AE:09:A9:36:A6:16:9C:23:8C:CA:8F:A0:FF:84:9C:D8:C7:E1:D0:7D:3D:0A:54:73:37:03:55:D8:32 Fingerprint (SHA1): 5E:EF:4C:79:78:65:96:EF:21:A7:51:C5:3F:F9:4C:BE:CD:30:ED:10 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9347: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064693 (0x670efb5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 12:17:15 2016 Not After : Fri Jan 08 12:17:15 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:da:cf:1f:7f:81:c1:bb:63:58:21:22:42:20:46:1d: c2:08:4a:73:e0:c2:80:e0:db:7d:bf:10:2e:ab:49:6e: ca:0f:9a:62:b8:ba:0e:de:9f:53:99:b3:f7:f6:38:9f: 69:f5:f4:2f:0c:dc:9b:50:1a:fb:a5:8d:e8:cf:21:3a: 46:ac:94:3a:66:41:f6:c6:89:55:4e:4d:23:d0:59:a3: d5:fb:dd:22:1d:d8:ab:34:fe:5b:00:51:bd:15:c0:44: 3c:ed:6e:34:0a:a9:91:95:02:05:97:15:49:82:f8:70: 86:db:bb:25:2c:5b:b0:f6:23:c0:be:b6:1c:a5:7c:a3: f1:9b:a7:6f:a1:cf:c0:de:25:2c:ff:eb:df:f2:ec:66: 10:c4:f7:7d:52:b4:f2:6d:a4:11:83:55:4f:3a:03:56: 03:a7:28:5c:a6:75:01:88:41:a9:5d:83:7d:de:7a:c7: c9:67:b7:b4:db:f0:7f:c3:f5:6c:29:dd:aa:48:12:2c: 37:74:b0:09:cb:8f:de:ae:20:d5:ae:e1:a8:8e:1e:7b: c9:b8:49:4a:ce:d3:3c:e3:0b:8e:95:b6:f1:1c:c0:a9: 90:5d:bc:be:9b:aa:74:f1:ba:65:29:f2:5e:bf:b3:4b: 05:03:10:84:c5:fc:24:6d:0c:15:4d:cb:5b:8a:84:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:ae:46:fc:8f:eb:f1:09:fd:b5:6c:f3:dc:e3:cc:8e: d7:25:b1:f6:cd:99:41:50:6e:3e:df:7a:11:f9:e1:fd: 78:ea:76:f6:98:f0:96:ab:c5:d9:5e:a5:68:73:bd:94: 5c:87:ff:b6:f2:f5:68:c6:3b:ec:3b:fa:b4:35:30:65: 1f:f1:18:c0:b4:11:c7:47:3f:50:4b:e0:8c:b0:d0:a1: 63:06:43:f8:61:f7:a8:ed:e3:6d:34:e6:c2:f7:45:92: db:f8:c6:be:e6:6c:b4:f9:a9:fd:16:ae:93:ad:0f:9f: 89:3f:20:ec:b6:5f:e6:a7:16:5e:6a:73:09:a9:26:0e: 64:a4:19:1a:68:e7:5b:c8:35:98:aa:9b:54:fc:4c:a4: 19:a6:4d:40:50:7b:a8:02:ae:15:ba:24:9b:49:2a:51: 7e:e9:1a:98:1a:39:e9:3a:29:c1:6a:0c:03:3b:22:6a: 75:bd:a0:e6:7c:35:b4:ba:12:0f:07:29:40:d4:f8:41: 4c:47:70:83:bc:cb:53:29:8c:60:bf:ba:6b:43:b1:7a: 43:7f:2e:ba:b5:10:79:31:a4:04:8f:64:0c:4f:a1:d6: 2c:0a:74:e1:b2:a0:51:a2:a4:a2:67:2d:e5:e6:3a:f8: 2d:15:07:bf:8e:05:1b:e7:f6:4d:e5:58:72:ca:1e:94 Fingerprint (SHA-256): F5:15:6F:24:5F:8B:6E:A2:49:AA:4E:A4:AA:A2:41:B1:08:DF:B9:D6:9E:EF:23:35:8C:FC:20:A4:7B:A1:BC:B6 Fingerprint (SHA1): C9:D9:0B:F2:41:8C:D4:95:3D:52:1D:8C:E6:6D:89:F5:4F:61:96:D7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #9348: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #9349: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #9350: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #9351: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064691 (0x670efb3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:16:59 2016 Not After : Fri Jan 08 12:16:59 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:ab:57:a0:3e:bf:3e:47:20:05:f4:41:06:5b:e9:60: bf:4d:50:e5:a1:5e:94:59:05:c1:09:8b:d4:db:bd:b6: f5:a1:80:28:7e:56:b8:1a:15:d4:e0:71:00:1e:44:77: 48:0e:e0:f5:51:a6:ec:5f:42:f1:6e:4b:22:2b:a9:77: bb:e5:77:88:07:28:8e:bb:6c:94:ed:be:2e:62:60:57: 7c:fd:e8:cb:10:8f:14:27:64:6f:e4:8a:b0:47:21:55: b6:86:a3:97:55:8f:64:92:d2:7c:d1:7a:0d:c6:cb:a2: f4:27:e8:2f:e9:9d:f6:fd:e5:92:3f:ae:ec:84:b6:2d: 02:4f:78:33:34:70:2e:2b:98:d1:cf:20:10:0e:a9:12: a9:12:6a:b7:b6:e9:21:80:9d:d0:1e:a9:4d:3d:96:43: 6a:ad:b1:b9:6d:5d:da:61:98:c1:0c:2c:bc:df:9b:a0: ce:67:b3:56:35:69:fe:dc:dc:8b:97:62:d6:02:bf:b9: 09:01:30:ea:e5:bc:7e:80:63:9d:9d:82:03:12:cd:73: 0e:b9:37:46:11:4f:cd:e4:7c:22:30:5a:ea:7a:0c:cc: 6c:1d:4c:d0:34:cb:27:4b:f9:50:ef:02:f1:1b:45:4a: b2:04:e5:5c:4a:bf:33:da:99:4e:1c:e2:60:8e:52:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:5b:86:c6:d6:47:4e:5c:02:d3:d5:fd:cf:67:33:94: 05:f3:2c:9c:02:d3:31:3d:23:c7:06:16:cf:d3:c0:0f: 18:00:68:35:3e:38:3a:99:4e:67:e3:eb:f7:97:71:dc: 9f:c5:55:84:91:32:bc:d3:8e:70:1d:85:fb:c3:9a:dd: bc:c5:77:a4:b0:ff:f6:72:8a:08:8d:30:c8:fc:31:2d: dd:64:7c:fd:4f:c1:3a:97:16:04:fa:42:33:a0:c5:ed: 5f:26:10:3f:36:d5:5e:ec:6b:30:15:9b:1f:b8:66:49: e1:69:27:50:2d:a4:cf:74:2d:f7:07:53:a7:d4:7c:54: 7a:3c:29:24:ba:33:d7:81:3f:59:4d:d4:2e:0b:b7:a6: 3a:41:03:cf:a2:09:01:9a:f8:41:19:44:cb:30:2c:37: df:e6:f8:bf:ec:26:94:2d:6b:c0:04:65:73:db:0a:41: 9b:c1:54:a3:a9:2c:9f:60:32:b3:5e:ad:87:2f:c1:76: 38:53:79:6e:a8:78:72:a3:f3:db:e2:73:6e:77:80:7b: bb:80:b4:50:64:9e:1a:2a:2a:1f:ac:62:f4:7c:be:f2: ea:d1:88:d6:c2:38:0a:ff:67:b6:1c:09:14:84:38:02: 1e:d2:dd:94:ab:e9:66:44:4c:6f:1b:1a:a5:d6:1d:ea Fingerprint (SHA-256): 05:5B:38:AE:09:A9:36:A6:16:9C:23:8C:CA:8F:A0:FF:84:9C:D8:C7:E1:D0:7D:3D:0A:54:73:37:03:55:D8:32 Fingerprint (SHA1): 5E:EF:4C:79:78:65:96:EF:21:A7:51:C5:3F:F9:4C:BE:CD:30:ED:10 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9352: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064695 (0x670efb7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 12:17:52 2016 Not After : Fri Jan 08 12:17:52 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:82:57:0c:89:36:d1:80:5f:f9:e0:a5:df:fc:00:30: 09:86:73:6f:04:c7:8b:50:73:6e:c0:32:d4:a9:6a:9d: 16:bc:8b:c1:ae:bb:af:dc:aa:77:ea:c9:dc:85:a2:3c: 11:0b:88:98:8f:07:52:ec:d4:55:fe:7b:96:98:ff:aa: 91:4a:c4:00:ac:dd:42:1c:2b:e3:cc:1d:eb:19:b0:e6: a3:45:a1:2f:ec:db:82:e8:55:e5:82:94:b4:2f:ac:46: 66:43:67:99:d9:47:75:24:8e:11:1d:c5:c2:fb:d7:24: 3c:9a:3e:70:8f:7d:6e:ba:88:c3:da:dc:46:6e:44:35: 10:87:e8:88:fe:e5:68:d2:fc:b7:72:d6:c7:f2:e2:52: df:e3:1f:69:37:c3:64:95:3e:b0:44:f0:f9:22:5e:04: 4c:de:b9:99:92:ef:af:05:d7:b4:cd:7f:1f:5f:a0:7f: 35:c0:7c:32:a1:f2:eb:13:d1:b1:f0:48:5e:76:58:5f: 58:93:90:85:ed:68:90:a8:c3:3c:99:c5:84:03:ec:11: 9d:f7:86:2a:37:9a:1b:43:53:ba:40:0b:b7:90:9e:a4: 62:0d:b5:34:ee:2c:ad:be:fd:a0:cd:25:ab:96:dd:38: a0:7c:b9:1e:8c:00:d9:36:5a:c4:f5:df:3e:ad:06:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:dd:05:7b:9b:c5:eb:ee:88:8e:81:2f:6e:a0:07:0f: ab:f8:f7:73:23:a4:09:41:c7:ae:62:fc:04:5f:b3:68: be:b9:79:90:9f:fa:0c:a9:30:9e:d1:07:e4:a4:50:01: 10:d4:b7:3b:64:91:3b:41:f9:06:e4:12:c2:81:29:74: 76:0e:f4:3e:d1:78:90:03:7d:75:4b:45:1e:32:cb:cb: f9:c8:5c:45:f2:d8:e3:c6:5a:ee:08:1b:95:b5:d6:a6: 81:79:35:c8:bf:ab:01:8f:ae:90:38:5c:c2:b4:ce:e5: c3:ca:11:b8:d2:6f:5a:84:a6:11:67:ab:30:2f:3b:40: 51:59:54:3e:78:a1:79:94:fc:e7:b1:f0:7e:a1:a2:eb: b7:84:bb:52:6a:d0:05:f8:a9:35:14:42:e9:95:d4:e8: cd:ff:70:72:21:17:27:ce:27:4e:28:f2:82:7a:d5:12: 56:8b:e1:28:96:37:22:15:7e:9b:37:2f:b7:b6:90:52: 9d:2f:2e:d0:db:b6:a2:b6:91:06:5e:95:2c:00:09:68: 99:25:58:a3:ca:9e:00:85:eb:cb:42:66:e3:d2:a8:ee: 6b:d0:3d:c0:36:eb:9a:5a:54:40:13:95:17:50:20:e9: 00:8e:bb:25:78:80:f9:86:2c:67:1f:64:57:03:0b:98 Fingerprint (SHA-256): 67:9B:FC:40:74:34:39:6D:C4:E9:AD:D6:D8:2B:6B:C6:E3:06:E0:00:EF:C0:5B:08:82:63:13:58:84:B4:DF:FC Fingerprint (SHA1): 72:DA:78:C7:0B:7A:70:FA:A2:EC:FB:FD:47:4D:B2:C5:30:E5:A2:B0 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #9353: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064691 (0x670efb3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:16:59 2016 Not After : Fri Jan 08 12:16:59 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:ab:57:a0:3e:bf:3e:47:20:05:f4:41:06:5b:e9:60: bf:4d:50:e5:a1:5e:94:59:05:c1:09:8b:d4:db:bd:b6: f5:a1:80:28:7e:56:b8:1a:15:d4:e0:71:00:1e:44:77: 48:0e:e0:f5:51:a6:ec:5f:42:f1:6e:4b:22:2b:a9:77: bb:e5:77:88:07:28:8e:bb:6c:94:ed:be:2e:62:60:57: 7c:fd:e8:cb:10:8f:14:27:64:6f:e4:8a:b0:47:21:55: b6:86:a3:97:55:8f:64:92:d2:7c:d1:7a:0d:c6:cb:a2: f4:27:e8:2f:e9:9d:f6:fd:e5:92:3f:ae:ec:84:b6:2d: 02:4f:78:33:34:70:2e:2b:98:d1:cf:20:10:0e:a9:12: a9:12:6a:b7:b6:e9:21:80:9d:d0:1e:a9:4d:3d:96:43: 6a:ad:b1:b9:6d:5d:da:61:98:c1:0c:2c:bc:df:9b:a0: ce:67:b3:56:35:69:fe:dc:dc:8b:97:62:d6:02:bf:b9: 09:01:30:ea:e5:bc:7e:80:63:9d:9d:82:03:12:cd:73: 0e:b9:37:46:11:4f:cd:e4:7c:22:30:5a:ea:7a:0c:cc: 6c:1d:4c:d0:34:cb:27:4b:f9:50:ef:02:f1:1b:45:4a: b2:04:e5:5c:4a:bf:33:da:99:4e:1c:e2:60:8e:52:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:5b:86:c6:d6:47:4e:5c:02:d3:d5:fd:cf:67:33:94: 05:f3:2c:9c:02:d3:31:3d:23:c7:06:16:cf:d3:c0:0f: 18:00:68:35:3e:38:3a:99:4e:67:e3:eb:f7:97:71:dc: 9f:c5:55:84:91:32:bc:d3:8e:70:1d:85:fb:c3:9a:dd: bc:c5:77:a4:b0:ff:f6:72:8a:08:8d:30:c8:fc:31:2d: dd:64:7c:fd:4f:c1:3a:97:16:04:fa:42:33:a0:c5:ed: 5f:26:10:3f:36:d5:5e:ec:6b:30:15:9b:1f:b8:66:49: e1:69:27:50:2d:a4:cf:74:2d:f7:07:53:a7:d4:7c:54: 7a:3c:29:24:ba:33:d7:81:3f:59:4d:d4:2e:0b:b7:a6: 3a:41:03:cf:a2:09:01:9a:f8:41:19:44:cb:30:2c:37: df:e6:f8:bf:ec:26:94:2d:6b:c0:04:65:73:db:0a:41: 9b:c1:54:a3:a9:2c:9f:60:32:b3:5e:ad:87:2f:c1:76: 38:53:79:6e:a8:78:72:a3:f3:db:e2:73:6e:77:80:7b: bb:80:b4:50:64:9e:1a:2a:2a:1f:ac:62:f4:7c:be:f2: ea:d1:88:d6:c2:38:0a:ff:67:b6:1c:09:14:84:38:02: 1e:d2:dd:94:ab:e9:66:44:4c:6f:1b:1a:a5:d6:1d:ea Fingerprint (SHA-256): 05:5B:38:AE:09:A9:36:A6:16:9C:23:8C:CA:8F:A0:FF:84:9C:D8:C7:E1:D0:7D:3D:0A:54:73:37:03:55:D8:32 Fingerprint (SHA1): 5E:EF:4C:79:78:65:96:EF:21:A7:51:C5:3F:F9:4C:BE:CD:30:ED:10 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9354: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #9355: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #9356: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #9357: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #9358: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #9359: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064696 (0x670efb8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 12:18:06 2016 Not After : Fri Jan 08 12:18:06 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:ed:5c:05:6e:e4:e1:27:ad:ad:cb:06:c3:d7:9b:c6: f0:96:4a:8c:09:96:57:98:2e:c3:b4:33:12:3e:1a:9d: 9a:42:de:a8:d7:ec:59:3f:85:d4:5b:dd:d4:b7:6f:55: 58:de:8b:1a:3a:f1:19:64:1f:e2:c5:d2:fb:13:3e:1d: 6b:6c:f2:36:1b:e7:17:62:05:11:40:bf:36:a6:b2:b5: df:40:42:89:16:2e:2e:7f:17:29:d0:ed:fc:24:6d:b7: 71:ea:03:7f:7d:a2:42:77:7d:e4:8c:bc:e1:81:fe:cd: 69:80:11:5d:de:32:06:9e:94:f3:96:6b:89:c8:1f:7b: dc:68:96:d3:22:f0:c8:0a:4d:48:bb:07:84:7f:5c:d8: 38:97:f2:09:58:92:51:a0:32:1c:93:50:bc:05:95:00: 66:b8:76:7e:d4:55:5e:2b:59:23:b2:05:5c:ad:a8:f4: 1f:ab:97:c4:1a:24:43:da:a6:72:4d:00:d4:3c:52:3a: de:70:76:3b:4d:36:ea:77:ea:5a:e1:23:ad:46:4e:0d: 3a:9f:da:92:16:39:3a:79:7e:ae:d9:e0:9e:b7:c6:bc: 23:7d:18:a8:13:bc:4d:86:b2:5e:3e:59:cb:d7:4d:46: 62:5d:52:8a:2d:bf:8c:07:df:32:e2:96:60:00:84:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:8d:1f:b9:61:90:7e:0f:06:87:e7:58:52:20:4a:25: d4:6e:61:5a:be:c5:bb:75:06:e0:d9:a0:b0:0e:7f:d4: 19:c4:68:c7:0a:ff:c0:81:aa:7a:83:5c:af:d2:d3:d4: 4f:b8:ae:e5:6a:5b:b8:d1:c1:5b:8b:ce:07:f8:91:cc: 59:9c:87:49:7e:70:45:1b:30:7e:fd:5f:ab:b1:a3:f2: 7a:25:81:72:b3:a2:96:5c:70:78:06:18:fe:a1:d4:8f: a6:1c:d1:7d:2a:51:e5:ce:ad:25:46:0d:54:b2:a1:89: d3:ff:8f:dc:ba:b5:a7:68:f4:74:af:af:db:59:97:3d: a1:37:3a:f0:10:6b:f3:fa:45:e0:37:cf:5a:13:09:d0: 14:e9:3c:f6:d4:fd:7a:cc:b1:2c:49:95:30:38:70:9f: c3:8c:37:df:8e:2f:aa:b6:2f:1c:e9:80:ac:e4:73:aa: 80:a3:0e:25:b0:89:63:04:ee:eb:69:d0:79:9b:45:7c: c8:d9:d4:31:33:40:ef:d0:ce:c6:01:be:89:c7:f3:ad: a9:00:47:cb:00:5a:fa:a3:f5:c3:73:c5:8f:6a:d1:4f: b7:54:a1:6a:f6:20:fe:ce:e1:d4:d7:bb:2c:47:60:04: 5b:3d:94:ef:9f:c9:80:b6:8d:ff:14:98:ea:25:e7:8c Fingerprint (SHA-256): FB:47:5C:F7:D9:DA:BA:FF:13:B4:93:B1:E8:E7:44:37:34:16:CD:6A:DE:97:31:12:5B:04:F3:09:0B:F3:24:34 Fingerprint (SHA1): 78:78:03:F3:FC:AD:E1:66:43:2C:B1:14:ED:30:1F:13:A0:B7:7D:82 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #9360: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #9361: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #9362: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #9363: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #9364: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #9365: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #9366: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #9367: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #9368: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #9369: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #9370: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #9371: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #9372: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #9373: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #9374: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #9375: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #9376: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #9377: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #9378: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #9379: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #9380: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #9381: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #9382: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #9383: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 20187 at Fri Jan 8 07:18:45 EST 2016 kill -USR1 20187 httpserv: normal termination httpserv -b -p 9601 2>/dev/null; httpserv with PID 20187 killed at Fri Jan 8 07:18:46 EST 2016 httpserv starting at Fri Jan 8 07:18:46 EST 2016 httpserv -D -p 9601 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/aiahttp/http_pid.18586 & trying to connect to httpserv at Fri Jan 8 07:18:46 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 07:18:51 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #9384: Waiting for Server - FAILED kill -0 3254 >/dev/null 2>/dev/null httpserv with PID 3254 found at Fri Jan 8 07:18:52 EST 2016 httpserv with PID 3254 started at Fri Jan 8 07:18:52 EST 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #9385: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064698 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9386: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #9387: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #9388: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064699 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9389: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #9390: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #9391: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9392: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108064700 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9393: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9394: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108064701 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9395: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9396: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #9397: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #9398: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9399: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 108064702 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9400: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9401: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9402: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #9403: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #9404: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064699 (0x670efbb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:19:33 2016 Not After : Fri Jan 08 12:19:33 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:b1:37:df:45:42:07:59:e6:1a:8f:0b:2e:b4:91:84: 68:36:2a:1e:22:b8:f7:6f:4a:71:9c:83:fa:6a:0b:87: 26:eb:86:28:8f:68:45:22:15:fe:66:30:41:6b:20:8d: ca:42:b0:c4:4d:16:a9:1d:3a:49:e4:27:a8:2b:12:97: 2e:fd:de:b6:9b:fe:a8:40:56:c9:62:41:b8:8a:61:05: 8c:90:ec:a0:fd:99:4a:1e:4e:57:0c:2c:23:83:d9:da: 0f:99:49:ac:ae:b6:cb:a7:5a:3b:03:73:03:99:69:91: 3c:6e:18:ff:5e:f5:8c:ca:88:7e:8e:b5:ba:9d:51:47: 94:1b:1a:05:4c:c0:df:3e:5e:1a:7e:8f:b0:ff:8c:06: ea:ba:59:85:c3:db:bc:24:08:f5:90:df:a1:34:a0:c1: 7a:e7:40:3b:56:15:d0:1d:3d:7a:19:dc:37:3a:3e:38: 56:c9:11:db:63:27:4d:38:6a:72:80:5b:db:e2:4f:dc: 6e:17:02:5b:f6:6d:24:50:dd:63:92:48:c0:a5:84:f2: 05:17:9e:fd:2c:f2:be:d8:5a:76:c2:80:fb:10:bf:cf: b4:94:0b:5b:56:ec:46:e8:8b:66:2f:7c:b6:2e:c7:70: 6e:84:22:00:75:31:0d:a4:ef:3c:0e:43:57:52:f7:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:11:75:38:79:8d:76:6d:13:e5:82:e4:2c:8d:b3:17: 90:03:30:23:a3:41:6c:91:22:25:b9:16:b6:c4:73:a6: 56:8f:f6:40:db:d6:d6:47:39:0a:57:6f:89:58:6c:f5: 67:4a:c4:f9:08:68:ce:3c:8b:b9:73:a0:d8:48:b3:2c: 44:07:b4:6e:ce:84:1a:ad:53:6f:f9:d7:ad:fe:5f:b7: 29:fc:8c:8f:4b:77:dc:62:75:d8:7d:51:37:00:bb:fc: 7f:3f:51:ed:ea:3e:93:f6:f4:35:7c:51:9e:40:fc:26: 6f:f3:6d:2d:42:ce:73:59:37:93:cc:6c:cf:9c:21:0d: 91:81:6d:c6:d0:4a:c0:64:d8:d3:86:89:72:45:20:d8: 63:c0:24:0d:b6:32:8b:86:d4:0a:26:eb:18:92:35:b2: ce:31:3b:7f:d6:89:cb:fa:ad:5a:4e:a2:11:ee:c5:e0: 74:31:88:20:59:ed:26:9b:70:b9:bd:58:e9:78:1e:1b: 05:4b:03:12:f3:d7:c4:9b:a6:0a:f8:b2:dc:1f:d0:30: f1:dc:e4:68:9e:5d:52:74:7c:59:ae:1b:d4:73:10:fb: 76:63:8b:23:14:de:cb:75:5b:db:e9:74:04:f1:18:9e: db:ae:fe:ee:ad:91:9a:89:8a:d8:80:55:65:42:ec:19 Fingerprint (SHA-256): B6:6E:71:F3:FE:DF:F1:FF:60:14:10:28:90:AE:9A:0F:C5:3F:78:AB:99:DF:FD:2A:35:49:3C:E0:EF:57:5E:F1 Fingerprint (SHA1): 3A:35:A5:03:3E:72:78:0D:16:94:4F:29:D1:54:97:3A:32:E7:49:C5 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9405: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064698 (0x670efba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 12:19:24 2016 Not After : Fri Jan 08 12:19:24 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:7a:57:04:49:dd:ad:d1:3c:d1:1f:43:bc:d4:00:96: 94:46:ab:8d:45:33:af:2b:84:5e:f1:80:49:46:87:ca: 75:2a:9c:97:f3:4f:34:62:c2:f9:ae:79:88:16:04:04: b2:20:2b:57:05:af:b5:4d:56:51:a6:8e:82:9a:65:90: 78:7d:df:c6:eb:9f:01:d1:f1:59:0c:a7:1f:73:80:bf: cf:46:88:8a:09:09:16:28:0a:e7:b1:96:e8:db:1e:4d: 30:7a:7d:08:50:f9:3c:5b:e6:dd:88:c7:da:50:d5:0a: 59:0e:2f:ff:5a:47:1d:11:ec:b9:de:19:bc:cc:57:9c: dd:65:38:54:32:82:19:fd:4c:0d:0b:ed:d4:95:cf:ae: b9:c1:0e:31:bc:b1:13:6c:d6:fe:d3:59:48:99:16:7f: bf:a1:8f:8d:de:12:af:46:64:54:70:71:f6:10:e4:fd: 1a:3e:0b:1c:6d:8c:03:15:75:23:36:da:e2:e1:ac:ae: ef:a7:cc:84:02:89:0d:32:f9:c1:2b:91:9a:c5:a1:5c: b4:6b:ff:1f:df:92:47:c0:3c:98:a5:e6:2d:f0:1c:a1: 5b:e6:da:1d:12:28:de:e3:2b:55:bb:0b:d8:d2:f7:96: 52:3c:07:29:e9:1d:44:7c:f9:21:72:67:eb:4f:43:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:fd:1a:bf:c0:76:77:7e:00:14:a7:f2:0e:89:d8:6a: 91:d4:95:3f:c8:b7:0f:c5:35:3e:46:28:7b:bb:09:c3: fc:f7:9a:b0:90:49:d5:4d:74:91:1d:af:da:11:25:17: 6e:8e:b8:ef:d3:6b:d2:5c:b4:14:58:31:72:54:5d:dd: 1e:03:d1:3d:1c:2a:34:ee:da:da:ba:76:8b:38:f2:d2: 2a:41:3c:87:7c:9d:13:b6:b2:77:7e:16:97:59:cc:2d: 9d:87:c7:92:fc:d2:60:59:32:a7:70:ce:6c:d9:9e:33: 61:60:7e:34:dd:f3:8d:fb:fe:76:34:da:f4:a5:f2:ac: 51:65:63:94:c0:fc:06:07:6c:1f:3e:80:a7:f8:17:e4: af:4a:cc:d7:2b:2f:22:f8:50:e9:89:0f:ea:d5:37:ad: d6:17:0a:59:a9:1b:20:25:40:d0:9a:95:8d:f3:ef:91: 9e:90:8f:d1:47:b1:0a:f6:5b:98:3e:eb:0e:8e:d7:e2: 38:76:35:44:d0:ca:56:9b:69:17:27:64:32:fd:f1:10: 8d:77:2b:66:14:f3:db:4e:e9:b8:ce:eb:f9:27:14:51: 68:20:5b:c7:5d:8a:78:0b:ce:34:db:e2:83:37:65:c8: 16:6a:57:17:15:52:e0:4d:94:c4:1a:f9:97:35:2f:dc Fingerprint (SHA-256): 7B:30:65:11:B4:D9:DC:09:88:19:09:BF:D0:C9:2D:B3:76:9D:F7:AA:DF:CB:BC:48:F6:A3:39:EE:2C:38:FD:F1 Fingerprint (SHA1): 5D:B2:7C:BE:4C:DC:DD:B5:2C:8A:05:87:C9:04:E1:42:DE:45:2B:72 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9406: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #9407: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #9408: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #9409: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064698 (0x670efba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 12:19:24 2016 Not After : Fri Jan 08 12:19:24 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:7a:57:04:49:dd:ad:d1:3c:d1:1f:43:bc:d4:00:96: 94:46:ab:8d:45:33:af:2b:84:5e:f1:80:49:46:87:ca: 75:2a:9c:97:f3:4f:34:62:c2:f9:ae:79:88:16:04:04: b2:20:2b:57:05:af:b5:4d:56:51:a6:8e:82:9a:65:90: 78:7d:df:c6:eb:9f:01:d1:f1:59:0c:a7:1f:73:80:bf: cf:46:88:8a:09:09:16:28:0a:e7:b1:96:e8:db:1e:4d: 30:7a:7d:08:50:f9:3c:5b:e6:dd:88:c7:da:50:d5:0a: 59:0e:2f:ff:5a:47:1d:11:ec:b9:de:19:bc:cc:57:9c: dd:65:38:54:32:82:19:fd:4c:0d:0b:ed:d4:95:cf:ae: b9:c1:0e:31:bc:b1:13:6c:d6:fe:d3:59:48:99:16:7f: bf:a1:8f:8d:de:12:af:46:64:54:70:71:f6:10:e4:fd: 1a:3e:0b:1c:6d:8c:03:15:75:23:36:da:e2:e1:ac:ae: ef:a7:cc:84:02:89:0d:32:f9:c1:2b:91:9a:c5:a1:5c: b4:6b:ff:1f:df:92:47:c0:3c:98:a5:e6:2d:f0:1c:a1: 5b:e6:da:1d:12:28:de:e3:2b:55:bb:0b:d8:d2:f7:96: 52:3c:07:29:e9:1d:44:7c:f9:21:72:67:eb:4f:43:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:fd:1a:bf:c0:76:77:7e:00:14:a7:f2:0e:89:d8:6a: 91:d4:95:3f:c8:b7:0f:c5:35:3e:46:28:7b:bb:09:c3: fc:f7:9a:b0:90:49:d5:4d:74:91:1d:af:da:11:25:17: 6e:8e:b8:ef:d3:6b:d2:5c:b4:14:58:31:72:54:5d:dd: 1e:03:d1:3d:1c:2a:34:ee:da:da:ba:76:8b:38:f2:d2: 2a:41:3c:87:7c:9d:13:b6:b2:77:7e:16:97:59:cc:2d: 9d:87:c7:92:fc:d2:60:59:32:a7:70:ce:6c:d9:9e:33: 61:60:7e:34:dd:f3:8d:fb:fe:76:34:da:f4:a5:f2:ac: 51:65:63:94:c0:fc:06:07:6c:1f:3e:80:a7:f8:17:e4: af:4a:cc:d7:2b:2f:22:f8:50:e9:89:0f:ea:d5:37:ad: d6:17:0a:59:a9:1b:20:25:40:d0:9a:95:8d:f3:ef:91: 9e:90:8f:d1:47:b1:0a:f6:5b:98:3e:eb:0e:8e:d7:e2: 38:76:35:44:d0:ca:56:9b:69:17:27:64:32:fd:f1:10: 8d:77:2b:66:14:f3:db:4e:e9:b8:ce:eb:f9:27:14:51: 68:20:5b:c7:5d:8a:78:0b:ce:34:db:e2:83:37:65:c8: 16:6a:57:17:15:52:e0:4d:94:c4:1a:f9:97:35:2f:dc Fingerprint (SHA-256): 7B:30:65:11:B4:D9:DC:09:88:19:09:BF:D0:C9:2D:B3:76:9D:F7:AA:DF:CB:BC:48:F6:A3:39:EE:2C:38:FD:F1 Fingerprint (SHA1): 5D:B2:7C:BE:4C:DC:DD:B5:2C:8A:05:87:C9:04:E1:42:DE:45:2B:72 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9410: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064699 (0x670efbb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:19:33 2016 Not After : Fri Jan 08 12:19:33 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:b1:37:df:45:42:07:59:e6:1a:8f:0b:2e:b4:91:84: 68:36:2a:1e:22:b8:f7:6f:4a:71:9c:83:fa:6a:0b:87: 26:eb:86:28:8f:68:45:22:15:fe:66:30:41:6b:20:8d: ca:42:b0:c4:4d:16:a9:1d:3a:49:e4:27:a8:2b:12:97: 2e:fd:de:b6:9b:fe:a8:40:56:c9:62:41:b8:8a:61:05: 8c:90:ec:a0:fd:99:4a:1e:4e:57:0c:2c:23:83:d9:da: 0f:99:49:ac:ae:b6:cb:a7:5a:3b:03:73:03:99:69:91: 3c:6e:18:ff:5e:f5:8c:ca:88:7e:8e:b5:ba:9d:51:47: 94:1b:1a:05:4c:c0:df:3e:5e:1a:7e:8f:b0:ff:8c:06: ea:ba:59:85:c3:db:bc:24:08:f5:90:df:a1:34:a0:c1: 7a:e7:40:3b:56:15:d0:1d:3d:7a:19:dc:37:3a:3e:38: 56:c9:11:db:63:27:4d:38:6a:72:80:5b:db:e2:4f:dc: 6e:17:02:5b:f6:6d:24:50:dd:63:92:48:c0:a5:84:f2: 05:17:9e:fd:2c:f2:be:d8:5a:76:c2:80:fb:10:bf:cf: b4:94:0b:5b:56:ec:46:e8:8b:66:2f:7c:b6:2e:c7:70: 6e:84:22:00:75:31:0d:a4:ef:3c:0e:43:57:52:f7:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:11:75:38:79:8d:76:6d:13:e5:82:e4:2c:8d:b3:17: 90:03:30:23:a3:41:6c:91:22:25:b9:16:b6:c4:73:a6: 56:8f:f6:40:db:d6:d6:47:39:0a:57:6f:89:58:6c:f5: 67:4a:c4:f9:08:68:ce:3c:8b:b9:73:a0:d8:48:b3:2c: 44:07:b4:6e:ce:84:1a:ad:53:6f:f9:d7:ad:fe:5f:b7: 29:fc:8c:8f:4b:77:dc:62:75:d8:7d:51:37:00:bb:fc: 7f:3f:51:ed:ea:3e:93:f6:f4:35:7c:51:9e:40:fc:26: 6f:f3:6d:2d:42:ce:73:59:37:93:cc:6c:cf:9c:21:0d: 91:81:6d:c6:d0:4a:c0:64:d8:d3:86:89:72:45:20:d8: 63:c0:24:0d:b6:32:8b:86:d4:0a:26:eb:18:92:35:b2: ce:31:3b:7f:d6:89:cb:fa:ad:5a:4e:a2:11:ee:c5:e0: 74:31:88:20:59:ed:26:9b:70:b9:bd:58:e9:78:1e:1b: 05:4b:03:12:f3:d7:c4:9b:a6:0a:f8:b2:dc:1f:d0:30: f1:dc:e4:68:9e:5d:52:74:7c:59:ae:1b:d4:73:10:fb: 76:63:8b:23:14:de:cb:75:5b:db:e9:74:04:f1:18:9e: db:ae:fe:ee:ad:91:9a:89:8a:d8:80:55:65:42:ec:19 Fingerprint (SHA-256): B6:6E:71:F3:FE:DF:F1:FF:60:14:10:28:90:AE:9A:0F:C5:3F:78:AB:99:DF:FD:2A:35:49:3C:E0:EF:57:5E:F1 Fingerprint (SHA1): 3A:35:A5:03:3E:72:78:0D:16:94:4F:29:D1:54:97:3A:32:E7:49:C5 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9411: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #9412: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #9413: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #9414: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #9415: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #9416: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064699 (0x670efbb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:19:33 2016 Not After : Fri Jan 08 12:19:33 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:b1:37:df:45:42:07:59:e6:1a:8f:0b:2e:b4:91:84: 68:36:2a:1e:22:b8:f7:6f:4a:71:9c:83:fa:6a:0b:87: 26:eb:86:28:8f:68:45:22:15:fe:66:30:41:6b:20:8d: ca:42:b0:c4:4d:16:a9:1d:3a:49:e4:27:a8:2b:12:97: 2e:fd:de:b6:9b:fe:a8:40:56:c9:62:41:b8:8a:61:05: 8c:90:ec:a0:fd:99:4a:1e:4e:57:0c:2c:23:83:d9:da: 0f:99:49:ac:ae:b6:cb:a7:5a:3b:03:73:03:99:69:91: 3c:6e:18:ff:5e:f5:8c:ca:88:7e:8e:b5:ba:9d:51:47: 94:1b:1a:05:4c:c0:df:3e:5e:1a:7e:8f:b0:ff:8c:06: ea:ba:59:85:c3:db:bc:24:08:f5:90:df:a1:34:a0:c1: 7a:e7:40:3b:56:15:d0:1d:3d:7a:19:dc:37:3a:3e:38: 56:c9:11:db:63:27:4d:38:6a:72:80:5b:db:e2:4f:dc: 6e:17:02:5b:f6:6d:24:50:dd:63:92:48:c0:a5:84:f2: 05:17:9e:fd:2c:f2:be:d8:5a:76:c2:80:fb:10:bf:cf: b4:94:0b:5b:56:ec:46:e8:8b:66:2f:7c:b6:2e:c7:70: 6e:84:22:00:75:31:0d:a4:ef:3c:0e:43:57:52:f7:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:11:75:38:79:8d:76:6d:13:e5:82:e4:2c:8d:b3:17: 90:03:30:23:a3:41:6c:91:22:25:b9:16:b6:c4:73:a6: 56:8f:f6:40:db:d6:d6:47:39:0a:57:6f:89:58:6c:f5: 67:4a:c4:f9:08:68:ce:3c:8b:b9:73:a0:d8:48:b3:2c: 44:07:b4:6e:ce:84:1a:ad:53:6f:f9:d7:ad:fe:5f:b7: 29:fc:8c:8f:4b:77:dc:62:75:d8:7d:51:37:00:bb:fc: 7f:3f:51:ed:ea:3e:93:f6:f4:35:7c:51:9e:40:fc:26: 6f:f3:6d:2d:42:ce:73:59:37:93:cc:6c:cf:9c:21:0d: 91:81:6d:c6:d0:4a:c0:64:d8:d3:86:89:72:45:20:d8: 63:c0:24:0d:b6:32:8b:86:d4:0a:26:eb:18:92:35:b2: ce:31:3b:7f:d6:89:cb:fa:ad:5a:4e:a2:11:ee:c5:e0: 74:31:88:20:59:ed:26:9b:70:b9:bd:58:e9:78:1e:1b: 05:4b:03:12:f3:d7:c4:9b:a6:0a:f8:b2:dc:1f:d0:30: f1:dc:e4:68:9e:5d:52:74:7c:59:ae:1b:d4:73:10:fb: 76:63:8b:23:14:de:cb:75:5b:db:e9:74:04:f1:18:9e: db:ae:fe:ee:ad:91:9a:89:8a:d8:80:55:65:42:ec:19 Fingerprint (SHA-256): B6:6E:71:F3:FE:DF:F1:FF:60:14:10:28:90:AE:9A:0F:C5:3F:78:AB:99:DF:FD:2A:35:49:3C:E0:EF:57:5E:F1 Fingerprint (SHA1): 3A:35:A5:03:3E:72:78:0D:16:94:4F:29:D1:54:97:3A:32:E7:49:C5 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9417: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064699 (0x670efbb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:19:33 2016 Not After : Fri Jan 08 12:19:33 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:b1:37:df:45:42:07:59:e6:1a:8f:0b:2e:b4:91:84: 68:36:2a:1e:22:b8:f7:6f:4a:71:9c:83:fa:6a:0b:87: 26:eb:86:28:8f:68:45:22:15:fe:66:30:41:6b:20:8d: ca:42:b0:c4:4d:16:a9:1d:3a:49:e4:27:a8:2b:12:97: 2e:fd:de:b6:9b:fe:a8:40:56:c9:62:41:b8:8a:61:05: 8c:90:ec:a0:fd:99:4a:1e:4e:57:0c:2c:23:83:d9:da: 0f:99:49:ac:ae:b6:cb:a7:5a:3b:03:73:03:99:69:91: 3c:6e:18:ff:5e:f5:8c:ca:88:7e:8e:b5:ba:9d:51:47: 94:1b:1a:05:4c:c0:df:3e:5e:1a:7e:8f:b0:ff:8c:06: ea:ba:59:85:c3:db:bc:24:08:f5:90:df:a1:34:a0:c1: 7a:e7:40:3b:56:15:d0:1d:3d:7a:19:dc:37:3a:3e:38: 56:c9:11:db:63:27:4d:38:6a:72:80:5b:db:e2:4f:dc: 6e:17:02:5b:f6:6d:24:50:dd:63:92:48:c0:a5:84:f2: 05:17:9e:fd:2c:f2:be:d8:5a:76:c2:80:fb:10:bf:cf: b4:94:0b:5b:56:ec:46:e8:8b:66:2f:7c:b6:2e:c7:70: 6e:84:22:00:75:31:0d:a4:ef:3c:0e:43:57:52:f7:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:11:75:38:79:8d:76:6d:13:e5:82:e4:2c:8d:b3:17: 90:03:30:23:a3:41:6c:91:22:25:b9:16:b6:c4:73:a6: 56:8f:f6:40:db:d6:d6:47:39:0a:57:6f:89:58:6c:f5: 67:4a:c4:f9:08:68:ce:3c:8b:b9:73:a0:d8:48:b3:2c: 44:07:b4:6e:ce:84:1a:ad:53:6f:f9:d7:ad:fe:5f:b7: 29:fc:8c:8f:4b:77:dc:62:75:d8:7d:51:37:00:bb:fc: 7f:3f:51:ed:ea:3e:93:f6:f4:35:7c:51:9e:40:fc:26: 6f:f3:6d:2d:42:ce:73:59:37:93:cc:6c:cf:9c:21:0d: 91:81:6d:c6:d0:4a:c0:64:d8:d3:86:89:72:45:20:d8: 63:c0:24:0d:b6:32:8b:86:d4:0a:26:eb:18:92:35:b2: ce:31:3b:7f:d6:89:cb:fa:ad:5a:4e:a2:11:ee:c5:e0: 74:31:88:20:59:ed:26:9b:70:b9:bd:58:e9:78:1e:1b: 05:4b:03:12:f3:d7:c4:9b:a6:0a:f8:b2:dc:1f:d0:30: f1:dc:e4:68:9e:5d:52:74:7c:59:ae:1b:d4:73:10:fb: 76:63:8b:23:14:de:cb:75:5b:db:e9:74:04:f1:18:9e: db:ae:fe:ee:ad:91:9a:89:8a:d8:80:55:65:42:ec:19 Fingerprint (SHA-256): B6:6E:71:F3:FE:DF:F1:FF:60:14:10:28:90:AE:9A:0F:C5:3F:78:AB:99:DF:FD:2A:35:49:3C:E0:EF:57:5E:F1 Fingerprint (SHA1): 3A:35:A5:03:3E:72:78:0D:16:94:4F:29:D1:54:97:3A:32:E7:49:C5 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9418: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #9419: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #9420: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #9421: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #9422: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #9423: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064698 (0x670efba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 12:19:24 2016 Not After : Fri Jan 08 12:19:24 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:7a:57:04:49:dd:ad:d1:3c:d1:1f:43:bc:d4:00:96: 94:46:ab:8d:45:33:af:2b:84:5e:f1:80:49:46:87:ca: 75:2a:9c:97:f3:4f:34:62:c2:f9:ae:79:88:16:04:04: b2:20:2b:57:05:af:b5:4d:56:51:a6:8e:82:9a:65:90: 78:7d:df:c6:eb:9f:01:d1:f1:59:0c:a7:1f:73:80:bf: cf:46:88:8a:09:09:16:28:0a:e7:b1:96:e8:db:1e:4d: 30:7a:7d:08:50:f9:3c:5b:e6:dd:88:c7:da:50:d5:0a: 59:0e:2f:ff:5a:47:1d:11:ec:b9:de:19:bc:cc:57:9c: dd:65:38:54:32:82:19:fd:4c:0d:0b:ed:d4:95:cf:ae: b9:c1:0e:31:bc:b1:13:6c:d6:fe:d3:59:48:99:16:7f: bf:a1:8f:8d:de:12:af:46:64:54:70:71:f6:10:e4:fd: 1a:3e:0b:1c:6d:8c:03:15:75:23:36:da:e2:e1:ac:ae: ef:a7:cc:84:02:89:0d:32:f9:c1:2b:91:9a:c5:a1:5c: b4:6b:ff:1f:df:92:47:c0:3c:98:a5:e6:2d:f0:1c:a1: 5b:e6:da:1d:12:28:de:e3:2b:55:bb:0b:d8:d2:f7:96: 52:3c:07:29:e9:1d:44:7c:f9:21:72:67:eb:4f:43:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:fd:1a:bf:c0:76:77:7e:00:14:a7:f2:0e:89:d8:6a: 91:d4:95:3f:c8:b7:0f:c5:35:3e:46:28:7b:bb:09:c3: fc:f7:9a:b0:90:49:d5:4d:74:91:1d:af:da:11:25:17: 6e:8e:b8:ef:d3:6b:d2:5c:b4:14:58:31:72:54:5d:dd: 1e:03:d1:3d:1c:2a:34:ee:da:da:ba:76:8b:38:f2:d2: 2a:41:3c:87:7c:9d:13:b6:b2:77:7e:16:97:59:cc:2d: 9d:87:c7:92:fc:d2:60:59:32:a7:70:ce:6c:d9:9e:33: 61:60:7e:34:dd:f3:8d:fb:fe:76:34:da:f4:a5:f2:ac: 51:65:63:94:c0:fc:06:07:6c:1f:3e:80:a7:f8:17:e4: af:4a:cc:d7:2b:2f:22:f8:50:e9:89:0f:ea:d5:37:ad: d6:17:0a:59:a9:1b:20:25:40:d0:9a:95:8d:f3:ef:91: 9e:90:8f:d1:47:b1:0a:f6:5b:98:3e:eb:0e:8e:d7:e2: 38:76:35:44:d0:ca:56:9b:69:17:27:64:32:fd:f1:10: 8d:77:2b:66:14:f3:db:4e:e9:b8:ce:eb:f9:27:14:51: 68:20:5b:c7:5d:8a:78:0b:ce:34:db:e2:83:37:65:c8: 16:6a:57:17:15:52:e0:4d:94:c4:1a:f9:97:35:2f:dc Fingerprint (SHA-256): 7B:30:65:11:B4:D9:DC:09:88:19:09:BF:D0:C9:2D:B3:76:9D:F7:AA:DF:CB:BC:48:F6:A3:39:EE:2C:38:FD:F1 Fingerprint (SHA1): 5D:B2:7C:BE:4C:DC:DD:B5:2C:8A:05:87:C9:04:E1:42:DE:45:2B:72 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9424: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064698 (0x670efba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 12:19:24 2016 Not After : Fri Jan 08 12:19:24 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:7a:57:04:49:dd:ad:d1:3c:d1:1f:43:bc:d4:00:96: 94:46:ab:8d:45:33:af:2b:84:5e:f1:80:49:46:87:ca: 75:2a:9c:97:f3:4f:34:62:c2:f9:ae:79:88:16:04:04: b2:20:2b:57:05:af:b5:4d:56:51:a6:8e:82:9a:65:90: 78:7d:df:c6:eb:9f:01:d1:f1:59:0c:a7:1f:73:80:bf: cf:46:88:8a:09:09:16:28:0a:e7:b1:96:e8:db:1e:4d: 30:7a:7d:08:50:f9:3c:5b:e6:dd:88:c7:da:50:d5:0a: 59:0e:2f:ff:5a:47:1d:11:ec:b9:de:19:bc:cc:57:9c: dd:65:38:54:32:82:19:fd:4c:0d:0b:ed:d4:95:cf:ae: b9:c1:0e:31:bc:b1:13:6c:d6:fe:d3:59:48:99:16:7f: bf:a1:8f:8d:de:12:af:46:64:54:70:71:f6:10:e4:fd: 1a:3e:0b:1c:6d:8c:03:15:75:23:36:da:e2:e1:ac:ae: ef:a7:cc:84:02:89:0d:32:f9:c1:2b:91:9a:c5:a1:5c: b4:6b:ff:1f:df:92:47:c0:3c:98:a5:e6:2d:f0:1c:a1: 5b:e6:da:1d:12:28:de:e3:2b:55:bb:0b:d8:d2:f7:96: 52:3c:07:29:e9:1d:44:7c:f9:21:72:67:eb:4f:43:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:fd:1a:bf:c0:76:77:7e:00:14:a7:f2:0e:89:d8:6a: 91:d4:95:3f:c8:b7:0f:c5:35:3e:46:28:7b:bb:09:c3: fc:f7:9a:b0:90:49:d5:4d:74:91:1d:af:da:11:25:17: 6e:8e:b8:ef:d3:6b:d2:5c:b4:14:58:31:72:54:5d:dd: 1e:03:d1:3d:1c:2a:34:ee:da:da:ba:76:8b:38:f2:d2: 2a:41:3c:87:7c:9d:13:b6:b2:77:7e:16:97:59:cc:2d: 9d:87:c7:92:fc:d2:60:59:32:a7:70:ce:6c:d9:9e:33: 61:60:7e:34:dd:f3:8d:fb:fe:76:34:da:f4:a5:f2:ac: 51:65:63:94:c0:fc:06:07:6c:1f:3e:80:a7:f8:17:e4: af:4a:cc:d7:2b:2f:22:f8:50:e9:89:0f:ea:d5:37:ad: d6:17:0a:59:a9:1b:20:25:40:d0:9a:95:8d:f3:ef:91: 9e:90:8f:d1:47:b1:0a:f6:5b:98:3e:eb:0e:8e:d7:e2: 38:76:35:44:d0:ca:56:9b:69:17:27:64:32:fd:f1:10: 8d:77:2b:66:14:f3:db:4e:e9:b8:ce:eb:f9:27:14:51: 68:20:5b:c7:5d:8a:78:0b:ce:34:db:e2:83:37:65:c8: 16:6a:57:17:15:52:e0:4d:94:c4:1a:f9:97:35:2f:dc Fingerprint (SHA-256): 7B:30:65:11:B4:D9:DC:09:88:19:09:BF:D0:C9:2D:B3:76:9D:F7:AA:DF:CB:BC:48:F6:A3:39:EE:2C:38:FD:F1 Fingerprint (SHA1): 5D:B2:7C:BE:4C:DC:DD:B5:2C:8A:05:87:C9:04:E1:42:DE:45:2B:72 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9425: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #9426: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064703 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9427: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #9428: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #9429: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064704 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9430: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #9431: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #9432: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064705 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9433: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #9434: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #9435: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064706 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9436: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #9437: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #9438: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064707 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9439: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #9440: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #9441: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064708 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9442: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #9443: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #9444: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064709 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9445: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #9446: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #9447: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064710 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9448: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #9449: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #9450: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064711 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9451: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #9452: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #9453: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9454: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 108064712 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9455: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9456: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 108064713 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9457: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9458: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 108064714 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9459: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9460: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #9461: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #9462: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9463: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 108064715 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9464: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9465: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 108064716 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9466: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9467: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 108064717 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9468: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9469: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #9470: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #9471: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9472: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 108064718 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9473: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9474: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 108064719 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9475: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9476: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 108064720 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9477: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9478: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #9479: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #9480: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9481: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 108064721 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9482: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9483: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 108064722 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9484: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9485: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 108064723 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9486: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9487: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #9488: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9489: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9490: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 108064724 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9491: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9492: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9493: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9494: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108064725 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9495: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9496: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064703 (0x670efbf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Jan 08 12:20:28 2016 Not After : Fri Jan 08 12:20:28 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:87:b0:5d:39:39:b0:18:15:fe:d6:5c:93:a6:3e:a7: 50:fd:a0:61:f3:5c:b5:0f:79:29:05:5d:84:6b:a4:99: 64:e0:30:22:5c:18:8b:5e:e3:7b:e0:41:b2:98:27:53: 1a:1e:d3:a7:19:d1:23:4d:9d:dd:21:02:29:b3:e1:1e: 70:f5:fa:eb:0a:de:b6:c7:56:9c:f3:3f:0b:d0:9a:46: 01:91:db:28:5b:2a:a2:d4:45:50:bf:d3:4e:1f:4e:c3: ab:19:52:5b:35:09:af:dc:b6:67:c2:5d:64:af:ef:2c: 1f:11:78:47:b2:ee:f5:9b:2e:65:7e:9e:1c:9d:f1:83: 0d:2e:02:7f:8a:d7:b2:2b:f2:28:0d:97:2c:99:48:4d: ed:f4:75:fa:8a:e1:5a:f7:61:01:bf:3a:40:47:4a:05: 7d:5c:3a:01:d8:4a:5a:19:56:26:db:b0:d4:7a:c3:1f: 67:b2:d3:e3:ff:92:4b:50:71:7d:1c:2f:a9:d6:d3:49: f8:fa:32:b3:82:d0:3d:12:5a:79:94:bf:8d:62:0a:c6: 8e:5d:1c:27:4f:4d:c9:aa:8b:98:a6:cd:41:0a:5c:a3: df:f6:81:fb:25:66:d1:ad:51:a8:df:09:01:09:e7:3b: d1:99:4b:cd:9d:d3:c7:39:60:dc:83:51:54:37:04:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:06:eb:a9:00:32:59:6c:95:78:c2:0d:6c:77:bc:21: f9:55:14:fb:ef:d3:50:a6:61:97:01:0b:4e:3d:aa:4d: b8:4f:06:82:36:58:c4:b2:59:b1:1d:8a:1c:a6:09:d5: 82:d9:3a:0b:d2:7e:d0:14:75:09:60:0e:ed:c2:37:d9: e2:ea:ff:cf:85:67:63:fb:e9:b1:8b:25:c2:b8:d7:fb: 8a:4f:db:3a:49:3a:d2:b8:ce:ee:ae:de:c1:03:64:f6: 87:cc:15:b0:de:fa:b3:6d:ed:6e:ef:1d:8f:4c:68:0b: f6:06:0c:2f:29:b5:57:b8:f8:3f:68:ef:e9:ae:90:7c: 17:69:16:94:fc:7f:a3:63:6a:04:b3:69:80:87:49:aa: 4d:4f:b7:00:69:3d:52:7d:d6:f4:6b:90:b8:3f:a4:21: f1:e2:3f:6b:6f:ac:f4:14:e4:3b:74:96:ed:02:f7:99: 77:df:e1:38:51:91:3e:1b:ef:0d:3e:e3:6c:f2:7a:8a: c3:2a:4c:c6:c2:a9:bb:f6:57:2d:66:6e:a7:8f:0f:4a: a2:ae:96:14:c0:9f:75:5e:20:e2:e6:b4:18:fa:fa:21: 8b:a3:1a:ab:8b:1b:ad:dd:cf:b7:6d:a2:c2:43:12:91: 43:9a:b0:08:f2:6f:b3:54:72:4f:3d:59:5e:a8:26:f2 Fingerprint (SHA-256): C8:52:D6:45:9C:30:C9:BE:EB:78:48:47:B6:6F:15:6C:10:F4:F1:6C:AB:8D:E1:D0:F2:A3:DB:10:17:22:20:0E Fingerprint (SHA1): B7:E9:4D:F7:C9:3C:B5:48:B7:77:ED:44:31:A8:9F:EA:87:08:A3:05 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #9497: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064704 (0x670efc0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Jan 08 12:20:34 2016 Not After : Fri Jan 08 12:20:34 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:10:d1:e4:82:83:73:fe:9e:84:bb:ad:a4:97:40:db: 10:57:cb:8a:84:d9:fa:fb:44:ae:94:bb:db:2e:37:db: a7:31:4c:aa:d0:02:24:8c:0b:58:e9:69:ce:f1:b6:7f: 0b:3c:1c:dc:e1:8e:32:9c:6a:61:bb:1d:37:37:67:cb: 63:75:73:f4:2c:ef:b7:60:1a:ad:a7:b1:57:41:83:6c: 10:5d:9d:11:9d:dd:d8:f4:b6:1b:d1:af:cf:f9:d5:b2: d9:6c:b1:47:82:0c:c6:9e:7d:ae:73:e2:c5:a9:e5:c5: b1:83:44:1b:15:d7:0c:86:71:46:44:be:b8:65:fa:be: dc:f9:19:01:fa:97:e0:90:3d:d5:73:1e:d9:28:95:e3: 8f:73:d8:3e:7a:92:5a:87:3a:a1:fd:79:b2:0e:02:68: 9c:a7:d7:eb:a7:2a:e8:f8:d1:10:d1:3a:cf:11:1b:bf: d8:ec:16:a6:f1:e4:1f:e8:34:52:25:6f:98:96:16:4d: ff:8e:20:48:32:78:5d:1f:98:c8:6b:b3:5c:f7:a5:ea: 28:08:5d:9b:7c:a6:73:db:ee:cc:25:ae:61:4f:67:fa: 47:5c:ca:c7:69:a6:4a:eb:54:f5:28:70:9b:0e:91:f5: a7:32:0f:96:7c:e4:18:b4:49:6e:d8:6b:50:0e:54:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:e2:86:58:b9:e7:8e:df:d1:b0:19:50:b2:88:e7:06: e5:77:68:3b:13:11:cf:b4:09:4d:03:ef:e4:d3:c9:87: 73:8b:ff:f9:fc:ba:ac:09:c9:a6:a5:fb:4f:54:0e:05: 07:62:19:ad:aa:d4:52:e2:eb:20:76:b4:f6:79:c7:39: 97:0c:b4:65:7a:4d:7f:80:88:a5:f0:88:55:a1:0b:8c: 05:e8:9c:a3:64:63:5d:fd:5c:20:e8:6e:d2:c3:b9:8b: 7e:00:b8:96:94:e9:99:5b:51:a2:15:27:ec:27:04:42: 54:ac:18:df:b0:c3:eb:f2:ac:38:56:5e:7d:37:74:80: 15:1c:47:67:e6:9b:7d:4e:78:10:30:d7:3c:ca:d1:e6: e6:b9:d7:90:8a:e7:96:bb:80:e3:1c:17:be:70:39:59: 14:1f:92:5e:72:73:c0:32:92:6c:3e:98:d8:a7:31:c6: 7b:7b:96:f5:7f:e3:c5:2d:06:76:ab:e1:f5:e6:8d:21: a6:ca:6f:53:52:f2:ee:5c:b5:f7:9a:2b:e3:2b:12:6c: cb:b9:a8:de:cb:72:46:dc:6e:58:5d:f1:7b:32:16:5c: 41:85:87:6f:02:bc:1c:d1:b6:b9:0e:f9:5f:02:4a:10: 87:84:4f:f4:e8:f8:21:33:e0:1c:69:2e:ae:43:5f:ca Fingerprint (SHA-256): 64:3B:B0:85:70:99:DC:1B:CF:86:2A:C0:CA:99:38:27:2B:14:9B:17:54:CF:39:75:5F:4D:54:C6:8B:45:40:E1 Fingerprint (SHA1): EB:29:34:97:2A:1A:02:21:28:53:9C:66:59:72:72:DB:D4:90:C8:F6 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #9498: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064705 (0x670efc1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Jan 08 12:21:11 2016 Not After : Fri Jan 08 12:21:11 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:a9:94:26:be:5a:16:d5:31:90:90:06:aa:90:59:13: 3e:53:24:4c:4f:5e:2b:10:e9:ec:c9:c5:e0:03:e8:50: 86:9c:2a:ce:02:89:bc:79:dd:58:e1:ee:3c:bb:7e:08: 2d:a0:5e:d2:66:9e:96:9e:54:bd:f7:a3:07:6f:28:db: 48:9c:c8:a2:53:af:b7:1d:35:61:8e:e4:a0:f3:af:77: ba:a1:44:e2:f6:10:bd:97:9f:d2:69:25:04:07:dc:4e: 24:4a:87:71:06:19:62:e7:e5:02:58:02:31:44:96:f8: b2:b8:28:3d:7d:6c:d0:83:34:13:93:f4:1c:c4:49:27: 7e:f8:2d:e2:04:39:c2:00:02:bf:8a:30:22:c0:4e:79: a0:cd:d4:0e:2e:23:00:e9:8d:e9:3e:77:10:f2:50:0b: 85:dd:f2:45:31:ec:bf:cc:28:c7:59:ea:93:64:7b:6a: 40:13:11:5d:3b:7c:ad:a8:ab:4d:2a:b9:2e:8f:c8:b2: 20:63:3e:2f:a1:ca:26:b9:9b:02:f4:9d:db:c3:3c:a9: 0c:81:0c:5e:1a:f6:48:b1:27:dc:d2:59:b5:86:29:9a: ac:eb:b1:15:87:12:58:df:bf:3a:9c:44:8c:08:92:2c: 5f:a8:90:2c:83:0a:49:e8:20:1e:37:80:89:4b:51:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:48:ce:f4:db:42:da:a3:77:11:f2:90:38:38:a1:7a: 3b:92:a4:20:36:81:dc:b0:ab:9b:19:b6:4a:7c:98:83: c3:33:5e:b7:26:d8:af:e5:b6:76:7b:fb:84:2a:1a:25: 68:b5:91:b3:b3:1f:30:57:94:32:82:49:17:36:b7:d1: 02:31:3c:6d:fb:78:2f:02:17:bb:28:8a:90:b3:dd:5e: ea:c1:2d:a3:b9:5d:b5:9b:3d:5d:be:74:90:1b:04:f7: 79:54:0c:c6:69:7d:05:40:1d:bf:6f:78:cc:1a:69:9a: f7:b2:fe:fc:60:60:12:06:50:75:64:73:9d:fa:1a:0e: c4:0f:2e:0e:85:26:2d:e8:b3:e8:77:2c:da:12:3c:1e: 96:9d:41:a5:ac:63:76:77:8f:42:f0:88:27:27:b1:06: 9f:c4:84:2f:8f:07:e9:3b:f9:80:53:f8:db:bf:87:8b: e7:98:9a:7e:8b:36:45:48:25:11:b4:1e:ed:15:e0:a9: 19:ef:c5:a8:0d:d5:25:b4:6c:78:7d:28:66:70:cb:92: 1a:75:7f:05:8d:04:b0:09:1d:ae:91:fd:bd:45:65:2e: 0b:cc:e3:7e:11:f8:ce:12:03:91:49:ca:60:2b:44:35: 78:8a:cd:08:5d:cc:b3:0b:ed:54:f5:b5:cf:7f:af:40 Fingerprint (SHA-256): E0:B5:4E:FD:51:34:44:B2:F0:CD:BF:C9:5D:85:4F:F5:0F:A7:C5:08:76:22:EF:7B:BB:6C:C5:B8:19:A4:13:80 Fingerprint (SHA1): C9:FD:1F:F2:DB:82:7D:C7:27:40:A0:0C:58:FE:1B:D7:E6:BB:B0:CD Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #9499: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064706 (0x670efc2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Jan 08 12:21:21 2016 Not After : Fri Jan 08 12:21:21 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:e2:95:99:db:84:e6:1f:6e:8f:c8:08:2a:c1:9d:41: 9c:86:6f:36:ec:4b:18:75:df:02:84:71:56:27:6c:3d: d8:da:5d:02:fc:18:6d:dc:3b:2a:83:dc:56:19:13:8a: 8f:9a:89:69:1f:7c:6e:6a:24:19:fc:5f:91:a4:b4:02: 74:95:c4:6e:72:83:18:bf:df:df:f2:5b:58:a6:07:d3: 41:69:7f:65:76:55:4c:84:d6:86:7e:d9:c2:88:21:9a: f1:3d:aa:93:42:3c:50:c6:1a:97:1d:7f:b2:23:d5:96: 6e:c7:39:51:6d:1c:bc:cf:42:c6:a6:b0:04:22:2c:51: f7:28:6a:8b:2e:32:b9:71:3a:01:d3:2a:67:cc:89:d8: 2b:ef:66:3d:69:4d:5f:cf:ef:06:e4:fc:cd:23:b8:32: 47:36:17:a1:7c:3e:93:97:93:1a:73:42:a2:7d:57:a3: 0f:ca:bb:97:88:a1:d8:2e:3e:9c:40:6c:56:0c:79:f5: 2d:3c:60:c9:66:43:a3:e3:f4:c0:f4:54:0b:59:44:9c: 3f:d3:13:e6:e8:78:50:81:5f:c4:80:20:18:b1:af:6c: 16:63:aa:e0:c9:8c:f7:61:08:c5:54:7c:05:ba:23:63: 44:cb:52:e9:f2:ba:8d:c2:e7:28:8c:1f:87:d2:27:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:ef:f5:c8:86:95:f0:f0:bd:6b:b1:3e:6d:ca:da:8a: aa:f5:66:a7:5e:fd:7d:cf:52:dc:6c:a0:0f:38:d0:36: ff:7f:7c:ec:f7:a4:13:aa:22:ee:c8:64:fe:af:b5:23: c0:76:55:c8:8e:37:ee:72:ab:14:1e:90:18:93:46:e9: 1a:74:c1:27:70:27:5b:07:f9:7a:29:2d:c4:0c:cd:90: 19:c0:59:4a:65:09:dc:81:da:83:3d:c5:1d:d0:b3:1f: 65:9a:25:2e:31:b7:70:ea:08:91:da:39:4e:f0:47:95: 8c:62:06:ff:f7:e4:d5:97:ee:85:d4:d8:0d:df:dd:ab: fc:4f:48:3b:b9:c2:e0:9f:0a:de:f3:54:73:2c:ff:c6: 49:8e:a4:20:a3:b8:1c:fc:03:7c:64:50:76:b9:9e:a1: 9a:17:51:9c:3d:e6:f5:4e:97:36:07:9e:21:2b:49:a5: 40:93:ed:44:31:22:45:2e:76:eb:0e:c0:0a:69:95:c6: 35:bf:ad:3b:2b:77:86:56:da:ab:d1:a6:2a:04:cd:43: e7:1a:3d:57:5d:21:19:ac:ef:e8:97:40:8c:d4:2a:aa: 1e:e2:b8:0e:41:0a:5d:46:66:43:80:74:f3:c6:8a:d6: 87:22:32:cc:07:20:2e:2b:aa:94:0f:29:3f:e7:9b:e6 Fingerprint (SHA-256): 67:E5:7E:00:D8:97:AB:46:A8:59:E7:77:BE:2F:34:4C:F0:5F:67:30:9E:D1:C2:2C:B1:6E:4A:AD:7D:3E:51:53 Fingerprint (SHA1): A7:C0:51:B5:F8:3C:B0:1E:FE:14:75:4E:4F:71:E5:C6:16:EF:DB:B8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #9500: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064707 (0x670efc3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Jan 08 12:21:33 2016 Not After : Fri Jan 08 12:21:33 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:d1:a6:bf:1e:ee:3c:c1:29:ae:51:8e:9d:82:32:ab: 30:f6:d3:7e:61:65:77:9b:e5:fc:42:98:fb:99:97:57: 09:41:ba:b1:7b:7f:82:49:b6:2c:2b:34:e8:3d:89:20: 1c:50:9d:8b:ce:49:bf:48:a0:1e:97:c7:0b:cf:8c:67: 7a:1c:f8:77:18:96:ea:80:b5:6b:e0:0b:46:6b:07:c8: 99:4b:2c:a8:96:96:0a:9b:31:5b:6b:9e:65:1c:36:bb: a0:50:21:43:9b:5b:f7:ce:af:c6:cb:a0:4f:91:2c:80: f3:a2:4e:87:6b:59:81:2a:f1:36:a3:82:17:00:51:ff: a1:df:7b:3e:50:d2:75:2a:9f:f3:58:10:c1:2d:b9:6d: 0b:0f:b7:0d:c4:1b:83:56:cd:1f:6f:4a:4c:3d:08:b6: d8:38:6d:a7:29:c6:f0:f2:65:13:4f:2b:bb:2d:6f:d5: 8b:35:01:f7:85:02:ba:42:d9:b1:f6:52:7b:1c:53:c9: 78:dd:bd:89:f1:19:ca:fa:73:4b:a9:92:a8:12:08:58: 38:03:ac:97:6b:ef:97:95:41:de:4c:90:29:13:b6:1f: bc:cb:a3:e9:a6:d5:d6:f2:a7:bf:e5:d2:ce:de:19:d9: a7:51:7c:6b:70:28:7d:c7:b0:1f:7b:91:1f:8c:f1:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:73:3a:3d:53:e6:e0:91:8d:59:79:bb:4b:35:e4:34: a6:87:4e:f5:7a:79:07:fc:7e:8a:06:28:ac:5a:01:2b: b0:0f:4b:13:a7:ee:a0:91:02:f6:59:8d:e1:fb:21:4f: eb:de:ef:fe:cf:58:c0:a8:29:db:54:af:2a:f5:51:16: 61:1f:b7:0e:eb:26:84:93:3d:a4:8e:32:55:0a:40:48: 97:cb:15:3d:e2:ed:26:90:97:74:bb:31:47:85:6c:30: df:74:5e:5b:65:f4:75:9d:44:2d:65:0c:c0:24:a6:6d: ab:3e:38:11:50:51:e4:45:55:26:55:de:ac:3d:cd:ea: 3f:09:3f:fd:35:02:88:e9:42:31:70:61:0c:6a:d8:29: 72:21:76:fb:94:70:26:af:b6:93:36:22:e5:8b:fe:e4: 63:a3:63:bd:b1:45:d6:81:35:1e:26:e1:27:7e:68:a0: 9f:0f:56:b1:55:dd:05:f4:9d:a1:74:43:96:9f:9c:71: 45:fb:78:7b:ca:b0:f0:7a:a7:33:ea:cf:7c:6e:cf:e1: 52:39:9d:d1:35:1a:84:f0:12:3f:52:12:e0:af:96:cc: b7:3a:ed:e6:c5:e7:de:35:23:b0:ce:c9:e7:8a:8b:e8: ef:f5:09:27:ec:28:6b:dd:f9:56:4e:96:a2:e7:9c:0b Fingerprint (SHA-256): 78:27:EB:62:1F:E7:6C:A0:44:05:D1:70:0A:29:65:7B:91:4D:20:55:8C:EA:DB:D8:F0:F4:6F:9B:A7:A8:63:9D Fingerprint (SHA1): EA:E8:40:BE:9B:1D:26:4A:16:88:33:10:8C:52:28:71:2A:F2:F2:ED Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #9501: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064708 (0x670efc4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Jan 08 12:21:48 2016 Not After : Fri Jan 08 12:21:48 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:6b:8b:17:bd:60:37:a5:3d:3d:9c:0a:4b:6a:b7:16: 8f:67:0d:97:46:88:9a:58:64:a8:6d:cc:51:e3:63:16: 5c:f1:03:6e:48:28:02:6f:79:4f:a9:f4:8e:d6:07:c6: 00:1d:15:9b:ae:bd:2c:a9:de:a6:9d:07:c9:90:23:09: 7d:eb:eb:22:f5:cf:a0:3a:1c:f3:1d:6a:5e:2b:54:9f: 1d:77:4e:f6:98:08:fc:c0:3c:e6:d7:1b:95:27:01:48: b8:3a:83:7f:98:46:a2:ea:8d:7c:c4:ab:46:e7:8f:54: 61:5f:c1:45:38:32:f1:4f:08:a1:31:37:c4:b6:fe:bf: 44:8b:f8:37:94:c0:e1:06:2f:05:11:f8:73:ad:12:93: 48:2c:d2:f6:e0:d4:78:dd:d0:51:cf:1c:50:31:cb:e9: cf:da:d2:b1:21:a6:05:42:c8:ec:f8:c9:b6:ab:8d:3f: fe:23:96:17:9e:dd:72:43:e1:b6:ed:ad:d2:15:0b:97: ef:e5:20:99:5b:c2:33:9d:ea:35:42:ad:28:7b:19:ac: 9c:69:a4:36:6c:97:ee:74:75:a2:c9:d9:44:35:c8:be: 7e:66:51:a9:1a:f7:58:ae:cc:00:a7:0d:57:ea:e8:9f: b2:6f:ed:ec:bc:f0:9a:1f:7b:63:c5:af:04:06:c9:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:8d:53:c6:3c:26:a0:a2:04:54:b3:c9:ef:d6:89:10: 56:38:0b:fa:82:8b:b7:37:64:d7:53:ef:9b:f5:d6:13: 21:91:5d:12:18:16:9d:d9:ba:d4:eb:6e:18:ef:5d:dd: 7f:3c:57:e5:fc:22:86:f8:b1:67:f9:fe:af:00:a1:7f: eb:78:71:39:c4:a5:90:21:1a:84:33:40:fb:91:e4:9b: 39:be:ec:09:10:07:cf:c5:73:67:89:c9:75:ab:2b:28: 92:49:48:0d:52:90:56:ea:9f:58:41:5e:6f:53:ca:39: 6c:6d:e9:f9:c7:20:3d:ce:e0:9f:31:03:1a:33:39:d1: ac:05:f3:65:ad:1e:b8:00:44:1a:70:88:a4:ea:16:7d: cc:d9:c4:17:ce:ee:b9:dc:91:ba:d0:a9:2b:b6:62:85: 54:32:fb:32:09:1e:e2:b4:88:ea:80:17:7d:15:f4:13: fe:74:6f:83:07:d0:fe:4e:92:00:8f:75:f0:39:64:ae: 9f:1a:19:d9:1e:a0:54:a2:8a:1a:c9:f3:a2:53:af:76: 8d:b4:d9:43:b7:c6:ac:32:86:56:71:91:ab:58:44:cf: 73:81:76:d3:4e:7c:13:67:16:a2:cf:b2:c8:fa:52:f9: ec:3c:e7:91:5d:dd:d9:c3:5b:ba:50:62:44:bc:77:71 Fingerprint (SHA-256): 0F:61:9E:7E:4D:B6:E3:82:23:A5:AD:ED:02:CA:A3:5E:E5:18:B9:FB:A8:01:7B:68:66:3D:A8:CF:5C:01:55:6A Fingerprint (SHA1): 19:BF:29:C3:E7:CC:27:AB:32:B4:D4:69:58:E9:91:77:D4:56:3F:C8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #9502: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064709 (0x670efc5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Jan 08 12:21:53 2016 Not After : Fri Jan 08 12:21:53 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:18:50:a2:24:0b:ea:58:62:d6:33:65:3b:3c:48:fc: 5e:8b:5b:67:f6:5a:7b:1b:4b:65:4e:8a:82:10:f9:ea: d9:73:81:87:77:e5:5f:cc:41:c4:cb:33:bf:1f:ab:dd: fd:60:b1:fa:65:2a:ee:5b:2b:b4:67:0d:58:e5:18:aa: 13:75:39:07:4a:6f:8d:cd:75:78:13:67:15:42:c2:ae: 70:14:34:23:d4:59:3b:93:b2:f6:98:54:31:d2:a6:03: 2a:32:9f:83:f3:96:fb:8d:49:e1:30:79:a0:9f:65:5a: 25:fa:2a:77:ea:65:a1:95:78:5f:c6:04:5a:80:bb:70: 6f:d3:a3:e5:f7:50:9e:01:e5:18:96:d7:25:08:a6:d6: 81:b8:4e:19:3f:18:49:c1:a4:0c:57:1b:3d:a5:d3:bd: 25:2c:99:d4:e1:39:ef:ad:23:da:e3:3f:e0:03:aa:8a: 20:34:68:92:34:8d:7a:54:a6:47:44:36:57:58:13:56: 46:22:6c:4e:9c:67:5d:e4:7a:ce:37:35:b3:6b:8b:aa: 35:67:c0:a0:76:7c:34:63:62:3b:52:e2:c7:50:8d:e8: 73:67:e3:90:72:22:38:ad:35:5e:56:ec:6a:d1:e6:d1: ae:01:4d:4c:7b:43:20:03:75:5c:37:f5:f9:a4:f9:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:79:e6:45:f9:d9:5b:95:54:17:f8:41:0b:48:5c:ff: e5:e1:42:ad:29:22:e7:d0:eb:63:93:2c:89:2b:0a:d8: 7b:25:9c:bd:bc:d1:09:bb:ec:47:15:1a:9b:56:6f:1f: 5a:39:ee:ed:de:01:bf:cb:b9:41:3d:6d:b3:f2:a0:00: 68:4a:3b:6b:aa:4c:f0:33:ba:08:35:50:94:a6:1e:76: 57:74:d3:ca:b6:52:02:c8:ca:83:b2:f3:41:18:1e:4e: b7:ec:ac:56:ec:c5:a7:c5:e9:dd:af:bf:ad:a8:5d:4e: 23:53:c6:4b:04:46:67:d6:25:7c:86:6f:c8:8c:52:ea: 7e:08:a3:b0:2b:fe:17:0d:70:52:34:25:8c:3e:34:e8: e8:50:21:e8:f9:6e:7d:7d:db:bf:9d:cd:30:54:33:16: 73:b2:b2:3e:3b:9f:dd:03:e2:34:8d:f5:09:00:78:c7: 07:03:04:3d:cd:e5:b8:c3:bf:8f:d0:5e:c1:44:ab:dc: 36:a9:a8:e3:5c:f0:6a:fc:39:94:a1:a9:70:67:4a:97: 7a:e4:34:bf:4b:66:97:35:4e:81:c2:da:7a:63:f2:f1: d6:f4:96:b1:b6:ee:08:80:89:60:c4:26:59:7e:2d:45: 81:38:21:3c:9b:df:2b:66:23:5b:49:9d:67:e7:99:6c Fingerprint (SHA-256): A9:F9:41:2A:E8:18:FA:CF:DB:F3:5B:0A:A3:9E:CC:DA:D5:40:80:3C:E9:FF:52:DF:0E:BF:3D:F5:57:B1:B9:A3 Fingerprint (SHA1): DD:12:44:64:06:71:B0:EE:66:A1:1B:C5:AA:BC:D7:5C:49:02:54:21 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #9503: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064710 (0x670efc6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Jan 08 12:22:11 2016 Not After : Fri Jan 08 12:22:11 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:9e:a5:1e:87:94:fa:8c:fb:b2:48:b0:ad:c0:76:80: 7e:f9:8a:7d:14:a8:18:ce:ad:a9:85:30:85:27:47:98: 09:c5:0d:88:9b:5b:00:d5:bf:1e:26:dd:46:1b:50:71: a0:53:0a:20:83:9e:4d:7b:87:9f:fa:7f:ad:26:76:5b: 88:de:fa:ee:da:a9:2c:ee:36:bf:75:9c:77:dc:53:1a: 82:d8:9a:11:25:8d:15:4e:7f:2a:1a:94:62:14:ec:9d: fb:54:5b:df:35:49:cb:97:ed:f2:c0:d9:b9:ab:d1:5c: 07:81:cf:01:36:84:ce:fd:38:e4:e3:c3:a2:72:c3:45: 7a:68:72:50:5a:a3:fb:cc:0c:7e:04:ab:fd:99:2d:c5: d7:c8:4d:6b:a4:f3:b0:d7:b5:d8:9f:92:2e:42:2e:d5: 04:98:c0:66:98:64:f2:91:19:44:5d:7e:05:aa:e9:fa: b5:b4:88:0d:fb:59:59:d0:c4:fe:6f:d1:30:31:76:e6: 65:9a:17:b0:c3:d3:4f:00:82:94:3a:3c:60:b3:bb:53: c3:15:b3:72:75:0f:0b:c9:83:75:05:e5:02:75:67:4d: ba:e6:b0:2e:a0:5a:92:af:46:a1:29:a1:e6:f2:d2:8c: 21:f6:77:eb:59:01:35:d7:d8:24:c9:f1:0c:72:f7:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:cd:e0:9e:f2:bd:98:58:d5:94:a0:d5:ef:5b:72:24: 3a:48:70:c2:16:b8:c7:d1:4d:af:ff:71:23:d2:d5:ea: 29:ac:1a:cf:73:d0:16:69:e7:6c:bd:44:b4:95:a0:35: d4:42:90:fd:a1:b0:17:6b:05:f7:ce:dd:a2:5f:2c:87: 3c:e4:ee:3d:7f:6d:a8:3d:8c:ee:a1:00:91:01:00:6c: b9:b2:4e:81:22:1d:09:5b:54:29:d4:69:6a:c0:73:b0: ec:dc:0b:f7:00:ae:23:ff:4a:a7:06:80:e9:59:78:e8: 0b:dd:87:7e:ec:b0:dc:e4:db:3d:ca:df:82:ec:48:1d: 24:5e:c5:b5:e6:ed:7a:40:49:20:ea:96:e6:10:77:c4: cf:ea:35:83:68:f2:e9:c2:b6:2a:cb:60:1c:2f:89:85: a6:ff:89:5e:1f:91:80:88:17:3e:bb:9a:0a:45:0b:a7: 96:b5:89:22:05:46:0f:cf:11:02:a1:37:71:dd:81:3f: ab:96:02:a0:f3:60:a0:e2:c3:9c:11:89:1a:55:68:68: 43:e7:5f:9b:72:70:c6:21:fb:7d:35:73:7d:60:6b:f9: 27:c4:96:cc:f3:f6:84:11:a1:3d:22:c1:35:28:7a:4e: 32:da:02:a8:e4:72:9a:6b:04:21:36:65:d5:b8:14:69 Fingerprint (SHA-256): 21:29:5F:CC:41:3A:7C:81:69:AA:94:4C:A0:3E:C5:91:6B:FD:64:3B:97:DB:45:C3:DA:28:09:32:DD:A0:CF:10 Fingerprint (SHA1): 0B:85:34:88:5E:69:1F:4B:92:F8:F0:49:AB:D8:82:7D:90:7E:B4:F2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #9504: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064711 (0x670efc7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Jan 08 12:22:30 2016 Not After : Fri Jan 08 12:22:30 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:03:59:86:ef:1b:fc:5c:17:63:b1:18:11:e2:b7:dd: 56:e9:32:1e:96:9b:c4:d7:22:15:78:fb:53:df:71:19: 26:99:32:0b:62:ba:6b:e3:50:8b:fe:01:39:f0:a5:3a: 1a:49:2e:c6:1f:9b:de:54:9d:81:a9:98:77:a8:98:de: b9:d9:e3:4f:86:4a:87:31:c6:e2:49:09:1b:2a:47:9e: 38:98:a9:07:f9:b4:7a:b4:5c:dc:2c:72:38:89:6b:59: 36:33:36:13:78:dc:66:44:da:4c:61:b6:1d:64:3e:4f: 0d:a4:11:bf:4b:bc:03:ac:12:bb:01:72:9c:0b:3c:15: 87:18:9e:9e:ef:22:cc:db:f1:05:3a:f2:82:5c:3d:a3: ea:69:20:8b:89:ff:41:c0:4f:73:72:73:27:c0:a9:95: 32:a8:e5:78:94:f5:49:99:9e:e7:63:60:49:a0:31:ae: 94:a8:26:4a:66:87:3c:96:1e:73:ad:aa:f8:dd:a7:04: 31:f3:47:f6:91:4e:3b:6d:dc:41:d6:49:83:c3:0a:4f: 01:2b:5e:53:b3:e3:8b:00:02:0e:2f:40:e9:45:6f:9d: 7a:3a:68:26:e9:75:d3:8d:4e:52:ba:37:fb:37:23:ae: 14:3b:15:dd:8a:d5:71:b1:98:e5:15:b5:eb:bf:e1:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cc:b1:eb:0a:47:fb:14:43:6e:54:7c:31:06:ba:66:02: f2:06:44:e5:99:fd:17:58:21:ac:16:13:9f:dc:60:5c: fe:08:6b:1a:07:96:6d:26:73:9f:2c:ea:33:21:97:8b: 98:97:79:09:7e:a8:5b:e6:c6:82:33:6b:6d:63:f6:b1: 51:0f:0e:5d:3f:66:06:ef:48:9b:4b:81:9e:d0:a9:89: 35:92:89:b4:bc:17:4a:37:ee:03:fd:f5:e9:c2:17:0c: a6:be:e9:75:c8:8a:fd:6c:58:27:46:7b:6a:7e:44:1c: 27:ec:06:c6:e1:4f:43:b8:23:4e:03:ec:b1:f1:56:3d: 59:7e:84:e2:7e:7d:73:7b:a6:d3:be:b9:81:91:c2:64: c9:5e:f6:d4:0d:91:50:d9:8f:03:3d:b8:4b:42:e9:1b: 8a:73:1e:53:d6:49:f1:c5:ee:66:1b:25:83:cb:b5:92: 31:9c:c4:1d:36:d2:bd:df:65:dd:4a:b7:ba:da:f3:fe: 14:33:f5:43:39:1e:4e:62:fd:c4:d9:91:44:87:e8:7d: 89:76:8c:24:b3:56:89:9f:5b:8a:62:b4:d5:bc:59:22: 40:71:0f:8f:cd:3c:d7:c8:3e:e2:c5:57:88:ec:50:48: a5:74:ae:4b:b7:4d:ec:45:39:4a:48:7d:b6:0c:dd:0a Fingerprint (SHA-256): A9:98:B9:38:C1:A4:82:F6:26:2C:F4:69:15:91:16:5E:60:A1:21:A8:D1:1D:EF:FB:5E:61:28:80:9D:8D:16:1A Fingerprint (SHA1): 70:C1:BE:C6:AE:02:ED:EF:76:4D:B6:38:31:B8:99:9B:1D:95:30:D8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #9505: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9506: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064726 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9507: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9508: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9509: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9510: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108064727 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9511: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9512: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9513: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9514: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108064728 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9515: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9516: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #9517: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9518: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108064729 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9519: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9520: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9521: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064726 (0x670efd6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:24:00 2016 Not After : Fri Jan 08 12:24:00 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:20:49:2d:63:c8:59:e1:6d:57:49:08:c4:4d:6a:84: 4e:a9:98:71:33:13:20:78:1b:27:fe:32:1c:9b:18:29: a6:21:f0:e4:2e:43:38:95:2b:4d:59:4a:a4:6b:8b:03: 02:dd:19:82:2a:d8:87:4e:d0:49:a9:89:12:81:74:c4: d3:49:4f:ad:83:54:a7:76:f8:e3:59:ff:9d:32:1b:0b: a7:a2:47:39:59:66:3c:21:50:47:92:a9:10:27:7f:ac: f3:78:a3:ab:8d:16:14:ca:1b:03:44:ad:2e:98:a8:8f: ed:25:10:76:1a:66:d4:b0:63:e1:57:93:82:43:29:24: 4e:a0:be:6e:d3:de:ac:45:25:b0:ce:f8:fd:74:79:45: 83:d8:1a:fc:4c:3f:8f:5c:05:3f:74:62:13:42:a5:8b: 28:6a:5b:7e:b8:83:ee:d4:78:8b:8e:85:43:36:d6:27: ee:79:8a:d6:73:8f:1d:5f:e4:7e:a2:3b:44:93:49:cf: a1:9f:da:5f:72:80:a9:0c:06:de:49:94:13:fc:a3:ad: 19:0d:be:2a:cc:ba:3c:67:a6:01:fa:43:3b:84:27:93: 2d:01:48:92:22:16:03:05:86:b8:a3:8a:e9:1c:aa:c5: 6c:da:ee:25:42:20:0a:b3:d2:37:4c:25:d2:5a:db:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:32:95:17:ad:a5:1c:f8:26:23:1f:b5:d2:0e:16:9b: ea:49:5f:b1:e5:95:e4:78:19:89:fd:cf:35:fa:5c:71: 44:72:2a:69:9c:8e:2f:c2:6f:8a:47:ce:32:44:ad:9c: 74:60:63:37:7a:64:65:dd:32:5e:2b:7e:de:67:ba:26: 86:ee:c8:e4:11:70:df:cd:57:05:8e:d7:5d:cf:7c:02: e3:0c:d9:e7:43:c4:e7:c5:89:10:6e:e4:05:8c:ae:4c: c9:0f:bc:7d:84:a6:63:a7:3c:f1:ef:a9:25:11:a8:57: 71:6a:0a:8a:34:d7:84:3b:29:8c:8b:7b:34:68:36:24: fa:2c:5d:7b:4b:f7:9e:93:d9:e8:02:dd:cd:9b:de:1f: 46:c7:28:b3:db:21:0e:a9:3f:6e:86:ed:ca:60:d3:d3: a2:9a:28:c4:9b:3f:dc:9f:cb:77:1f:94:b9:6d:7c:8f: 5b:38:1a:73:a4:04:5c:75:46:21:b2:d3:ee:2a:5d:16: 7d:d0:3a:84:0f:84:f3:66:1b:10:0a:fc:79:16:92:13: 2d:70:87:3a:78:74:72:9d:44:d4:81:de:d3:34:3e:d8: bf:16:8a:ce:50:8a:f6:ca:25:3e:12:57:61:1b:be:40: 34:f6:aa:05:5e:ed:5d:f3:e4:45:78:09:86:52:45:f2 Fingerprint (SHA-256): 1E:9F:E9:47:1E:BF:74:50:3E:94:BA:DC:FE:F8:A7:38:B2:85:78:EB:C8:DF:AA:21:06:9F:D3:AB:A9:20:8D:86 Fingerprint (SHA1): CC:B9:19:95:4E:62:1A:BF:3D:64:47:22:02:EC:48:F5:53:07:77:EC Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9522: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9523: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064727 (0x670efd7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:24:14 2016 Not After : Fri Jan 08 12:24:14 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:93:46:bb:f6:b2:f2:0e:7f:2f:90:0f:3b:c0:f4:9b: b9:fb:1d:c3:b7:99:33:0e:73:87:07:07:5e:4b:fe:f3: a0:fa:ce:a8:be:ab:f5:d5:1a:f9:44:e1:fa:c1:7c:40: 2c:43:95:be:ac:0c:63:a7:fc:6b:1e:df:b1:fe:6a:14: 20:15:28:3a:fb:9a:df:8c:ab:4f:a6:2a:3a:89:ff:26: be:99:bd:15:b4:26:cc:78:7e:26:be:fa:33:29:72:d0: d4:71:91:1a:73:c3:2c:bb:21:53:a0:e3:60:96:7b:d4: 5f:92:8c:ec:ba:6f:75:f7:84:78:1b:7b:e8:a2:f2:7c: d7:5c:90:57:b9:89:77:51:59:c8:b9:74:97:68:d1:2d: 59:49:92:a3:e1:4c:46:0f:b5:ef:4c:0a:08:ed:d6:f1: ca:b8:66:f1:06:3e:74:0b:54:49:46:8e:78:65:df:19: 94:33:e6:7b:fa:ca:28:a6:fc:d9:7e:e6:fb:c1:bb:65: 9e:0e:41:b8:97:ec:3d:9d:8b:2a:f3:fd:74:24:c9:d1: 3f:9d:9b:30:c8:83:73:4a:58:eb:50:44:ff:36:b0:d9: 7f:a1:f7:2e:bc:72:5a:08:11:66:42:5b:4f:06:e1:60: 33:38:a8:0b:92:e0:88:e1:2b:31:26:0c:92:15:b7:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:cf:64:81:d7:7e:1e:f9:77:78:1e:60:0e:34:6d:b3: 77:3e:6c:18:78:8b:af:c3:05:fc:e8:39:4e:0e:c5:62: 38:bc:a7:2b:3d:80:a4:ef:71:24:19:3e:9b:66:e8:df: be:69:3c:49:02:15:3f:03:b6:70:26:35:9b:e5:af:1c: 29:6e:b1:d1:f7:14:d4:7a:a3:25:b2:50:d0:90:4d:66: b5:e4:7d:46:64:86:af:60:7d:9a:ea:58:97:7c:af:71: de:76:cf:73:a2:34:02:a1:2b:99:33:16:70:5a:33:0e: 73:fb:b6:56:5a:7b:42:5c:49:d9:08:b8:8b:60:02:08: be:d7:82:c7:a5:be:72:d8:54:0f:ee:3a:40:5c:16:72: 70:1e:32:51:10:31:9d:b3:cd:a1:30:5d:b2:f4:20:2e: 38:4a:92:d4:8d:d5:6b:8f:92:97:8c:41:b2:84:2f:05: a0:dc:fc:2c:f0:93:a6:0b:2d:42:68:4d:db:7c:7d:6f: ae:73:cd:86:5d:f6:be:92:61:80:95:54:1d:d3:58:5f: 30:de:6f:17:dc:4d:80:36:78:61:7d:3e:70:06:66:34: 62:23:25:95:ca:f1:f3:fb:7b:56:d9:f5:1d:2b:e0:a0: bb:20:df:7c:ae:ab:6f:86:83:b6:5a:2c:24:4d:f1:a2 Fingerprint (SHA-256): 98:88:6B:E1:8C:5F:02:6A:B5:EB:9C:C8:90:3C:43:4B:B8:99:94:98:3D:DA:E1:3F:E2:F6:26:19:D8:AA:05:85 Fingerprint (SHA1): C3:7C:44:A5:A9:AE:C8:FA:25:35:8C:E0:5A:0D:5A:37:86:D6:E8:D5 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9524: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9525: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064728 (0x670efd8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 12:24:22 2016 Not After : Fri Jan 08 12:24:22 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:4e:98:c8:37:01:8b:d4:9a:8e:8d:ed:73:20:bb:02: a3:4b:26:28:58:ec:62:59:c4:5e:24:30:1f:15:96:ad: 1b:23:27:64:89:d1:d0:49:c2:d7:75:93:47:94:4a:42: 07:97:7c:2b:5b:50:f9:a7:06:28:16:ff:cc:1c:13:f2: 09:e9:48:2f:77:60:78:c0:60:70:09:35:21:77:b3:fe: 73:dd:42:f2:86:59:49:7b:4a:52:55:f2:5c:3d:49:48: 1a:3f:4c:2e:d6:92:30:3a:f5:2d:43:e5:5e:b2:6f:96: e2:e5:19:d7:ac:fc:ea:31:9e:bd:5b:e4:bb:49:26:1e: aa:df:1c:fe:f8:cd:cc:f8:55:28:3d:86:31:3a:ea:90: 5f:b5:42:d2:41:31:32:68:aa:d9:fa:86:7b:9d:d7:ed: c6:b1:eb:b2:50:71:5a:11:4b:6c:d9:49:5e:f3:b9:02: 96:61:a9:3f:bb:e6:a6:34:83:20:73:b7:1b:66:14:88: 37:16:15:39:e5:9f:86:4d:4f:a8:8f:75:af:13:1f:12: 8b:c9:60:03:6c:99:af:04:bb:01:df:5d:57:f3:22:56: 2e:3e:bd:a5:d3:e9:1d:78:18:ce:a5:13:2e:7d:12:2b: cf:3a:a2:f7:97:ff:1a:f2:b4:55:b5:7f:e6:79:b9:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:da:1b:8a:d8:43:1f:ab:84:f5:78:b9:0e:d9:cd:8e: 71:fb:99:4a:04:2c:48:51:11:4b:49:52:35:f8:73:c8: ca:92:20:cd:62:3a:6f:1d:0b:4e:e2:95:90:7b:9b:48: ee:a6:f4:f6:16:a0:f5:b4:35:94:57:d5:04:99:ac:18: be:7c:92:c5:df:2d:55:16:f1:ee:78:ef:37:61:d7:c6: 4e:7f:16:d0:16:68:2a:82:b1:32:6b:a0:16:c9:69:e3: 03:74:38:8c:c5:b9:9d:8d:2c:f4:39:ad:a7:5e:e7:56: df:fc:ec:3a:3f:36:a5:9c:95:a2:ab:90:0b:68:02:9a: c5:91:07:80:67:54:21:13:50:d4:06:33:5f:e7:2a:37: 9a:18:5c:0c:e5:37:5d:eb:ac:93:f8:38:1c:e7:da:52: dd:1a:48:43:9a:37:95:fa:f9:6e:9d:00:5d:37:72:e0: b3:a6:6e:79:a3:df:f1:70:d0:60:4d:e2:fd:12:ff:f3: ca:38:10:16:e5:39:3d:15:1a:9d:c7:ec:01:12:3d:39: 8b:ce:bd:f9:b0:0a:f7:a1:62:83:00:05:21:51:32:a0: 61:97:9b:51:43:a1:2e:42:cc:5b:bc:b9:aa:00:05:ce: f8:63:5b:60:59:70:b2:5d:69:7b:82:6d:c4:52:e4:52 Fingerprint (SHA-256): D4:E6:6A:9A:16:34:47:AF:5E:A0:C9:00:AA:71:B9:7E:B8:3B:41:74:2A:7D:27:DA:A9:18:72:25:5B:C5:4F:D2 Fingerprint (SHA1): 4D:68:64:E3:12:E3:3D:2A:9C:E1:45:7F:20:9B:FD:A3:44:31:5C:8C Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #9526: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9527: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #9528: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #9529: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #9530: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064726 (0x670efd6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:24:00 2016 Not After : Fri Jan 08 12:24:00 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:20:49:2d:63:c8:59:e1:6d:57:49:08:c4:4d:6a:84: 4e:a9:98:71:33:13:20:78:1b:27:fe:32:1c:9b:18:29: a6:21:f0:e4:2e:43:38:95:2b:4d:59:4a:a4:6b:8b:03: 02:dd:19:82:2a:d8:87:4e:d0:49:a9:89:12:81:74:c4: d3:49:4f:ad:83:54:a7:76:f8:e3:59:ff:9d:32:1b:0b: a7:a2:47:39:59:66:3c:21:50:47:92:a9:10:27:7f:ac: f3:78:a3:ab:8d:16:14:ca:1b:03:44:ad:2e:98:a8:8f: ed:25:10:76:1a:66:d4:b0:63:e1:57:93:82:43:29:24: 4e:a0:be:6e:d3:de:ac:45:25:b0:ce:f8:fd:74:79:45: 83:d8:1a:fc:4c:3f:8f:5c:05:3f:74:62:13:42:a5:8b: 28:6a:5b:7e:b8:83:ee:d4:78:8b:8e:85:43:36:d6:27: ee:79:8a:d6:73:8f:1d:5f:e4:7e:a2:3b:44:93:49:cf: a1:9f:da:5f:72:80:a9:0c:06:de:49:94:13:fc:a3:ad: 19:0d:be:2a:cc:ba:3c:67:a6:01:fa:43:3b:84:27:93: 2d:01:48:92:22:16:03:05:86:b8:a3:8a:e9:1c:aa:c5: 6c:da:ee:25:42:20:0a:b3:d2:37:4c:25:d2:5a:db:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:32:95:17:ad:a5:1c:f8:26:23:1f:b5:d2:0e:16:9b: ea:49:5f:b1:e5:95:e4:78:19:89:fd:cf:35:fa:5c:71: 44:72:2a:69:9c:8e:2f:c2:6f:8a:47:ce:32:44:ad:9c: 74:60:63:37:7a:64:65:dd:32:5e:2b:7e:de:67:ba:26: 86:ee:c8:e4:11:70:df:cd:57:05:8e:d7:5d:cf:7c:02: e3:0c:d9:e7:43:c4:e7:c5:89:10:6e:e4:05:8c:ae:4c: c9:0f:bc:7d:84:a6:63:a7:3c:f1:ef:a9:25:11:a8:57: 71:6a:0a:8a:34:d7:84:3b:29:8c:8b:7b:34:68:36:24: fa:2c:5d:7b:4b:f7:9e:93:d9:e8:02:dd:cd:9b:de:1f: 46:c7:28:b3:db:21:0e:a9:3f:6e:86:ed:ca:60:d3:d3: a2:9a:28:c4:9b:3f:dc:9f:cb:77:1f:94:b9:6d:7c:8f: 5b:38:1a:73:a4:04:5c:75:46:21:b2:d3:ee:2a:5d:16: 7d:d0:3a:84:0f:84:f3:66:1b:10:0a:fc:79:16:92:13: 2d:70:87:3a:78:74:72:9d:44:d4:81:de:d3:34:3e:d8: bf:16:8a:ce:50:8a:f6:ca:25:3e:12:57:61:1b:be:40: 34:f6:aa:05:5e:ed:5d:f3:e4:45:78:09:86:52:45:f2 Fingerprint (SHA-256): 1E:9F:E9:47:1E:BF:74:50:3E:94:BA:DC:FE:F8:A7:38:B2:85:78:EB:C8:DF:AA:21:06:9F:D3:AB:A9:20:8D:86 Fingerprint (SHA1): CC:B9:19:95:4E:62:1A:BF:3D:64:47:22:02:EC:48:F5:53:07:77:EC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9531: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9532: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064727 (0x670efd7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:24:14 2016 Not After : Fri Jan 08 12:24:14 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:93:46:bb:f6:b2:f2:0e:7f:2f:90:0f:3b:c0:f4:9b: b9:fb:1d:c3:b7:99:33:0e:73:87:07:07:5e:4b:fe:f3: a0:fa:ce:a8:be:ab:f5:d5:1a:f9:44:e1:fa:c1:7c:40: 2c:43:95:be:ac:0c:63:a7:fc:6b:1e:df:b1:fe:6a:14: 20:15:28:3a:fb:9a:df:8c:ab:4f:a6:2a:3a:89:ff:26: be:99:bd:15:b4:26:cc:78:7e:26:be:fa:33:29:72:d0: d4:71:91:1a:73:c3:2c:bb:21:53:a0:e3:60:96:7b:d4: 5f:92:8c:ec:ba:6f:75:f7:84:78:1b:7b:e8:a2:f2:7c: d7:5c:90:57:b9:89:77:51:59:c8:b9:74:97:68:d1:2d: 59:49:92:a3:e1:4c:46:0f:b5:ef:4c:0a:08:ed:d6:f1: ca:b8:66:f1:06:3e:74:0b:54:49:46:8e:78:65:df:19: 94:33:e6:7b:fa:ca:28:a6:fc:d9:7e:e6:fb:c1:bb:65: 9e:0e:41:b8:97:ec:3d:9d:8b:2a:f3:fd:74:24:c9:d1: 3f:9d:9b:30:c8:83:73:4a:58:eb:50:44:ff:36:b0:d9: 7f:a1:f7:2e:bc:72:5a:08:11:66:42:5b:4f:06:e1:60: 33:38:a8:0b:92:e0:88:e1:2b:31:26:0c:92:15:b7:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:cf:64:81:d7:7e:1e:f9:77:78:1e:60:0e:34:6d:b3: 77:3e:6c:18:78:8b:af:c3:05:fc:e8:39:4e:0e:c5:62: 38:bc:a7:2b:3d:80:a4:ef:71:24:19:3e:9b:66:e8:df: be:69:3c:49:02:15:3f:03:b6:70:26:35:9b:e5:af:1c: 29:6e:b1:d1:f7:14:d4:7a:a3:25:b2:50:d0:90:4d:66: b5:e4:7d:46:64:86:af:60:7d:9a:ea:58:97:7c:af:71: de:76:cf:73:a2:34:02:a1:2b:99:33:16:70:5a:33:0e: 73:fb:b6:56:5a:7b:42:5c:49:d9:08:b8:8b:60:02:08: be:d7:82:c7:a5:be:72:d8:54:0f:ee:3a:40:5c:16:72: 70:1e:32:51:10:31:9d:b3:cd:a1:30:5d:b2:f4:20:2e: 38:4a:92:d4:8d:d5:6b:8f:92:97:8c:41:b2:84:2f:05: a0:dc:fc:2c:f0:93:a6:0b:2d:42:68:4d:db:7c:7d:6f: ae:73:cd:86:5d:f6:be:92:61:80:95:54:1d:d3:58:5f: 30:de:6f:17:dc:4d:80:36:78:61:7d:3e:70:06:66:34: 62:23:25:95:ca:f1:f3:fb:7b:56:d9:f5:1d:2b:e0:a0: bb:20:df:7c:ae:ab:6f:86:83:b6:5a:2c:24:4d:f1:a2 Fingerprint (SHA-256): 98:88:6B:E1:8C:5F:02:6A:B5:EB:9C:C8:90:3C:43:4B:B8:99:94:98:3D:DA:E1:3F:E2:F6:26:19:D8:AA:05:85 Fingerprint (SHA1): C3:7C:44:A5:A9:AE:C8:FA:25:35:8C:E0:5A:0D:5A:37:86:D6:E8:D5 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9533: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9534: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064728 (0x670efd8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 12:24:22 2016 Not After : Fri Jan 08 12:24:22 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:4e:98:c8:37:01:8b:d4:9a:8e:8d:ed:73:20:bb:02: a3:4b:26:28:58:ec:62:59:c4:5e:24:30:1f:15:96:ad: 1b:23:27:64:89:d1:d0:49:c2:d7:75:93:47:94:4a:42: 07:97:7c:2b:5b:50:f9:a7:06:28:16:ff:cc:1c:13:f2: 09:e9:48:2f:77:60:78:c0:60:70:09:35:21:77:b3:fe: 73:dd:42:f2:86:59:49:7b:4a:52:55:f2:5c:3d:49:48: 1a:3f:4c:2e:d6:92:30:3a:f5:2d:43:e5:5e:b2:6f:96: e2:e5:19:d7:ac:fc:ea:31:9e:bd:5b:e4:bb:49:26:1e: aa:df:1c:fe:f8:cd:cc:f8:55:28:3d:86:31:3a:ea:90: 5f:b5:42:d2:41:31:32:68:aa:d9:fa:86:7b:9d:d7:ed: c6:b1:eb:b2:50:71:5a:11:4b:6c:d9:49:5e:f3:b9:02: 96:61:a9:3f:bb:e6:a6:34:83:20:73:b7:1b:66:14:88: 37:16:15:39:e5:9f:86:4d:4f:a8:8f:75:af:13:1f:12: 8b:c9:60:03:6c:99:af:04:bb:01:df:5d:57:f3:22:56: 2e:3e:bd:a5:d3:e9:1d:78:18:ce:a5:13:2e:7d:12:2b: cf:3a:a2:f7:97:ff:1a:f2:b4:55:b5:7f:e6:79:b9:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:da:1b:8a:d8:43:1f:ab:84:f5:78:b9:0e:d9:cd:8e: 71:fb:99:4a:04:2c:48:51:11:4b:49:52:35:f8:73:c8: ca:92:20:cd:62:3a:6f:1d:0b:4e:e2:95:90:7b:9b:48: ee:a6:f4:f6:16:a0:f5:b4:35:94:57:d5:04:99:ac:18: be:7c:92:c5:df:2d:55:16:f1:ee:78:ef:37:61:d7:c6: 4e:7f:16:d0:16:68:2a:82:b1:32:6b:a0:16:c9:69:e3: 03:74:38:8c:c5:b9:9d:8d:2c:f4:39:ad:a7:5e:e7:56: df:fc:ec:3a:3f:36:a5:9c:95:a2:ab:90:0b:68:02:9a: c5:91:07:80:67:54:21:13:50:d4:06:33:5f:e7:2a:37: 9a:18:5c:0c:e5:37:5d:eb:ac:93:f8:38:1c:e7:da:52: dd:1a:48:43:9a:37:95:fa:f9:6e:9d:00:5d:37:72:e0: b3:a6:6e:79:a3:df:f1:70:d0:60:4d:e2:fd:12:ff:f3: ca:38:10:16:e5:39:3d:15:1a:9d:c7:ec:01:12:3d:39: 8b:ce:bd:f9:b0:0a:f7:a1:62:83:00:05:21:51:32:a0: 61:97:9b:51:43:a1:2e:42:cc:5b:bc:b9:aa:00:05:ce: f8:63:5b:60:59:70:b2:5d:69:7b:82:6d:c4:52:e4:52 Fingerprint (SHA-256): D4:E6:6A:9A:16:34:47:AF:5E:A0:C9:00:AA:71:B9:7E:B8:3B:41:74:2A:7D:27:DA:A9:18:72:25:5B:C5:4F:D2 Fingerprint (SHA1): 4D:68:64:E3:12:E3:3D:2A:9C:E1:45:7F:20:9B:FD:A3:44:31:5C:8C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #9535: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9536: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9537: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064730 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9538: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9539: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9540: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9541: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108064731 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9542: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9543: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9544: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9545: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108064732 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9546: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9547: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #9548: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9549: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108064733 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9550: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9551: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #9552: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9553: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108064734 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9554: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9555: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9556: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064730 (0x670efda) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:24:55 2016 Not After : Fri Jan 08 12:24:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:10:fc:23:48:77:6b:79:05:ae:d6:2a:72:12:0f:c2: 96:98:55:5e:82:ae:f6:88:0f:12:dc:85:2d:75:97:57: ef:3a:ab:a3:c7:55:59:1e:64:a9:7e:22:77:73:02:63: 7a:83:d3:6e:bb:8e:d0:dc:f2:75:57:c1:61:94:94:43: fd:d4:f6:e5:f0:43:46:45:45:06:06:f6:b2:93:44:15: 48:88:38:93:ee:5a:3c:c3:39:a3:97:24:4d:93:05:aa: ed:dc:a7:e7:17:ea:1e:9f:9e:6e:76:cf:d8:ae:b8:45: 11:06:3b:3f:50:69:65:c9:8d:72:8f:2b:12:f7:40:90: 53:e3:76:ea:07:1d:4c:11:34:bb:e4:6e:fd:f9:ec:83: 96:36:7c:07:30:1d:15:8a:28:4a:a1:17:71:50:ed:9e: bd:a6:29:0c:61:77:fc:b6:cc:8d:7a:ed:18:00:7f:62: f7:38:1d:f8:3e:59:4a:db:e5:60:97:ad:1b:56:b2:d6: 52:45:13:88:77:35:6f:9f:4c:18:e9:6f:b7:a6:74:55: e8:a4:a3:86:24:a7:d4:e6:76:c4:78:f2:11:a6:22:d6: 56:a6:e6:7a:77:3f:b4:3f:12:72:6c:f6:d6:6f:ca:ce: 78:2e:c0:34:b7:10:05:30:cd:57:c5:01:8d:28:68:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:62:79:00:82:25:03:63:27:30:b2:db:1d:7c:61:2a: 05:ca:1f:a5:f0:67:0f:f8:d5:14:40:f9:60:3c:c5:4e: 6e:e0:c3:13:dc:55:c6:d6:bc:96:df:95:3d:45:8f:5e: 83:dd:2d:d6:39:d3:26:fb:5b:4c:86:09:48:16:0b:97: 4b:5b:04:b4:c3:0b:bf:6d:c0:02:a5:c8:3c:25:4d:9f: f5:40:b8:cb:99:95:00:8a:ad:1b:21:c6:f5:9d:96:21: c4:03:81:12:ba:e1:82:90:76:d4:bf:71:e6:44:4f:8a: f5:4a:ca:a3:18:21:f4:49:e4:31:26:38:b9:d3:4a:c0: c9:cb:15:5c:b6:a5:90:a1:b2:d3:30:af:08:59:bf:fc: bc:b8:5b:f2:4f:ff:d2:9e:54:0a:ea:57:14:6c:94:d5: 25:52:35:d9:89:83:31:d5:b5:c1:23:39:a4:b1:5d:86: 75:ac:37:d8:b3:ff:f2:84:ac:3c:e5:11:32:60:64:c5: ae:2e:eb:4b:4d:ef:e7:25:ba:4c:bc:f2:88:08:77:ea: e8:da:49:a9:f2:1e:fe:b0:d9:4a:83:1a:f3:3d:48:f2: 38:fd:d1:f9:e3:df:14:b4:2e:40:94:eb:3d:5e:85:b3: 65:86:7d:fa:d3:3b:fa:af:63:85:18:fc:1c:d3:26:5c Fingerprint (SHA-256): 2B:14:78:89:96:7F:7B:05:E5:75:EE:B2:06:55:40:75:95:C0:9A:12:64:49:32:0D:65:3A:79:9A:28:19:15:7C Fingerprint (SHA1): FC:73:93:0C:DE:8C:C3:99:90:63:28:10:EA:7A:A0:16:E1:0D:A7:F3 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9557: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9558: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064731 (0x670efdb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:25:01 2016 Not After : Fri Jan 08 12:25:01 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:3a:ca:3a:51:ce:9b:4f:cf:50:e5:6c:a3:e6:63:0d: df:d6:25:32:7b:d3:37:8e:b0:01:64:c7:d8:d9:dc:b2: 68:fc:1c:fb:f3:c6:fb:f5:a1:ff:e7:c2:ed:db:f1:05: 80:cd:c5:aa:ee:4d:ee:0b:49:58:b1:6a:0c:45:0c:ff: 44:d3:3c:10:e5:9c:cf:ad:55:f3:c6:a4:64:83:2f:95: 61:02:a2:22:3c:9b:11:65:b5:71:aa:d4:2d:db:14:00: 6c:8a:7e:3a:9d:10:2b:9c:c4:49:f4:62:3a:81:81:75: 02:e5:05:c8:3b:00:f0:4a:51:4a:1d:ac:24:8f:dc:e1: 23:7e:15:24:b1:04:c4:94:4f:99:18:c3:b6:34:75:0a: 73:5f:c8:67:7d:00:e2:cb:84:bd:f6:bc:0d:7b:de:66: a5:2d:90:3d:3d:48:d0:bd:65:77:0a:a7:2e:bb:d1:18: 6f:fe:05:80:82:19:12:79:79:0b:06:42:21:bf:a6:6e: 3a:7c:23:ff:c8:08:ae:44:c9:6e:3a:b3:49:b4:da:e1: 6c:1d:23:5c:4d:60:bd:fc:b2:af:6f:d0:20:b5:2a:c8: 8e:40:4f:cc:9b:98:a3:58:0b:1f:25:34:5e:f0:4d:e6: e8:df:d4:b4:3b:0f:4f:17:24:09:29:dc:aa:c8:bf:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:28:23:07:a5:75:66:b7:37:17:d1:e4:63:86:68:aa: 8f:06:1a:42:1c:2c:a8:fa:7f:cb:08:e5:e6:2f:1d:55: b2:71:ab:0c:e5:96:97:e1:c1:4a:ad:4e:5f:07:e1:8a: 3e:8a:68:5c:05:87:71:90:a2:c6:7d:8e:cc:30:25:d3: b1:5f:8d:30:85:bd:ec:12:d3:20:17:a7:79:67:b9:4d: d5:4c:8e:f9:e0:8c:74:68:8e:8b:8a:b6:bb:5b:c8:6e: dc:50:7e:65:89:a4:28:bd:ae:49:88:99:b1:a1:7c:96: b5:a8:6a:29:2f:a3:1c:03:31:fd:7f:c1:c8:86:c0:47: 0a:23:1b:f6:1c:ad:3a:a0:ec:83:55:2c:91:44:e2:d6: 06:bf:ab:54:20:48:0b:37:60:66:83:a6:68:d7:22:3e: d1:97:df:16:04:86:75:74:d8:bb:dc:d9:9d:95:ad:7d: 28:c3:cf:54:a0:e7:e6:be:f5:78:ee:70:c3:cc:45:62: 18:29:15:d9:46:1f:71:3e:d1:38:9a:cd:da:a5:d1:80: 3d:4d:88:67:be:a4:d8:90:d8:72:9c:68:95:9d:b6:09: a8:0a:b5:0f:63:93:f5:36:be:a5:c2:16:51:d2:92:53: 08:a4:4d:3a:7b:60:f5:fd:d7:a3:6a:c6:3a:0f:aa:fd Fingerprint (SHA-256): 78:0E:34:D0:58:74:1E:ED:5D:B8:1B:D1:DF:37:95:7B:8C:68:3D:E5:DD:60:68:09:66:02:40:39:18:FD:65:52 Fingerprint (SHA1): F2:2F:E4:D6:C3:64:4B:4E:31:C3:81:82:21:2E:B9:19:BC:9A:54:BA Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9559: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9560: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064732 (0x670efdc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 12:25:06 2016 Not After : Fri Jan 08 12:25:06 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:e2:ae:0c:b1:67:a7:a7:1e:cd:1e:65:6a:4f:86:25: 07:46:47:ed:2d:b6:c9:fe:bc:7a:2e:c6:a7:84:38:b9: 26:45:ed:15:aa:df:02:1a:9d:6f:ae:6a:be:25:68:e5: bd:75:e9:5f:99:ec:c0:43:bd:ea:c4:cb:59:58:57:46: 0e:bf:ce:78:2a:62:5b:7b:b6:67:10:0e:b9:69:16:33: 31:63:77:4f:9d:4f:6f:8a:6a:55:63:20:df:b0:1f:8c: d9:b7:a1:57:fd:a4:ec:3b:53:5f:7a:c1:0b:02:4d:ac: 4d:ae:5b:b5:c9:ef:49:16:89:89:63:57:dc:46:17:46: f8:c2:ec:cb:07:a5:ec:a6:24:a4:62:17:5c:69:9b:03: db:cc:82:a4:44:4a:8b:07:30:16:0a:7d:e4:9f:8c:ce: 22:b2:10:79:b8:03:ba:79:a1:93:51:a4:df:fe:06:a7: 12:2a:15:39:97:a0:cd:75:54:2a:09:2c:a0:80:6a:6f: 1d:83:9b:09:84:27:59:51:f4:22:d3:00:cb:5c:2f:a8: d8:c0:dd:70:49:1e:7a:6f:e0:de:1d:26:44:74:d4:14: 08:d0:68:11:ab:c3:6c:1f:04:de:5e:39:c9:cf:21:07: 74:41:28:53:fb:30:99:99:f3:71:dc:c8:29:e2:5f:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c0:36:f7:33:12:78:e0:ed:b5:94:ad:0e:91:48:8a:a0: 9e:ca:fc:a3:56:46:8d:57:23:ff:9f:65:a1:62:bd:94: df:af:80:64:9c:b4:df:43:57:87:b4:0f:ab:f2:09:0c: e5:7f:9d:a8:fc:7e:ff:e9:ba:c2:50:27:f0:51:44:b3: ed:d9:e7:0a:18:03:23:6c:50:39:f0:30:08:75:bb:24: 83:88:bf:b8:8a:a6:05:31:4d:26:b5:82:c4:c3:fe:f7: 0e:00:c1:d5:c2:ee:ed:77:10:ca:5b:b7:b6:6d:2f:dd: 9a:87:ac:41:b9:d9:49:b5:e1:9a:8c:37:13:bc:c6:73: 6c:94:41:e7:55:df:db:9c:c5:44:cc:f0:e3:e9:0d:89: 26:a1:7a:a5:10:84:a6:ff:42:57:8f:49:9a:78:8b:b3: 63:d7:86:ba:4b:6c:0b:f8:de:32:c3:e9:2b:72:96:eb: 05:61:94:c3:b0:be:33:6e:59:df:e9:6e:90:70:68:45: 5e:fd:37:10:70:51:70:2a:81:b1:1b:ce:0a:88:62:b0: 3f:a2:5d:44:09:e0:2b:e2:db:b3:fa:5a:e8:08:08:f2: 78:cf:9c:52:88:b3:f4:50:06:1e:bf:81:8c:43:b6:87: 10:5d:21:9b:f2:35:55:6a:d1:8b:51:38:9c:09:4f:64 Fingerprint (SHA-256): A8:A5:08:61:F0:87:C3:0C:4E:C8:E3:91:FE:3A:78:14:49:B6:8E:6D:F1:32:CC:3B:A7:A5:52:0D:0B:B6:BB:22 Fingerprint (SHA1): 7C:39:E9:58:21:98:E6:A0:18:1C:54:A3:1F:19:F3:78:FD:1A:D6:CA Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #9561: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9562: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #9563: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #9564: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #9565: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064730 (0x670efda) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:24:55 2016 Not After : Fri Jan 08 12:24:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:10:fc:23:48:77:6b:79:05:ae:d6:2a:72:12:0f:c2: 96:98:55:5e:82:ae:f6:88:0f:12:dc:85:2d:75:97:57: ef:3a:ab:a3:c7:55:59:1e:64:a9:7e:22:77:73:02:63: 7a:83:d3:6e:bb:8e:d0:dc:f2:75:57:c1:61:94:94:43: fd:d4:f6:e5:f0:43:46:45:45:06:06:f6:b2:93:44:15: 48:88:38:93:ee:5a:3c:c3:39:a3:97:24:4d:93:05:aa: ed:dc:a7:e7:17:ea:1e:9f:9e:6e:76:cf:d8:ae:b8:45: 11:06:3b:3f:50:69:65:c9:8d:72:8f:2b:12:f7:40:90: 53:e3:76:ea:07:1d:4c:11:34:bb:e4:6e:fd:f9:ec:83: 96:36:7c:07:30:1d:15:8a:28:4a:a1:17:71:50:ed:9e: bd:a6:29:0c:61:77:fc:b6:cc:8d:7a:ed:18:00:7f:62: f7:38:1d:f8:3e:59:4a:db:e5:60:97:ad:1b:56:b2:d6: 52:45:13:88:77:35:6f:9f:4c:18:e9:6f:b7:a6:74:55: e8:a4:a3:86:24:a7:d4:e6:76:c4:78:f2:11:a6:22:d6: 56:a6:e6:7a:77:3f:b4:3f:12:72:6c:f6:d6:6f:ca:ce: 78:2e:c0:34:b7:10:05:30:cd:57:c5:01:8d:28:68:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:62:79:00:82:25:03:63:27:30:b2:db:1d:7c:61:2a: 05:ca:1f:a5:f0:67:0f:f8:d5:14:40:f9:60:3c:c5:4e: 6e:e0:c3:13:dc:55:c6:d6:bc:96:df:95:3d:45:8f:5e: 83:dd:2d:d6:39:d3:26:fb:5b:4c:86:09:48:16:0b:97: 4b:5b:04:b4:c3:0b:bf:6d:c0:02:a5:c8:3c:25:4d:9f: f5:40:b8:cb:99:95:00:8a:ad:1b:21:c6:f5:9d:96:21: c4:03:81:12:ba:e1:82:90:76:d4:bf:71:e6:44:4f:8a: f5:4a:ca:a3:18:21:f4:49:e4:31:26:38:b9:d3:4a:c0: c9:cb:15:5c:b6:a5:90:a1:b2:d3:30:af:08:59:bf:fc: bc:b8:5b:f2:4f:ff:d2:9e:54:0a:ea:57:14:6c:94:d5: 25:52:35:d9:89:83:31:d5:b5:c1:23:39:a4:b1:5d:86: 75:ac:37:d8:b3:ff:f2:84:ac:3c:e5:11:32:60:64:c5: ae:2e:eb:4b:4d:ef:e7:25:ba:4c:bc:f2:88:08:77:ea: e8:da:49:a9:f2:1e:fe:b0:d9:4a:83:1a:f3:3d:48:f2: 38:fd:d1:f9:e3:df:14:b4:2e:40:94:eb:3d:5e:85:b3: 65:86:7d:fa:d3:3b:fa:af:63:85:18:fc:1c:d3:26:5c Fingerprint (SHA-256): 2B:14:78:89:96:7F:7B:05:E5:75:EE:B2:06:55:40:75:95:C0:9A:12:64:49:32:0D:65:3A:79:9A:28:19:15:7C Fingerprint (SHA1): FC:73:93:0C:DE:8C:C3:99:90:63:28:10:EA:7A:A0:16:E1:0D:A7:F3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9566: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9567: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064731 (0x670efdb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:25:01 2016 Not After : Fri Jan 08 12:25:01 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:3a:ca:3a:51:ce:9b:4f:cf:50:e5:6c:a3:e6:63:0d: df:d6:25:32:7b:d3:37:8e:b0:01:64:c7:d8:d9:dc:b2: 68:fc:1c:fb:f3:c6:fb:f5:a1:ff:e7:c2:ed:db:f1:05: 80:cd:c5:aa:ee:4d:ee:0b:49:58:b1:6a:0c:45:0c:ff: 44:d3:3c:10:e5:9c:cf:ad:55:f3:c6:a4:64:83:2f:95: 61:02:a2:22:3c:9b:11:65:b5:71:aa:d4:2d:db:14:00: 6c:8a:7e:3a:9d:10:2b:9c:c4:49:f4:62:3a:81:81:75: 02:e5:05:c8:3b:00:f0:4a:51:4a:1d:ac:24:8f:dc:e1: 23:7e:15:24:b1:04:c4:94:4f:99:18:c3:b6:34:75:0a: 73:5f:c8:67:7d:00:e2:cb:84:bd:f6:bc:0d:7b:de:66: a5:2d:90:3d:3d:48:d0:bd:65:77:0a:a7:2e:bb:d1:18: 6f:fe:05:80:82:19:12:79:79:0b:06:42:21:bf:a6:6e: 3a:7c:23:ff:c8:08:ae:44:c9:6e:3a:b3:49:b4:da:e1: 6c:1d:23:5c:4d:60:bd:fc:b2:af:6f:d0:20:b5:2a:c8: 8e:40:4f:cc:9b:98:a3:58:0b:1f:25:34:5e:f0:4d:e6: e8:df:d4:b4:3b:0f:4f:17:24:09:29:dc:aa:c8:bf:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:28:23:07:a5:75:66:b7:37:17:d1:e4:63:86:68:aa: 8f:06:1a:42:1c:2c:a8:fa:7f:cb:08:e5:e6:2f:1d:55: b2:71:ab:0c:e5:96:97:e1:c1:4a:ad:4e:5f:07:e1:8a: 3e:8a:68:5c:05:87:71:90:a2:c6:7d:8e:cc:30:25:d3: b1:5f:8d:30:85:bd:ec:12:d3:20:17:a7:79:67:b9:4d: d5:4c:8e:f9:e0:8c:74:68:8e:8b:8a:b6:bb:5b:c8:6e: dc:50:7e:65:89:a4:28:bd:ae:49:88:99:b1:a1:7c:96: b5:a8:6a:29:2f:a3:1c:03:31:fd:7f:c1:c8:86:c0:47: 0a:23:1b:f6:1c:ad:3a:a0:ec:83:55:2c:91:44:e2:d6: 06:bf:ab:54:20:48:0b:37:60:66:83:a6:68:d7:22:3e: d1:97:df:16:04:86:75:74:d8:bb:dc:d9:9d:95:ad:7d: 28:c3:cf:54:a0:e7:e6:be:f5:78:ee:70:c3:cc:45:62: 18:29:15:d9:46:1f:71:3e:d1:38:9a:cd:da:a5:d1:80: 3d:4d:88:67:be:a4:d8:90:d8:72:9c:68:95:9d:b6:09: a8:0a:b5:0f:63:93:f5:36:be:a5:c2:16:51:d2:92:53: 08:a4:4d:3a:7b:60:f5:fd:d7:a3:6a:c6:3a:0f:aa:fd Fingerprint (SHA-256): 78:0E:34:D0:58:74:1E:ED:5D:B8:1B:D1:DF:37:95:7B:8C:68:3D:E5:DD:60:68:09:66:02:40:39:18:FD:65:52 Fingerprint (SHA1): F2:2F:E4:D6:C3:64:4B:4E:31:C3:81:82:21:2E:B9:19:BC:9A:54:BA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9568: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9569: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064732 (0x670efdc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 12:25:06 2016 Not After : Fri Jan 08 12:25:06 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:e2:ae:0c:b1:67:a7:a7:1e:cd:1e:65:6a:4f:86:25: 07:46:47:ed:2d:b6:c9:fe:bc:7a:2e:c6:a7:84:38:b9: 26:45:ed:15:aa:df:02:1a:9d:6f:ae:6a:be:25:68:e5: bd:75:e9:5f:99:ec:c0:43:bd:ea:c4:cb:59:58:57:46: 0e:bf:ce:78:2a:62:5b:7b:b6:67:10:0e:b9:69:16:33: 31:63:77:4f:9d:4f:6f:8a:6a:55:63:20:df:b0:1f:8c: d9:b7:a1:57:fd:a4:ec:3b:53:5f:7a:c1:0b:02:4d:ac: 4d:ae:5b:b5:c9:ef:49:16:89:89:63:57:dc:46:17:46: f8:c2:ec:cb:07:a5:ec:a6:24:a4:62:17:5c:69:9b:03: db:cc:82:a4:44:4a:8b:07:30:16:0a:7d:e4:9f:8c:ce: 22:b2:10:79:b8:03:ba:79:a1:93:51:a4:df:fe:06:a7: 12:2a:15:39:97:a0:cd:75:54:2a:09:2c:a0:80:6a:6f: 1d:83:9b:09:84:27:59:51:f4:22:d3:00:cb:5c:2f:a8: d8:c0:dd:70:49:1e:7a:6f:e0:de:1d:26:44:74:d4:14: 08:d0:68:11:ab:c3:6c:1f:04:de:5e:39:c9:cf:21:07: 74:41:28:53:fb:30:99:99:f3:71:dc:c8:29:e2:5f:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c0:36:f7:33:12:78:e0:ed:b5:94:ad:0e:91:48:8a:a0: 9e:ca:fc:a3:56:46:8d:57:23:ff:9f:65:a1:62:bd:94: df:af:80:64:9c:b4:df:43:57:87:b4:0f:ab:f2:09:0c: e5:7f:9d:a8:fc:7e:ff:e9:ba:c2:50:27:f0:51:44:b3: ed:d9:e7:0a:18:03:23:6c:50:39:f0:30:08:75:bb:24: 83:88:bf:b8:8a:a6:05:31:4d:26:b5:82:c4:c3:fe:f7: 0e:00:c1:d5:c2:ee:ed:77:10:ca:5b:b7:b6:6d:2f:dd: 9a:87:ac:41:b9:d9:49:b5:e1:9a:8c:37:13:bc:c6:73: 6c:94:41:e7:55:df:db:9c:c5:44:cc:f0:e3:e9:0d:89: 26:a1:7a:a5:10:84:a6:ff:42:57:8f:49:9a:78:8b:b3: 63:d7:86:ba:4b:6c:0b:f8:de:32:c3:e9:2b:72:96:eb: 05:61:94:c3:b0:be:33:6e:59:df:e9:6e:90:70:68:45: 5e:fd:37:10:70:51:70:2a:81:b1:1b:ce:0a:88:62:b0: 3f:a2:5d:44:09:e0:2b:e2:db:b3:fa:5a:e8:08:08:f2: 78:cf:9c:52:88:b3:f4:50:06:1e:bf:81:8c:43:b6:87: 10:5d:21:9b:f2:35:55:6a:d1:8b:51:38:9c:09:4f:64 Fingerprint (SHA-256): A8:A5:08:61:F0:87:C3:0C:4E:C8:E3:91:FE:3A:78:14:49:B6:8E:6D:F1:32:CC:3B:A7:A5:52:0D:0B:B6:BB:22 Fingerprint (SHA1): 7C:39:E9:58:21:98:E6:A0:18:1C:54:A3:1F:19:F3:78:FD:1A:D6:CA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #9570: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9571: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064730 (0x670efda) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:24:55 2016 Not After : Fri Jan 08 12:24:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:10:fc:23:48:77:6b:79:05:ae:d6:2a:72:12:0f:c2: 96:98:55:5e:82:ae:f6:88:0f:12:dc:85:2d:75:97:57: ef:3a:ab:a3:c7:55:59:1e:64:a9:7e:22:77:73:02:63: 7a:83:d3:6e:bb:8e:d0:dc:f2:75:57:c1:61:94:94:43: fd:d4:f6:e5:f0:43:46:45:45:06:06:f6:b2:93:44:15: 48:88:38:93:ee:5a:3c:c3:39:a3:97:24:4d:93:05:aa: ed:dc:a7:e7:17:ea:1e:9f:9e:6e:76:cf:d8:ae:b8:45: 11:06:3b:3f:50:69:65:c9:8d:72:8f:2b:12:f7:40:90: 53:e3:76:ea:07:1d:4c:11:34:bb:e4:6e:fd:f9:ec:83: 96:36:7c:07:30:1d:15:8a:28:4a:a1:17:71:50:ed:9e: bd:a6:29:0c:61:77:fc:b6:cc:8d:7a:ed:18:00:7f:62: f7:38:1d:f8:3e:59:4a:db:e5:60:97:ad:1b:56:b2:d6: 52:45:13:88:77:35:6f:9f:4c:18:e9:6f:b7:a6:74:55: e8:a4:a3:86:24:a7:d4:e6:76:c4:78:f2:11:a6:22:d6: 56:a6:e6:7a:77:3f:b4:3f:12:72:6c:f6:d6:6f:ca:ce: 78:2e:c0:34:b7:10:05:30:cd:57:c5:01:8d:28:68:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:62:79:00:82:25:03:63:27:30:b2:db:1d:7c:61:2a: 05:ca:1f:a5:f0:67:0f:f8:d5:14:40:f9:60:3c:c5:4e: 6e:e0:c3:13:dc:55:c6:d6:bc:96:df:95:3d:45:8f:5e: 83:dd:2d:d6:39:d3:26:fb:5b:4c:86:09:48:16:0b:97: 4b:5b:04:b4:c3:0b:bf:6d:c0:02:a5:c8:3c:25:4d:9f: f5:40:b8:cb:99:95:00:8a:ad:1b:21:c6:f5:9d:96:21: c4:03:81:12:ba:e1:82:90:76:d4:bf:71:e6:44:4f:8a: f5:4a:ca:a3:18:21:f4:49:e4:31:26:38:b9:d3:4a:c0: c9:cb:15:5c:b6:a5:90:a1:b2:d3:30:af:08:59:bf:fc: bc:b8:5b:f2:4f:ff:d2:9e:54:0a:ea:57:14:6c:94:d5: 25:52:35:d9:89:83:31:d5:b5:c1:23:39:a4:b1:5d:86: 75:ac:37:d8:b3:ff:f2:84:ac:3c:e5:11:32:60:64:c5: ae:2e:eb:4b:4d:ef:e7:25:ba:4c:bc:f2:88:08:77:ea: e8:da:49:a9:f2:1e:fe:b0:d9:4a:83:1a:f3:3d:48:f2: 38:fd:d1:f9:e3:df:14:b4:2e:40:94:eb:3d:5e:85:b3: 65:86:7d:fa:d3:3b:fa:af:63:85:18:fc:1c:d3:26:5c Fingerprint (SHA-256): 2B:14:78:89:96:7F:7B:05:E5:75:EE:B2:06:55:40:75:95:C0:9A:12:64:49:32:0D:65:3A:79:9A:28:19:15:7C Fingerprint (SHA1): FC:73:93:0C:DE:8C:C3:99:90:63:28:10:EA:7A:A0:16:E1:0D:A7:F3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9572: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064730 (0x670efda) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:24:55 2016 Not After : Fri Jan 08 12:24:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:10:fc:23:48:77:6b:79:05:ae:d6:2a:72:12:0f:c2: 96:98:55:5e:82:ae:f6:88:0f:12:dc:85:2d:75:97:57: ef:3a:ab:a3:c7:55:59:1e:64:a9:7e:22:77:73:02:63: 7a:83:d3:6e:bb:8e:d0:dc:f2:75:57:c1:61:94:94:43: fd:d4:f6:e5:f0:43:46:45:45:06:06:f6:b2:93:44:15: 48:88:38:93:ee:5a:3c:c3:39:a3:97:24:4d:93:05:aa: ed:dc:a7:e7:17:ea:1e:9f:9e:6e:76:cf:d8:ae:b8:45: 11:06:3b:3f:50:69:65:c9:8d:72:8f:2b:12:f7:40:90: 53:e3:76:ea:07:1d:4c:11:34:bb:e4:6e:fd:f9:ec:83: 96:36:7c:07:30:1d:15:8a:28:4a:a1:17:71:50:ed:9e: bd:a6:29:0c:61:77:fc:b6:cc:8d:7a:ed:18:00:7f:62: f7:38:1d:f8:3e:59:4a:db:e5:60:97:ad:1b:56:b2:d6: 52:45:13:88:77:35:6f:9f:4c:18:e9:6f:b7:a6:74:55: e8:a4:a3:86:24:a7:d4:e6:76:c4:78:f2:11:a6:22:d6: 56:a6:e6:7a:77:3f:b4:3f:12:72:6c:f6:d6:6f:ca:ce: 78:2e:c0:34:b7:10:05:30:cd:57:c5:01:8d:28:68:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:62:79:00:82:25:03:63:27:30:b2:db:1d:7c:61:2a: 05:ca:1f:a5:f0:67:0f:f8:d5:14:40:f9:60:3c:c5:4e: 6e:e0:c3:13:dc:55:c6:d6:bc:96:df:95:3d:45:8f:5e: 83:dd:2d:d6:39:d3:26:fb:5b:4c:86:09:48:16:0b:97: 4b:5b:04:b4:c3:0b:bf:6d:c0:02:a5:c8:3c:25:4d:9f: f5:40:b8:cb:99:95:00:8a:ad:1b:21:c6:f5:9d:96:21: c4:03:81:12:ba:e1:82:90:76:d4:bf:71:e6:44:4f:8a: f5:4a:ca:a3:18:21:f4:49:e4:31:26:38:b9:d3:4a:c0: c9:cb:15:5c:b6:a5:90:a1:b2:d3:30:af:08:59:bf:fc: bc:b8:5b:f2:4f:ff:d2:9e:54:0a:ea:57:14:6c:94:d5: 25:52:35:d9:89:83:31:d5:b5:c1:23:39:a4:b1:5d:86: 75:ac:37:d8:b3:ff:f2:84:ac:3c:e5:11:32:60:64:c5: ae:2e:eb:4b:4d:ef:e7:25:ba:4c:bc:f2:88:08:77:ea: e8:da:49:a9:f2:1e:fe:b0:d9:4a:83:1a:f3:3d:48:f2: 38:fd:d1:f9:e3:df:14:b4:2e:40:94:eb:3d:5e:85:b3: 65:86:7d:fa:d3:3b:fa:af:63:85:18:fc:1c:d3:26:5c Fingerprint (SHA-256): 2B:14:78:89:96:7F:7B:05:E5:75:EE:B2:06:55:40:75:95:C0:9A:12:64:49:32:0D:65:3A:79:9A:28:19:15:7C Fingerprint (SHA1): FC:73:93:0C:DE:8C:C3:99:90:63:28:10:EA:7A:A0:16:E1:0D:A7:F3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9573: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064731 (0x670efdb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:25:01 2016 Not After : Fri Jan 08 12:25:01 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:3a:ca:3a:51:ce:9b:4f:cf:50:e5:6c:a3:e6:63:0d: df:d6:25:32:7b:d3:37:8e:b0:01:64:c7:d8:d9:dc:b2: 68:fc:1c:fb:f3:c6:fb:f5:a1:ff:e7:c2:ed:db:f1:05: 80:cd:c5:aa:ee:4d:ee:0b:49:58:b1:6a:0c:45:0c:ff: 44:d3:3c:10:e5:9c:cf:ad:55:f3:c6:a4:64:83:2f:95: 61:02:a2:22:3c:9b:11:65:b5:71:aa:d4:2d:db:14:00: 6c:8a:7e:3a:9d:10:2b:9c:c4:49:f4:62:3a:81:81:75: 02:e5:05:c8:3b:00:f0:4a:51:4a:1d:ac:24:8f:dc:e1: 23:7e:15:24:b1:04:c4:94:4f:99:18:c3:b6:34:75:0a: 73:5f:c8:67:7d:00:e2:cb:84:bd:f6:bc:0d:7b:de:66: a5:2d:90:3d:3d:48:d0:bd:65:77:0a:a7:2e:bb:d1:18: 6f:fe:05:80:82:19:12:79:79:0b:06:42:21:bf:a6:6e: 3a:7c:23:ff:c8:08:ae:44:c9:6e:3a:b3:49:b4:da:e1: 6c:1d:23:5c:4d:60:bd:fc:b2:af:6f:d0:20:b5:2a:c8: 8e:40:4f:cc:9b:98:a3:58:0b:1f:25:34:5e:f0:4d:e6: e8:df:d4:b4:3b:0f:4f:17:24:09:29:dc:aa:c8:bf:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:28:23:07:a5:75:66:b7:37:17:d1:e4:63:86:68:aa: 8f:06:1a:42:1c:2c:a8:fa:7f:cb:08:e5:e6:2f:1d:55: b2:71:ab:0c:e5:96:97:e1:c1:4a:ad:4e:5f:07:e1:8a: 3e:8a:68:5c:05:87:71:90:a2:c6:7d:8e:cc:30:25:d3: b1:5f:8d:30:85:bd:ec:12:d3:20:17:a7:79:67:b9:4d: d5:4c:8e:f9:e0:8c:74:68:8e:8b:8a:b6:bb:5b:c8:6e: dc:50:7e:65:89:a4:28:bd:ae:49:88:99:b1:a1:7c:96: b5:a8:6a:29:2f:a3:1c:03:31:fd:7f:c1:c8:86:c0:47: 0a:23:1b:f6:1c:ad:3a:a0:ec:83:55:2c:91:44:e2:d6: 06:bf:ab:54:20:48:0b:37:60:66:83:a6:68:d7:22:3e: d1:97:df:16:04:86:75:74:d8:bb:dc:d9:9d:95:ad:7d: 28:c3:cf:54:a0:e7:e6:be:f5:78:ee:70:c3:cc:45:62: 18:29:15:d9:46:1f:71:3e:d1:38:9a:cd:da:a5:d1:80: 3d:4d:88:67:be:a4:d8:90:d8:72:9c:68:95:9d:b6:09: a8:0a:b5:0f:63:93:f5:36:be:a5:c2:16:51:d2:92:53: 08:a4:4d:3a:7b:60:f5:fd:d7:a3:6a:c6:3a:0f:aa:fd Fingerprint (SHA-256): 78:0E:34:D0:58:74:1E:ED:5D:B8:1B:D1:DF:37:95:7B:8C:68:3D:E5:DD:60:68:09:66:02:40:39:18:FD:65:52 Fingerprint (SHA1): F2:2F:E4:D6:C3:64:4B:4E:31:C3:81:82:21:2E:B9:19:BC:9A:54:BA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9574: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064731 (0x670efdb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:25:01 2016 Not After : Fri Jan 08 12:25:01 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:3a:ca:3a:51:ce:9b:4f:cf:50:e5:6c:a3:e6:63:0d: df:d6:25:32:7b:d3:37:8e:b0:01:64:c7:d8:d9:dc:b2: 68:fc:1c:fb:f3:c6:fb:f5:a1:ff:e7:c2:ed:db:f1:05: 80:cd:c5:aa:ee:4d:ee:0b:49:58:b1:6a:0c:45:0c:ff: 44:d3:3c:10:e5:9c:cf:ad:55:f3:c6:a4:64:83:2f:95: 61:02:a2:22:3c:9b:11:65:b5:71:aa:d4:2d:db:14:00: 6c:8a:7e:3a:9d:10:2b:9c:c4:49:f4:62:3a:81:81:75: 02:e5:05:c8:3b:00:f0:4a:51:4a:1d:ac:24:8f:dc:e1: 23:7e:15:24:b1:04:c4:94:4f:99:18:c3:b6:34:75:0a: 73:5f:c8:67:7d:00:e2:cb:84:bd:f6:bc:0d:7b:de:66: a5:2d:90:3d:3d:48:d0:bd:65:77:0a:a7:2e:bb:d1:18: 6f:fe:05:80:82:19:12:79:79:0b:06:42:21:bf:a6:6e: 3a:7c:23:ff:c8:08:ae:44:c9:6e:3a:b3:49:b4:da:e1: 6c:1d:23:5c:4d:60:bd:fc:b2:af:6f:d0:20:b5:2a:c8: 8e:40:4f:cc:9b:98:a3:58:0b:1f:25:34:5e:f0:4d:e6: e8:df:d4:b4:3b:0f:4f:17:24:09:29:dc:aa:c8:bf:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:28:23:07:a5:75:66:b7:37:17:d1:e4:63:86:68:aa: 8f:06:1a:42:1c:2c:a8:fa:7f:cb:08:e5:e6:2f:1d:55: b2:71:ab:0c:e5:96:97:e1:c1:4a:ad:4e:5f:07:e1:8a: 3e:8a:68:5c:05:87:71:90:a2:c6:7d:8e:cc:30:25:d3: b1:5f:8d:30:85:bd:ec:12:d3:20:17:a7:79:67:b9:4d: d5:4c:8e:f9:e0:8c:74:68:8e:8b:8a:b6:bb:5b:c8:6e: dc:50:7e:65:89:a4:28:bd:ae:49:88:99:b1:a1:7c:96: b5:a8:6a:29:2f:a3:1c:03:31:fd:7f:c1:c8:86:c0:47: 0a:23:1b:f6:1c:ad:3a:a0:ec:83:55:2c:91:44:e2:d6: 06:bf:ab:54:20:48:0b:37:60:66:83:a6:68:d7:22:3e: d1:97:df:16:04:86:75:74:d8:bb:dc:d9:9d:95:ad:7d: 28:c3:cf:54:a0:e7:e6:be:f5:78:ee:70:c3:cc:45:62: 18:29:15:d9:46:1f:71:3e:d1:38:9a:cd:da:a5:d1:80: 3d:4d:88:67:be:a4:d8:90:d8:72:9c:68:95:9d:b6:09: a8:0a:b5:0f:63:93:f5:36:be:a5:c2:16:51:d2:92:53: 08:a4:4d:3a:7b:60:f5:fd:d7:a3:6a:c6:3a:0f:aa:fd Fingerprint (SHA-256): 78:0E:34:D0:58:74:1E:ED:5D:B8:1B:D1:DF:37:95:7B:8C:68:3D:E5:DD:60:68:09:66:02:40:39:18:FD:65:52 Fingerprint (SHA1): F2:2F:E4:D6:C3:64:4B:4E:31:C3:81:82:21:2E:B9:19:BC:9A:54:BA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9575: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064732 (0x670efdc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 12:25:06 2016 Not After : Fri Jan 08 12:25:06 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:e2:ae:0c:b1:67:a7:a7:1e:cd:1e:65:6a:4f:86:25: 07:46:47:ed:2d:b6:c9:fe:bc:7a:2e:c6:a7:84:38:b9: 26:45:ed:15:aa:df:02:1a:9d:6f:ae:6a:be:25:68:e5: bd:75:e9:5f:99:ec:c0:43:bd:ea:c4:cb:59:58:57:46: 0e:bf:ce:78:2a:62:5b:7b:b6:67:10:0e:b9:69:16:33: 31:63:77:4f:9d:4f:6f:8a:6a:55:63:20:df:b0:1f:8c: d9:b7:a1:57:fd:a4:ec:3b:53:5f:7a:c1:0b:02:4d:ac: 4d:ae:5b:b5:c9:ef:49:16:89:89:63:57:dc:46:17:46: f8:c2:ec:cb:07:a5:ec:a6:24:a4:62:17:5c:69:9b:03: db:cc:82:a4:44:4a:8b:07:30:16:0a:7d:e4:9f:8c:ce: 22:b2:10:79:b8:03:ba:79:a1:93:51:a4:df:fe:06:a7: 12:2a:15:39:97:a0:cd:75:54:2a:09:2c:a0:80:6a:6f: 1d:83:9b:09:84:27:59:51:f4:22:d3:00:cb:5c:2f:a8: d8:c0:dd:70:49:1e:7a:6f:e0:de:1d:26:44:74:d4:14: 08:d0:68:11:ab:c3:6c:1f:04:de:5e:39:c9:cf:21:07: 74:41:28:53:fb:30:99:99:f3:71:dc:c8:29:e2:5f:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c0:36:f7:33:12:78:e0:ed:b5:94:ad:0e:91:48:8a:a0: 9e:ca:fc:a3:56:46:8d:57:23:ff:9f:65:a1:62:bd:94: df:af:80:64:9c:b4:df:43:57:87:b4:0f:ab:f2:09:0c: e5:7f:9d:a8:fc:7e:ff:e9:ba:c2:50:27:f0:51:44:b3: ed:d9:e7:0a:18:03:23:6c:50:39:f0:30:08:75:bb:24: 83:88:bf:b8:8a:a6:05:31:4d:26:b5:82:c4:c3:fe:f7: 0e:00:c1:d5:c2:ee:ed:77:10:ca:5b:b7:b6:6d:2f:dd: 9a:87:ac:41:b9:d9:49:b5:e1:9a:8c:37:13:bc:c6:73: 6c:94:41:e7:55:df:db:9c:c5:44:cc:f0:e3:e9:0d:89: 26:a1:7a:a5:10:84:a6:ff:42:57:8f:49:9a:78:8b:b3: 63:d7:86:ba:4b:6c:0b:f8:de:32:c3:e9:2b:72:96:eb: 05:61:94:c3:b0:be:33:6e:59:df:e9:6e:90:70:68:45: 5e:fd:37:10:70:51:70:2a:81:b1:1b:ce:0a:88:62:b0: 3f:a2:5d:44:09:e0:2b:e2:db:b3:fa:5a:e8:08:08:f2: 78:cf:9c:52:88:b3:f4:50:06:1e:bf:81:8c:43:b6:87: 10:5d:21:9b:f2:35:55:6a:d1:8b:51:38:9c:09:4f:64 Fingerprint (SHA-256): A8:A5:08:61:F0:87:C3:0C:4E:C8:E3:91:FE:3A:78:14:49:B6:8E:6D:F1:32:CC:3B:A7:A5:52:0D:0B:B6:BB:22 Fingerprint (SHA1): 7C:39:E9:58:21:98:E6:A0:18:1C:54:A3:1F:19:F3:78:FD:1A:D6:CA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #9576: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064732 (0x670efdc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 12:25:06 2016 Not After : Fri Jan 08 12:25:06 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:e2:ae:0c:b1:67:a7:a7:1e:cd:1e:65:6a:4f:86:25: 07:46:47:ed:2d:b6:c9:fe:bc:7a:2e:c6:a7:84:38:b9: 26:45:ed:15:aa:df:02:1a:9d:6f:ae:6a:be:25:68:e5: bd:75:e9:5f:99:ec:c0:43:bd:ea:c4:cb:59:58:57:46: 0e:bf:ce:78:2a:62:5b:7b:b6:67:10:0e:b9:69:16:33: 31:63:77:4f:9d:4f:6f:8a:6a:55:63:20:df:b0:1f:8c: d9:b7:a1:57:fd:a4:ec:3b:53:5f:7a:c1:0b:02:4d:ac: 4d:ae:5b:b5:c9:ef:49:16:89:89:63:57:dc:46:17:46: f8:c2:ec:cb:07:a5:ec:a6:24:a4:62:17:5c:69:9b:03: db:cc:82:a4:44:4a:8b:07:30:16:0a:7d:e4:9f:8c:ce: 22:b2:10:79:b8:03:ba:79:a1:93:51:a4:df:fe:06:a7: 12:2a:15:39:97:a0:cd:75:54:2a:09:2c:a0:80:6a:6f: 1d:83:9b:09:84:27:59:51:f4:22:d3:00:cb:5c:2f:a8: d8:c0:dd:70:49:1e:7a:6f:e0:de:1d:26:44:74:d4:14: 08:d0:68:11:ab:c3:6c:1f:04:de:5e:39:c9:cf:21:07: 74:41:28:53:fb:30:99:99:f3:71:dc:c8:29:e2:5f:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c0:36:f7:33:12:78:e0:ed:b5:94:ad:0e:91:48:8a:a0: 9e:ca:fc:a3:56:46:8d:57:23:ff:9f:65:a1:62:bd:94: df:af:80:64:9c:b4:df:43:57:87:b4:0f:ab:f2:09:0c: e5:7f:9d:a8:fc:7e:ff:e9:ba:c2:50:27:f0:51:44:b3: ed:d9:e7:0a:18:03:23:6c:50:39:f0:30:08:75:bb:24: 83:88:bf:b8:8a:a6:05:31:4d:26:b5:82:c4:c3:fe:f7: 0e:00:c1:d5:c2:ee:ed:77:10:ca:5b:b7:b6:6d:2f:dd: 9a:87:ac:41:b9:d9:49:b5:e1:9a:8c:37:13:bc:c6:73: 6c:94:41:e7:55:df:db:9c:c5:44:cc:f0:e3:e9:0d:89: 26:a1:7a:a5:10:84:a6:ff:42:57:8f:49:9a:78:8b:b3: 63:d7:86:ba:4b:6c:0b:f8:de:32:c3:e9:2b:72:96:eb: 05:61:94:c3:b0:be:33:6e:59:df:e9:6e:90:70:68:45: 5e:fd:37:10:70:51:70:2a:81:b1:1b:ce:0a:88:62:b0: 3f:a2:5d:44:09:e0:2b:e2:db:b3:fa:5a:e8:08:08:f2: 78:cf:9c:52:88:b3:f4:50:06:1e:bf:81:8c:43:b6:87: 10:5d:21:9b:f2:35:55:6a:d1:8b:51:38:9c:09:4f:64 Fingerprint (SHA-256): A8:A5:08:61:F0:87:C3:0C:4E:C8:E3:91:FE:3A:78:14:49:B6:8E:6D:F1:32:CC:3B:A7:A5:52:0D:0B:B6:BB:22 Fingerprint (SHA1): 7C:39:E9:58:21:98:E6:A0:18:1C:54:A3:1F:19:F3:78:FD:1A:D6:CA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #9577: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #9578: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064735 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9579: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #9580: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9581: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9582: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108064736 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9583: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9584: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9585: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9586: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108064737 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #9587: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9588: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #9589: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9590: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 108064738 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9591: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9592: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #9593: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9594: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108064739 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9595: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9596: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #9597: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9598: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108064740 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9599: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9600: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #9601: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9602: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 108064741 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9603: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9604: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9605: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #9606: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #9607: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #9608: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #9609: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064735 (0x670efdf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:25:43 2016 Not After : Fri Jan 08 12:25:43 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:57:e1:fc:e8:8d:5d:f8:64:b1:08:70:0b:29:bd:e3: 01:68:73:b0:9f:bd:77:90:78:aa:f1:d5:59:21:7d:73: 87:e3:a2:38:56:82:d4:0f:b0:51:34:d7:7c:8d:e6:4c: 1f:37:b4:46:68:76:98:3f:7e:8f:bf:06:b2:77:91:46: f2:ff:c5:de:cf:2a:43:83:1b:a8:57:4f:ac:03:51:4e: 2d:09:ed:51:18:ee:b9:d2:c2:ee:52:bf:13:0c:f9:05: ce:a3:9a:1c:fc:97:b9:f0:fe:d1:55:99:32:fc:bf:e1: 87:fd:9b:8d:6f:a9:22:23:39:af:6e:a1:0f:63:b0:81: 8f:f3:ce:56:ff:1c:a1:1a:d9:54:bd:89:c8:50:08:8b: c1:22:cc:20:ae:4a:34:7d:b8:a9:02:34:cb:68:5e:e5: cd:92:ee:31:4f:e9:32:98:2c:1e:16:f7:0b:0b:71:b0: 0a:bd:aa:f0:a5:79:cc:3c:27:f1:23:90:74:42:c7:9e: 64:38:48:3e:bf:79:d3:19:9e:0c:07:6f:14:47:f7:3a: 34:42:bd:33:31:fe:77:45:3f:3d:95:16:d1:d5:8b:ef: 7b:14:87:21:26:ef:ff:ee:00:26:6c:d8:8c:ac:45:2b: 32:b3:b6:3f:82:5f:6e:4d:db:66:53:d8:cc:6a:8c:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:24:85:16:76:ba:f3:bd:4e:dd:9d:1e:60:81:43:06: 1f:83:ec:dd:3f:50:d2:b5:8c:0b:a4:ab:b3:5d:50:03: ee:ab:69:4d:17:c1:20:4a:cc:fa:6a:ad:84:3d:26:22: a1:75:14:df:fa:d2:ef:62:a4:bb:88:79:1e:b3:1a:b9: df:2e:b6:b2:dd:96:68:7d:42:cf:a7:84:8f:5c:8c:0f: 0d:44:32:46:d6:38:0f:08:52:51:1e:91:7e:6c:e0:86: 1b:d4:4d:36:ac:7f:c8:8f:2e:6e:6b:5f:c7:3f:ef:88: d6:dd:9e:c2:2a:3b:1f:4a:9b:5a:f3:88:92:df:80:6f: 44:a7:06:b4:14:13:d1:b1:39:8d:ea:f1:9b:36:18:3e: 17:dc:0c:f7:a9:b8:06:26:9d:ad:83:12:14:c5:65:c4: a1:85:23:0e:d8:93:50:e4:d8:30:c8:d6:05:90:19:1e: 7b:0d:a9:ea:63:d5:96:82:ce:55:97:49:31:0f:fb:2f: 1a:45:2a:c2:ed:45:ac:49:b9:c4:d8:fc:f9:dd:79:1e: 6e:e1:a1:c9:85:04:ca:f8:18:f4:1c:bc:65:ec:89:fc: 83:7d:26:c2:2c:3b:14:73:f8:ff:e4:00:ff:cc:8b:bd: 34:28:3b:5b:d3:7d:44:79:9a:f6:9b:01:b4:87:67:2a Fingerprint (SHA-256): 43:B5:E7:66:66:CF:60:B8:2E:E7:AD:28:FD:88:76:51:86:56:7C:78:81:B1:7C:E3:02:12:F5:C5:5B:03:0F:32 Fingerprint (SHA1): 7A:AF:6A:38:A3:AD:AD:A2:FC:23:36:5F:D1:4C:D4:26:43:48:7D:C0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9610: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9611: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9612: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9613: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064735 (0x670efdf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:25:43 2016 Not After : Fri Jan 08 12:25:43 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:57:e1:fc:e8:8d:5d:f8:64:b1:08:70:0b:29:bd:e3: 01:68:73:b0:9f:bd:77:90:78:aa:f1:d5:59:21:7d:73: 87:e3:a2:38:56:82:d4:0f:b0:51:34:d7:7c:8d:e6:4c: 1f:37:b4:46:68:76:98:3f:7e:8f:bf:06:b2:77:91:46: f2:ff:c5:de:cf:2a:43:83:1b:a8:57:4f:ac:03:51:4e: 2d:09:ed:51:18:ee:b9:d2:c2:ee:52:bf:13:0c:f9:05: ce:a3:9a:1c:fc:97:b9:f0:fe:d1:55:99:32:fc:bf:e1: 87:fd:9b:8d:6f:a9:22:23:39:af:6e:a1:0f:63:b0:81: 8f:f3:ce:56:ff:1c:a1:1a:d9:54:bd:89:c8:50:08:8b: c1:22:cc:20:ae:4a:34:7d:b8:a9:02:34:cb:68:5e:e5: cd:92:ee:31:4f:e9:32:98:2c:1e:16:f7:0b:0b:71:b0: 0a:bd:aa:f0:a5:79:cc:3c:27:f1:23:90:74:42:c7:9e: 64:38:48:3e:bf:79:d3:19:9e:0c:07:6f:14:47:f7:3a: 34:42:bd:33:31:fe:77:45:3f:3d:95:16:d1:d5:8b:ef: 7b:14:87:21:26:ef:ff:ee:00:26:6c:d8:8c:ac:45:2b: 32:b3:b6:3f:82:5f:6e:4d:db:66:53:d8:cc:6a:8c:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:24:85:16:76:ba:f3:bd:4e:dd:9d:1e:60:81:43:06: 1f:83:ec:dd:3f:50:d2:b5:8c:0b:a4:ab:b3:5d:50:03: ee:ab:69:4d:17:c1:20:4a:cc:fa:6a:ad:84:3d:26:22: a1:75:14:df:fa:d2:ef:62:a4:bb:88:79:1e:b3:1a:b9: df:2e:b6:b2:dd:96:68:7d:42:cf:a7:84:8f:5c:8c:0f: 0d:44:32:46:d6:38:0f:08:52:51:1e:91:7e:6c:e0:86: 1b:d4:4d:36:ac:7f:c8:8f:2e:6e:6b:5f:c7:3f:ef:88: d6:dd:9e:c2:2a:3b:1f:4a:9b:5a:f3:88:92:df:80:6f: 44:a7:06:b4:14:13:d1:b1:39:8d:ea:f1:9b:36:18:3e: 17:dc:0c:f7:a9:b8:06:26:9d:ad:83:12:14:c5:65:c4: a1:85:23:0e:d8:93:50:e4:d8:30:c8:d6:05:90:19:1e: 7b:0d:a9:ea:63:d5:96:82:ce:55:97:49:31:0f:fb:2f: 1a:45:2a:c2:ed:45:ac:49:b9:c4:d8:fc:f9:dd:79:1e: 6e:e1:a1:c9:85:04:ca:f8:18:f4:1c:bc:65:ec:89:fc: 83:7d:26:c2:2c:3b:14:73:f8:ff:e4:00:ff:cc:8b:bd: 34:28:3b:5b:d3:7d:44:79:9a:f6:9b:01:b4:87:67:2a Fingerprint (SHA-256): 43:B5:E7:66:66:CF:60:B8:2E:E7:AD:28:FD:88:76:51:86:56:7C:78:81:B1:7C:E3:02:12:F5:C5:5B:03:0F:32 Fingerprint (SHA1): 7A:AF:6A:38:A3:AD:AD:A2:FC:23:36:5F:D1:4C:D4:26:43:48:7D:C0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9614: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9615: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #9616: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064742 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9617: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #9618: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9619: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9620: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108064743 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #9621: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9622: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #9623: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9624: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 108064744 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9625: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9626: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #9627: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9628: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 108064745 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9629: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9630: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9631: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9632: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 108064746 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9633: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9634: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #9635: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9636: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 108064747 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9637: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9638: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #9639: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9640: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 108064748 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9641: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9642: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9643: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9644: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 108064749 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9645: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9646: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #9647: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9648: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 108064750 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #9649: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9650: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #9651: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9652: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 108064751 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9653: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9654: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #9655: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9656: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 108064752 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9657: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9658: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #9659: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9660: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 108064753 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9661: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9662: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #9663: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9664: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 108064754 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9665: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9666: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #9667: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9668: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 108064755 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9669: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9670: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #9671: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9672: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 108064756 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9673: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9674: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #9675: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9676: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 108064757 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9677: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9678: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #9679: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9680: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 108064758 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9681: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9682: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #9683: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9684: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 108064759 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #9685: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9686: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #9687: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9688: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 108064760 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9689: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9690: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #9691: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9692: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 108064761 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9693: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9694: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #9695: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9696: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 108064762 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9697: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9698: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #9699: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9700: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 108064763 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9701: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9702: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #9703: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9704: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 108064764 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9705: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9706: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #9707: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9708: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 108064765 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9709: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9710: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #9711: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9712: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 108064766 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9713: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9714: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #9715: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9716: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 108064767 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9717: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9718: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #9719: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9720: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 108064768 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9721: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9722: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #9723: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9724: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 108064769 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9725: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9726: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #9727: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9728: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 108064770 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9729: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9730: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #9731: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9732: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 108064771 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9733: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9734: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9735: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064742 (0x670efe6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:27:17 2016 Not After : Fri Jan 08 12:27:17 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:ae:b1:d0:80:ff:1d:1e:3d:eb:69:22:4f:3b:15:3d: 10:aa:dd:9c:51:51:ba:9d:06:0a:9d:8a:82:22:8a:f5: 2b:c8:0d:1a:89:3f:5d:78:5e:22:65:a5:a3:13:d0:6a: c5:f5:c8:5f:69:12:17:66:fd:bd:54:09:c5:1a:b8:3f: 06:0f:2e:3d:59:b6:68:f7:d6:10:ac:a8:9b:e0:88:3e: d4:ac:84:b4:7b:9e:6f:64:32:c5:e3:f6:0a:de:00:38: a2:7f:93:11:d6:83:51:d8:d5:d9:4c:bd:92:76:5a:c1: 62:d3:f0:e8:6b:4b:f1:c1:5f:6b:9d:96:d3:b9:64:21: 2d:19:59:2e:ec:48:be:1d:c9:f1:0c:62:06:9a:51:d3: 00:e8:fa:b0:87:06:c4:f3:24:6e:53:04:6a:38:f6:7e: 56:6b:2e:d1:ad:37:11:c5:e4:aa:54:35:78:14:e9:4d: 81:83:d1:56:e6:b0:35:38:4f:bf:ae:d6:45:68:c5:1a: 9b:28:05:b1:98:3f:06:15:90:d1:f1:04:c7:21:eb:13: 02:6d:ea:07:5b:78:ee:37:46:45:38:46:47:78:be:13: f8:23:e9:79:87:5e:73:71:96:18:6b:ce:3a:14:c4:99: 6d:39:61:c0:96:89:70:68:63:06:96:71:38:b2:d9:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:e7:ac:59:eb:48:c5:4b:6a:2d:06:45:e3:56:c2:ef: eb:fb:93:e8:39:6b:13:f5:d5:42:c2:7f:a3:7d:68:2a: 06:b3:c1:b1:ec:e4:0c:27:d3:aa:a7:09:ee:b6:5c:7d: f6:49:c0:36:c0:18:3c:40:3c:c8:09:46:74:a1:19:fc: c4:6e:6b:2d:e7:ba:2e:60:c0:e0:e9:6b:e1:92:e7:d0: 9f:56:06:32:05:7c:18:50:0b:92:78:66:b2:61:af:61: ef:62:1a:3c:25:0c:ce:0e:ca:fe:e5:ff:0d:26:23:04: 6c:45:67:8d:6c:76:71:ea:f8:86:07:4d:00:c5:46:f6: 1f:88:38:89:e6:5b:9a:63:63:b1:c2:46:01:2d:54:95: e8:9e:2d:72:ee:03:3c:bd:6f:bb:36:7e:4b:8e:58:10: 46:1f:78:c7:01:80:e0:f8:91:58:8b:27:a0:8d:a5:84: 80:2a:d1:9c:42:f0:5f:6c:14:cb:02:94:93:c0:22:dd: 8e:cb:b8:38:a8:9b:fa:40:b7:b2:7f:e4:98:8c:e5:a0: 7c:ca:b8:6a:52:e8:0c:7f:cb:73:20:c1:35:2e:18:bd: ea:9f:a3:4e:18:62:bf:ce:4d:f2:cf:c3:b9:e5:c5:8e: 56:c3:75:f0:a5:23:02:9e:ff:65:f1:97:89:16:4d:3d Fingerprint (SHA-256): 74:E9:7E:6B:C1:4E:69:C5:AE:AE:6B:FD:90:07:DD:86:20:77:AA:F7:45:6B:1D:3D:BE:C4:AC:F5:07:8D:07:54 Fingerprint (SHA1): A3:EB:96:4E:33:FF:0F:44:57:F3:0D:44:7A:46:05:41:3F:89:51:70 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9736: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9737: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064742 (0x670efe6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:27:17 2016 Not After : Fri Jan 08 12:27:17 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:ae:b1:d0:80:ff:1d:1e:3d:eb:69:22:4f:3b:15:3d: 10:aa:dd:9c:51:51:ba:9d:06:0a:9d:8a:82:22:8a:f5: 2b:c8:0d:1a:89:3f:5d:78:5e:22:65:a5:a3:13:d0:6a: c5:f5:c8:5f:69:12:17:66:fd:bd:54:09:c5:1a:b8:3f: 06:0f:2e:3d:59:b6:68:f7:d6:10:ac:a8:9b:e0:88:3e: d4:ac:84:b4:7b:9e:6f:64:32:c5:e3:f6:0a:de:00:38: a2:7f:93:11:d6:83:51:d8:d5:d9:4c:bd:92:76:5a:c1: 62:d3:f0:e8:6b:4b:f1:c1:5f:6b:9d:96:d3:b9:64:21: 2d:19:59:2e:ec:48:be:1d:c9:f1:0c:62:06:9a:51:d3: 00:e8:fa:b0:87:06:c4:f3:24:6e:53:04:6a:38:f6:7e: 56:6b:2e:d1:ad:37:11:c5:e4:aa:54:35:78:14:e9:4d: 81:83:d1:56:e6:b0:35:38:4f:bf:ae:d6:45:68:c5:1a: 9b:28:05:b1:98:3f:06:15:90:d1:f1:04:c7:21:eb:13: 02:6d:ea:07:5b:78:ee:37:46:45:38:46:47:78:be:13: f8:23:e9:79:87:5e:73:71:96:18:6b:ce:3a:14:c4:99: 6d:39:61:c0:96:89:70:68:63:06:96:71:38:b2:d9:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:e7:ac:59:eb:48:c5:4b:6a:2d:06:45:e3:56:c2:ef: eb:fb:93:e8:39:6b:13:f5:d5:42:c2:7f:a3:7d:68:2a: 06:b3:c1:b1:ec:e4:0c:27:d3:aa:a7:09:ee:b6:5c:7d: f6:49:c0:36:c0:18:3c:40:3c:c8:09:46:74:a1:19:fc: c4:6e:6b:2d:e7:ba:2e:60:c0:e0:e9:6b:e1:92:e7:d0: 9f:56:06:32:05:7c:18:50:0b:92:78:66:b2:61:af:61: ef:62:1a:3c:25:0c:ce:0e:ca:fe:e5:ff:0d:26:23:04: 6c:45:67:8d:6c:76:71:ea:f8:86:07:4d:00:c5:46:f6: 1f:88:38:89:e6:5b:9a:63:63:b1:c2:46:01:2d:54:95: e8:9e:2d:72:ee:03:3c:bd:6f:bb:36:7e:4b:8e:58:10: 46:1f:78:c7:01:80:e0:f8:91:58:8b:27:a0:8d:a5:84: 80:2a:d1:9c:42:f0:5f:6c:14:cb:02:94:93:c0:22:dd: 8e:cb:b8:38:a8:9b:fa:40:b7:b2:7f:e4:98:8c:e5:a0: 7c:ca:b8:6a:52:e8:0c:7f:cb:73:20:c1:35:2e:18:bd: ea:9f:a3:4e:18:62:bf:ce:4d:f2:cf:c3:b9:e5:c5:8e: 56:c3:75:f0:a5:23:02:9e:ff:65:f1:97:89:16:4d:3d Fingerprint (SHA-256): 74:E9:7E:6B:C1:4E:69:C5:AE:AE:6B:FD:90:07:DD:86:20:77:AA:F7:45:6B:1D:3D:BE:C4:AC:F5:07:8D:07:54 Fingerprint (SHA1): A3:EB:96:4E:33:FF:0F:44:57:F3:0D:44:7A:46:05:41:3F:89:51:70 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9738: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9739: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9740: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9741: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064742 (0x670efe6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:27:17 2016 Not After : Fri Jan 08 12:27:17 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:ae:b1:d0:80:ff:1d:1e:3d:eb:69:22:4f:3b:15:3d: 10:aa:dd:9c:51:51:ba:9d:06:0a:9d:8a:82:22:8a:f5: 2b:c8:0d:1a:89:3f:5d:78:5e:22:65:a5:a3:13:d0:6a: c5:f5:c8:5f:69:12:17:66:fd:bd:54:09:c5:1a:b8:3f: 06:0f:2e:3d:59:b6:68:f7:d6:10:ac:a8:9b:e0:88:3e: d4:ac:84:b4:7b:9e:6f:64:32:c5:e3:f6:0a:de:00:38: a2:7f:93:11:d6:83:51:d8:d5:d9:4c:bd:92:76:5a:c1: 62:d3:f0:e8:6b:4b:f1:c1:5f:6b:9d:96:d3:b9:64:21: 2d:19:59:2e:ec:48:be:1d:c9:f1:0c:62:06:9a:51:d3: 00:e8:fa:b0:87:06:c4:f3:24:6e:53:04:6a:38:f6:7e: 56:6b:2e:d1:ad:37:11:c5:e4:aa:54:35:78:14:e9:4d: 81:83:d1:56:e6:b0:35:38:4f:bf:ae:d6:45:68:c5:1a: 9b:28:05:b1:98:3f:06:15:90:d1:f1:04:c7:21:eb:13: 02:6d:ea:07:5b:78:ee:37:46:45:38:46:47:78:be:13: f8:23:e9:79:87:5e:73:71:96:18:6b:ce:3a:14:c4:99: 6d:39:61:c0:96:89:70:68:63:06:96:71:38:b2:d9:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:e7:ac:59:eb:48:c5:4b:6a:2d:06:45:e3:56:c2:ef: eb:fb:93:e8:39:6b:13:f5:d5:42:c2:7f:a3:7d:68:2a: 06:b3:c1:b1:ec:e4:0c:27:d3:aa:a7:09:ee:b6:5c:7d: f6:49:c0:36:c0:18:3c:40:3c:c8:09:46:74:a1:19:fc: c4:6e:6b:2d:e7:ba:2e:60:c0:e0:e9:6b:e1:92:e7:d0: 9f:56:06:32:05:7c:18:50:0b:92:78:66:b2:61:af:61: ef:62:1a:3c:25:0c:ce:0e:ca:fe:e5:ff:0d:26:23:04: 6c:45:67:8d:6c:76:71:ea:f8:86:07:4d:00:c5:46:f6: 1f:88:38:89:e6:5b:9a:63:63:b1:c2:46:01:2d:54:95: e8:9e:2d:72:ee:03:3c:bd:6f:bb:36:7e:4b:8e:58:10: 46:1f:78:c7:01:80:e0:f8:91:58:8b:27:a0:8d:a5:84: 80:2a:d1:9c:42:f0:5f:6c:14:cb:02:94:93:c0:22:dd: 8e:cb:b8:38:a8:9b:fa:40:b7:b2:7f:e4:98:8c:e5:a0: 7c:ca:b8:6a:52:e8:0c:7f:cb:73:20:c1:35:2e:18:bd: ea:9f:a3:4e:18:62:bf:ce:4d:f2:cf:c3:b9:e5:c5:8e: 56:c3:75:f0:a5:23:02:9e:ff:65:f1:97:89:16:4d:3d Fingerprint (SHA-256): 74:E9:7E:6B:C1:4E:69:C5:AE:AE:6B:FD:90:07:DD:86:20:77:AA:F7:45:6B:1D:3D:BE:C4:AC:F5:07:8D:07:54 Fingerprint (SHA1): A3:EB:96:4E:33:FF:0F:44:57:F3:0D:44:7A:46:05:41:3F:89:51:70 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9742: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9743: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9744: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9745: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064742 (0x670efe6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:27:17 2016 Not After : Fri Jan 08 12:27:17 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:ae:b1:d0:80:ff:1d:1e:3d:eb:69:22:4f:3b:15:3d: 10:aa:dd:9c:51:51:ba:9d:06:0a:9d:8a:82:22:8a:f5: 2b:c8:0d:1a:89:3f:5d:78:5e:22:65:a5:a3:13:d0:6a: c5:f5:c8:5f:69:12:17:66:fd:bd:54:09:c5:1a:b8:3f: 06:0f:2e:3d:59:b6:68:f7:d6:10:ac:a8:9b:e0:88:3e: d4:ac:84:b4:7b:9e:6f:64:32:c5:e3:f6:0a:de:00:38: a2:7f:93:11:d6:83:51:d8:d5:d9:4c:bd:92:76:5a:c1: 62:d3:f0:e8:6b:4b:f1:c1:5f:6b:9d:96:d3:b9:64:21: 2d:19:59:2e:ec:48:be:1d:c9:f1:0c:62:06:9a:51:d3: 00:e8:fa:b0:87:06:c4:f3:24:6e:53:04:6a:38:f6:7e: 56:6b:2e:d1:ad:37:11:c5:e4:aa:54:35:78:14:e9:4d: 81:83:d1:56:e6:b0:35:38:4f:bf:ae:d6:45:68:c5:1a: 9b:28:05:b1:98:3f:06:15:90:d1:f1:04:c7:21:eb:13: 02:6d:ea:07:5b:78:ee:37:46:45:38:46:47:78:be:13: f8:23:e9:79:87:5e:73:71:96:18:6b:ce:3a:14:c4:99: 6d:39:61:c0:96:89:70:68:63:06:96:71:38:b2:d9:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:e7:ac:59:eb:48:c5:4b:6a:2d:06:45:e3:56:c2:ef: eb:fb:93:e8:39:6b:13:f5:d5:42:c2:7f:a3:7d:68:2a: 06:b3:c1:b1:ec:e4:0c:27:d3:aa:a7:09:ee:b6:5c:7d: f6:49:c0:36:c0:18:3c:40:3c:c8:09:46:74:a1:19:fc: c4:6e:6b:2d:e7:ba:2e:60:c0:e0:e9:6b:e1:92:e7:d0: 9f:56:06:32:05:7c:18:50:0b:92:78:66:b2:61:af:61: ef:62:1a:3c:25:0c:ce:0e:ca:fe:e5:ff:0d:26:23:04: 6c:45:67:8d:6c:76:71:ea:f8:86:07:4d:00:c5:46:f6: 1f:88:38:89:e6:5b:9a:63:63:b1:c2:46:01:2d:54:95: e8:9e:2d:72:ee:03:3c:bd:6f:bb:36:7e:4b:8e:58:10: 46:1f:78:c7:01:80:e0:f8:91:58:8b:27:a0:8d:a5:84: 80:2a:d1:9c:42:f0:5f:6c:14:cb:02:94:93:c0:22:dd: 8e:cb:b8:38:a8:9b:fa:40:b7:b2:7f:e4:98:8c:e5:a0: 7c:ca:b8:6a:52:e8:0c:7f:cb:73:20:c1:35:2e:18:bd: ea:9f:a3:4e:18:62:bf:ce:4d:f2:cf:c3:b9:e5:c5:8e: 56:c3:75:f0:a5:23:02:9e:ff:65:f1:97:89:16:4d:3d Fingerprint (SHA-256): 74:E9:7E:6B:C1:4E:69:C5:AE:AE:6B:FD:90:07:DD:86:20:77:AA:F7:45:6B:1D:3D:BE:C4:AC:F5:07:8D:07:54 Fingerprint (SHA1): A3:EB:96:4E:33:FF:0F:44:57:F3:0D:44:7A:46:05:41:3F:89:51:70 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9746: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064742 (0x670efe6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:27:17 2016 Not After : Fri Jan 08 12:27:17 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:ae:b1:d0:80:ff:1d:1e:3d:eb:69:22:4f:3b:15:3d: 10:aa:dd:9c:51:51:ba:9d:06:0a:9d:8a:82:22:8a:f5: 2b:c8:0d:1a:89:3f:5d:78:5e:22:65:a5:a3:13:d0:6a: c5:f5:c8:5f:69:12:17:66:fd:bd:54:09:c5:1a:b8:3f: 06:0f:2e:3d:59:b6:68:f7:d6:10:ac:a8:9b:e0:88:3e: d4:ac:84:b4:7b:9e:6f:64:32:c5:e3:f6:0a:de:00:38: a2:7f:93:11:d6:83:51:d8:d5:d9:4c:bd:92:76:5a:c1: 62:d3:f0:e8:6b:4b:f1:c1:5f:6b:9d:96:d3:b9:64:21: 2d:19:59:2e:ec:48:be:1d:c9:f1:0c:62:06:9a:51:d3: 00:e8:fa:b0:87:06:c4:f3:24:6e:53:04:6a:38:f6:7e: 56:6b:2e:d1:ad:37:11:c5:e4:aa:54:35:78:14:e9:4d: 81:83:d1:56:e6:b0:35:38:4f:bf:ae:d6:45:68:c5:1a: 9b:28:05:b1:98:3f:06:15:90:d1:f1:04:c7:21:eb:13: 02:6d:ea:07:5b:78:ee:37:46:45:38:46:47:78:be:13: f8:23:e9:79:87:5e:73:71:96:18:6b:ce:3a:14:c4:99: 6d:39:61:c0:96:89:70:68:63:06:96:71:38:b2:d9:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:e7:ac:59:eb:48:c5:4b:6a:2d:06:45:e3:56:c2:ef: eb:fb:93:e8:39:6b:13:f5:d5:42:c2:7f:a3:7d:68:2a: 06:b3:c1:b1:ec:e4:0c:27:d3:aa:a7:09:ee:b6:5c:7d: f6:49:c0:36:c0:18:3c:40:3c:c8:09:46:74:a1:19:fc: c4:6e:6b:2d:e7:ba:2e:60:c0:e0:e9:6b:e1:92:e7:d0: 9f:56:06:32:05:7c:18:50:0b:92:78:66:b2:61:af:61: ef:62:1a:3c:25:0c:ce:0e:ca:fe:e5:ff:0d:26:23:04: 6c:45:67:8d:6c:76:71:ea:f8:86:07:4d:00:c5:46:f6: 1f:88:38:89:e6:5b:9a:63:63:b1:c2:46:01:2d:54:95: e8:9e:2d:72:ee:03:3c:bd:6f:bb:36:7e:4b:8e:58:10: 46:1f:78:c7:01:80:e0:f8:91:58:8b:27:a0:8d:a5:84: 80:2a:d1:9c:42:f0:5f:6c:14:cb:02:94:93:c0:22:dd: 8e:cb:b8:38:a8:9b:fa:40:b7:b2:7f:e4:98:8c:e5:a0: 7c:ca:b8:6a:52:e8:0c:7f:cb:73:20:c1:35:2e:18:bd: ea:9f:a3:4e:18:62:bf:ce:4d:f2:cf:c3:b9:e5:c5:8e: 56:c3:75:f0:a5:23:02:9e:ff:65:f1:97:89:16:4d:3d Fingerprint (SHA-256): 74:E9:7E:6B:C1:4E:69:C5:AE:AE:6B:FD:90:07:DD:86:20:77:AA:F7:45:6B:1D:3D:BE:C4:AC:F5:07:8D:07:54 Fingerprint (SHA1): A3:EB:96:4E:33:FF:0F:44:57:F3:0D:44:7A:46:05:41:3F:89:51:70 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9747: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9748: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064742 (0x670efe6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:27:17 2016 Not After : Fri Jan 08 12:27:17 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:ae:b1:d0:80:ff:1d:1e:3d:eb:69:22:4f:3b:15:3d: 10:aa:dd:9c:51:51:ba:9d:06:0a:9d:8a:82:22:8a:f5: 2b:c8:0d:1a:89:3f:5d:78:5e:22:65:a5:a3:13:d0:6a: c5:f5:c8:5f:69:12:17:66:fd:bd:54:09:c5:1a:b8:3f: 06:0f:2e:3d:59:b6:68:f7:d6:10:ac:a8:9b:e0:88:3e: d4:ac:84:b4:7b:9e:6f:64:32:c5:e3:f6:0a:de:00:38: a2:7f:93:11:d6:83:51:d8:d5:d9:4c:bd:92:76:5a:c1: 62:d3:f0:e8:6b:4b:f1:c1:5f:6b:9d:96:d3:b9:64:21: 2d:19:59:2e:ec:48:be:1d:c9:f1:0c:62:06:9a:51:d3: 00:e8:fa:b0:87:06:c4:f3:24:6e:53:04:6a:38:f6:7e: 56:6b:2e:d1:ad:37:11:c5:e4:aa:54:35:78:14:e9:4d: 81:83:d1:56:e6:b0:35:38:4f:bf:ae:d6:45:68:c5:1a: 9b:28:05:b1:98:3f:06:15:90:d1:f1:04:c7:21:eb:13: 02:6d:ea:07:5b:78:ee:37:46:45:38:46:47:78:be:13: f8:23:e9:79:87:5e:73:71:96:18:6b:ce:3a:14:c4:99: 6d:39:61:c0:96:89:70:68:63:06:96:71:38:b2:d9:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:e7:ac:59:eb:48:c5:4b:6a:2d:06:45:e3:56:c2:ef: eb:fb:93:e8:39:6b:13:f5:d5:42:c2:7f:a3:7d:68:2a: 06:b3:c1:b1:ec:e4:0c:27:d3:aa:a7:09:ee:b6:5c:7d: f6:49:c0:36:c0:18:3c:40:3c:c8:09:46:74:a1:19:fc: c4:6e:6b:2d:e7:ba:2e:60:c0:e0:e9:6b:e1:92:e7:d0: 9f:56:06:32:05:7c:18:50:0b:92:78:66:b2:61:af:61: ef:62:1a:3c:25:0c:ce:0e:ca:fe:e5:ff:0d:26:23:04: 6c:45:67:8d:6c:76:71:ea:f8:86:07:4d:00:c5:46:f6: 1f:88:38:89:e6:5b:9a:63:63:b1:c2:46:01:2d:54:95: e8:9e:2d:72:ee:03:3c:bd:6f:bb:36:7e:4b:8e:58:10: 46:1f:78:c7:01:80:e0:f8:91:58:8b:27:a0:8d:a5:84: 80:2a:d1:9c:42:f0:5f:6c:14:cb:02:94:93:c0:22:dd: 8e:cb:b8:38:a8:9b:fa:40:b7:b2:7f:e4:98:8c:e5:a0: 7c:ca:b8:6a:52:e8:0c:7f:cb:73:20:c1:35:2e:18:bd: ea:9f:a3:4e:18:62:bf:ce:4d:f2:cf:c3:b9:e5:c5:8e: 56:c3:75:f0:a5:23:02:9e:ff:65:f1:97:89:16:4d:3d Fingerprint (SHA-256): 74:E9:7E:6B:C1:4E:69:C5:AE:AE:6B:FD:90:07:DD:86:20:77:AA:F7:45:6B:1D:3D:BE:C4:AC:F5:07:8D:07:54 Fingerprint (SHA1): A3:EB:96:4E:33:FF:0F:44:57:F3:0D:44:7A:46:05:41:3F:89:51:70 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9749: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9750: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9751: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9752: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064742 (0x670efe6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:27:17 2016 Not After : Fri Jan 08 12:27:17 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:ae:b1:d0:80:ff:1d:1e:3d:eb:69:22:4f:3b:15:3d: 10:aa:dd:9c:51:51:ba:9d:06:0a:9d:8a:82:22:8a:f5: 2b:c8:0d:1a:89:3f:5d:78:5e:22:65:a5:a3:13:d0:6a: c5:f5:c8:5f:69:12:17:66:fd:bd:54:09:c5:1a:b8:3f: 06:0f:2e:3d:59:b6:68:f7:d6:10:ac:a8:9b:e0:88:3e: d4:ac:84:b4:7b:9e:6f:64:32:c5:e3:f6:0a:de:00:38: a2:7f:93:11:d6:83:51:d8:d5:d9:4c:bd:92:76:5a:c1: 62:d3:f0:e8:6b:4b:f1:c1:5f:6b:9d:96:d3:b9:64:21: 2d:19:59:2e:ec:48:be:1d:c9:f1:0c:62:06:9a:51:d3: 00:e8:fa:b0:87:06:c4:f3:24:6e:53:04:6a:38:f6:7e: 56:6b:2e:d1:ad:37:11:c5:e4:aa:54:35:78:14:e9:4d: 81:83:d1:56:e6:b0:35:38:4f:bf:ae:d6:45:68:c5:1a: 9b:28:05:b1:98:3f:06:15:90:d1:f1:04:c7:21:eb:13: 02:6d:ea:07:5b:78:ee:37:46:45:38:46:47:78:be:13: f8:23:e9:79:87:5e:73:71:96:18:6b:ce:3a:14:c4:99: 6d:39:61:c0:96:89:70:68:63:06:96:71:38:b2:d9:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:e7:ac:59:eb:48:c5:4b:6a:2d:06:45:e3:56:c2:ef: eb:fb:93:e8:39:6b:13:f5:d5:42:c2:7f:a3:7d:68:2a: 06:b3:c1:b1:ec:e4:0c:27:d3:aa:a7:09:ee:b6:5c:7d: f6:49:c0:36:c0:18:3c:40:3c:c8:09:46:74:a1:19:fc: c4:6e:6b:2d:e7:ba:2e:60:c0:e0:e9:6b:e1:92:e7:d0: 9f:56:06:32:05:7c:18:50:0b:92:78:66:b2:61:af:61: ef:62:1a:3c:25:0c:ce:0e:ca:fe:e5:ff:0d:26:23:04: 6c:45:67:8d:6c:76:71:ea:f8:86:07:4d:00:c5:46:f6: 1f:88:38:89:e6:5b:9a:63:63:b1:c2:46:01:2d:54:95: e8:9e:2d:72:ee:03:3c:bd:6f:bb:36:7e:4b:8e:58:10: 46:1f:78:c7:01:80:e0:f8:91:58:8b:27:a0:8d:a5:84: 80:2a:d1:9c:42:f0:5f:6c:14:cb:02:94:93:c0:22:dd: 8e:cb:b8:38:a8:9b:fa:40:b7:b2:7f:e4:98:8c:e5:a0: 7c:ca:b8:6a:52:e8:0c:7f:cb:73:20:c1:35:2e:18:bd: ea:9f:a3:4e:18:62:bf:ce:4d:f2:cf:c3:b9:e5:c5:8e: 56:c3:75:f0:a5:23:02:9e:ff:65:f1:97:89:16:4d:3d Fingerprint (SHA-256): 74:E9:7E:6B:C1:4E:69:C5:AE:AE:6B:FD:90:07:DD:86:20:77:AA:F7:45:6B:1D:3D:BE:C4:AC:F5:07:8D:07:54 Fingerprint (SHA1): A3:EB:96:4E:33:FF:0F:44:57:F3:0D:44:7A:46:05:41:3F:89:51:70 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9753: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064742 (0x670efe6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:27:17 2016 Not After : Fri Jan 08 12:27:17 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:ae:b1:d0:80:ff:1d:1e:3d:eb:69:22:4f:3b:15:3d: 10:aa:dd:9c:51:51:ba:9d:06:0a:9d:8a:82:22:8a:f5: 2b:c8:0d:1a:89:3f:5d:78:5e:22:65:a5:a3:13:d0:6a: c5:f5:c8:5f:69:12:17:66:fd:bd:54:09:c5:1a:b8:3f: 06:0f:2e:3d:59:b6:68:f7:d6:10:ac:a8:9b:e0:88:3e: d4:ac:84:b4:7b:9e:6f:64:32:c5:e3:f6:0a:de:00:38: a2:7f:93:11:d6:83:51:d8:d5:d9:4c:bd:92:76:5a:c1: 62:d3:f0:e8:6b:4b:f1:c1:5f:6b:9d:96:d3:b9:64:21: 2d:19:59:2e:ec:48:be:1d:c9:f1:0c:62:06:9a:51:d3: 00:e8:fa:b0:87:06:c4:f3:24:6e:53:04:6a:38:f6:7e: 56:6b:2e:d1:ad:37:11:c5:e4:aa:54:35:78:14:e9:4d: 81:83:d1:56:e6:b0:35:38:4f:bf:ae:d6:45:68:c5:1a: 9b:28:05:b1:98:3f:06:15:90:d1:f1:04:c7:21:eb:13: 02:6d:ea:07:5b:78:ee:37:46:45:38:46:47:78:be:13: f8:23:e9:79:87:5e:73:71:96:18:6b:ce:3a:14:c4:99: 6d:39:61:c0:96:89:70:68:63:06:96:71:38:b2:d9:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:e7:ac:59:eb:48:c5:4b:6a:2d:06:45:e3:56:c2:ef: eb:fb:93:e8:39:6b:13:f5:d5:42:c2:7f:a3:7d:68:2a: 06:b3:c1:b1:ec:e4:0c:27:d3:aa:a7:09:ee:b6:5c:7d: f6:49:c0:36:c0:18:3c:40:3c:c8:09:46:74:a1:19:fc: c4:6e:6b:2d:e7:ba:2e:60:c0:e0:e9:6b:e1:92:e7:d0: 9f:56:06:32:05:7c:18:50:0b:92:78:66:b2:61:af:61: ef:62:1a:3c:25:0c:ce:0e:ca:fe:e5:ff:0d:26:23:04: 6c:45:67:8d:6c:76:71:ea:f8:86:07:4d:00:c5:46:f6: 1f:88:38:89:e6:5b:9a:63:63:b1:c2:46:01:2d:54:95: e8:9e:2d:72:ee:03:3c:bd:6f:bb:36:7e:4b:8e:58:10: 46:1f:78:c7:01:80:e0:f8:91:58:8b:27:a0:8d:a5:84: 80:2a:d1:9c:42:f0:5f:6c:14:cb:02:94:93:c0:22:dd: 8e:cb:b8:38:a8:9b:fa:40:b7:b2:7f:e4:98:8c:e5:a0: 7c:ca:b8:6a:52:e8:0c:7f:cb:73:20:c1:35:2e:18:bd: ea:9f:a3:4e:18:62:bf:ce:4d:f2:cf:c3:b9:e5:c5:8e: 56:c3:75:f0:a5:23:02:9e:ff:65:f1:97:89:16:4d:3d Fingerprint (SHA-256): 74:E9:7E:6B:C1:4E:69:C5:AE:AE:6B:FD:90:07:DD:86:20:77:AA:F7:45:6B:1D:3D:BE:C4:AC:F5:07:8D:07:54 Fingerprint (SHA1): A3:EB:96:4E:33:FF:0F:44:57:F3:0D:44:7A:46:05:41:3F:89:51:70 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #9754: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064742 (0x670efe6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:27:17 2016 Not After : Fri Jan 08 12:27:17 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:ae:b1:d0:80:ff:1d:1e:3d:eb:69:22:4f:3b:15:3d: 10:aa:dd:9c:51:51:ba:9d:06:0a:9d:8a:82:22:8a:f5: 2b:c8:0d:1a:89:3f:5d:78:5e:22:65:a5:a3:13:d0:6a: c5:f5:c8:5f:69:12:17:66:fd:bd:54:09:c5:1a:b8:3f: 06:0f:2e:3d:59:b6:68:f7:d6:10:ac:a8:9b:e0:88:3e: d4:ac:84:b4:7b:9e:6f:64:32:c5:e3:f6:0a:de:00:38: a2:7f:93:11:d6:83:51:d8:d5:d9:4c:bd:92:76:5a:c1: 62:d3:f0:e8:6b:4b:f1:c1:5f:6b:9d:96:d3:b9:64:21: 2d:19:59:2e:ec:48:be:1d:c9:f1:0c:62:06:9a:51:d3: 00:e8:fa:b0:87:06:c4:f3:24:6e:53:04:6a:38:f6:7e: 56:6b:2e:d1:ad:37:11:c5:e4:aa:54:35:78:14:e9:4d: 81:83:d1:56:e6:b0:35:38:4f:bf:ae:d6:45:68:c5:1a: 9b:28:05:b1:98:3f:06:15:90:d1:f1:04:c7:21:eb:13: 02:6d:ea:07:5b:78:ee:37:46:45:38:46:47:78:be:13: f8:23:e9:79:87:5e:73:71:96:18:6b:ce:3a:14:c4:99: 6d:39:61:c0:96:89:70:68:63:06:96:71:38:b2:d9:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:e7:ac:59:eb:48:c5:4b:6a:2d:06:45:e3:56:c2:ef: eb:fb:93:e8:39:6b:13:f5:d5:42:c2:7f:a3:7d:68:2a: 06:b3:c1:b1:ec:e4:0c:27:d3:aa:a7:09:ee:b6:5c:7d: f6:49:c0:36:c0:18:3c:40:3c:c8:09:46:74:a1:19:fc: c4:6e:6b:2d:e7:ba:2e:60:c0:e0:e9:6b:e1:92:e7:d0: 9f:56:06:32:05:7c:18:50:0b:92:78:66:b2:61:af:61: ef:62:1a:3c:25:0c:ce:0e:ca:fe:e5:ff:0d:26:23:04: 6c:45:67:8d:6c:76:71:ea:f8:86:07:4d:00:c5:46:f6: 1f:88:38:89:e6:5b:9a:63:63:b1:c2:46:01:2d:54:95: e8:9e:2d:72:ee:03:3c:bd:6f:bb:36:7e:4b:8e:58:10: 46:1f:78:c7:01:80:e0:f8:91:58:8b:27:a0:8d:a5:84: 80:2a:d1:9c:42:f0:5f:6c:14:cb:02:94:93:c0:22:dd: 8e:cb:b8:38:a8:9b:fa:40:b7:b2:7f:e4:98:8c:e5:a0: 7c:ca:b8:6a:52:e8:0c:7f:cb:73:20:c1:35:2e:18:bd: ea:9f:a3:4e:18:62:bf:ce:4d:f2:cf:c3:b9:e5:c5:8e: 56:c3:75:f0:a5:23:02:9e:ff:65:f1:97:89:16:4d:3d Fingerprint (SHA-256): 74:E9:7E:6B:C1:4E:69:C5:AE:AE:6B:FD:90:07:DD:86:20:77:AA:F7:45:6B:1D:3D:BE:C4:AC:F5:07:8D:07:54 Fingerprint (SHA1): A3:EB:96:4E:33:FF:0F:44:57:F3:0D:44:7A:46:05:41:3F:89:51:70 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #9755: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064742 (0x670efe6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:27:17 2016 Not After : Fri Jan 08 12:27:17 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:ae:b1:d0:80:ff:1d:1e:3d:eb:69:22:4f:3b:15:3d: 10:aa:dd:9c:51:51:ba:9d:06:0a:9d:8a:82:22:8a:f5: 2b:c8:0d:1a:89:3f:5d:78:5e:22:65:a5:a3:13:d0:6a: c5:f5:c8:5f:69:12:17:66:fd:bd:54:09:c5:1a:b8:3f: 06:0f:2e:3d:59:b6:68:f7:d6:10:ac:a8:9b:e0:88:3e: d4:ac:84:b4:7b:9e:6f:64:32:c5:e3:f6:0a:de:00:38: a2:7f:93:11:d6:83:51:d8:d5:d9:4c:bd:92:76:5a:c1: 62:d3:f0:e8:6b:4b:f1:c1:5f:6b:9d:96:d3:b9:64:21: 2d:19:59:2e:ec:48:be:1d:c9:f1:0c:62:06:9a:51:d3: 00:e8:fa:b0:87:06:c4:f3:24:6e:53:04:6a:38:f6:7e: 56:6b:2e:d1:ad:37:11:c5:e4:aa:54:35:78:14:e9:4d: 81:83:d1:56:e6:b0:35:38:4f:bf:ae:d6:45:68:c5:1a: 9b:28:05:b1:98:3f:06:15:90:d1:f1:04:c7:21:eb:13: 02:6d:ea:07:5b:78:ee:37:46:45:38:46:47:78:be:13: f8:23:e9:79:87:5e:73:71:96:18:6b:ce:3a:14:c4:99: 6d:39:61:c0:96:89:70:68:63:06:96:71:38:b2:d9:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:e7:ac:59:eb:48:c5:4b:6a:2d:06:45:e3:56:c2:ef: eb:fb:93:e8:39:6b:13:f5:d5:42:c2:7f:a3:7d:68:2a: 06:b3:c1:b1:ec:e4:0c:27:d3:aa:a7:09:ee:b6:5c:7d: f6:49:c0:36:c0:18:3c:40:3c:c8:09:46:74:a1:19:fc: c4:6e:6b:2d:e7:ba:2e:60:c0:e0:e9:6b:e1:92:e7:d0: 9f:56:06:32:05:7c:18:50:0b:92:78:66:b2:61:af:61: ef:62:1a:3c:25:0c:ce:0e:ca:fe:e5:ff:0d:26:23:04: 6c:45:67:8d:6c:76:71:ea:f8:86:07:4d:00:c5:46:f6: 1f:88:38:89:e6:5b:9a:63:63:b1:c2:46:01:2d:54:95: e8:9e:2d:72:ee:03:3c:bd:6f:bb:36:7e:4b:8e:58:10: 46:1f:78:c7:01:80:e0:f8:91:58:8b:27:a0:8d:a5:84: 80:2a:d1:9c:42:f0:5f:6c:14:cb:02:94:93:c0:22:dd: 8e:cb:b8:38:a8:9b:fa:40:b7:b2:7f:e4:98:8c:e5:a0: 7c:ca:b8:6a:52:e8:0c:7f:cb:73:20:c1:35:2e:18:bd: ea:9f:a3:4e:18:62:bf:ce:4d:f2:cf:c3:b9:e5:c5:8e: 56:c3:75:f0:a5:23:02:9e:ff:65:f1:97:89:16:4d:3d Fingerprint (SHA-256): 74:E9:7E:6B:C1:4E:69:C5:AE:AE:6B:FD:90:07:DD:86:20:77:AA:F7:45:6B:1D:3D:BE:C4:AC:F5:07:8D:07:54 Fingerprint (SHA1): A3:EB:96:4E:33:FF:0F:44:57:F3:0D:44:7A:46:05:41:3F:89:51:70 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #9756: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064742 (0x670efe6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:27:17 2016 Not After : Fri Jan 08 12:27:17 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:ae:b1:d0:80:ff:1d:1e:3d:eb:69:22:4f:3b:15:3d: 10:aa:dd:9c:51:51:ba:9d:06:0a:9d:8a:82:22:8a:f5: 2b:c8:0d:1a:89:3f:5d:78:5e:22:65:a5:a3:13:d0:6a: c5:f5:c8:5f:69:12:17:66:fd:bd:54:09:c5:1a:b8:3f: 06:0f:2e:3d:59:b6:68:f7:d6:10:ac:a8:9b:e0:88:3e: d4:ac:84:b4:7b:9e:6f:64:32:c5:e3:f6:0a:de:00:38: a2:7f:93:11:d6:83:51:d8:d5:d9:4c:bd:92:76:5a:c1: 62:d3:f0:e8:6b:4b:f1:c1:5f:6b:9d:96:d3:b9:64:21: 2d:19:59:2e:ec:48:be:1d:c9:f1:0c:62:06:9a:51:d3: 00:e8:fa:b0:87:06:c4:f3:24:6e:53:04:6a:38:f6:7e: 56:6b:2e:d1:ad:37:11:c5:e4:aa:54:35:78:14:e9:4d: 81:83:d1:56:e6:b0:35:38:4f:bf:ae:d6:45:68:c5:1a: 9b:28:05:b1:98:3f:06:15:90:d1:f1:04:c7:21:eb:13: 02:6d:ea:07:5b:78:ee:37:46:45:38:46:47:78:be:13: f8:23:e9:79:87:5e:73:71:96:18:6b:ce:3a:14:c4:99: 6d:39:61:c0:96:89:70:68:63:06:96:71:38:b2:d9:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:e7:ac:59:eb:48:c5:4b:6a:2d:06:45:e3:56:c2:ef: eb:fb:93:e8:39:6b:13:f5:d5:42:c2:7f:a3:7d:68:2a: 06:b3:c1:b1:ec:e4:0c:27:d3:aa:a7:09:ee:b6:5c:7d: f6:49:c0:36:c0:18:3c:40:3c:c8:09:46:74:a1:19:fc: c4:6e:6b:2d:e7:ba:2e:60:c0:e0:e9:6b:e1:92:e7:d0: 9f:56:06:32:05:7c:18:50:0b:92:78:66:b2:61:af:61: ef:62:1a:3c:25:0c:ce:0e:ca:fe:e5:ff:0d:26:23:04: 6c:45:67:8d:6c:76:71:ea:f8:86:07:4d:00:c5:46:f6: 1f:88:38:89:e6:5b:9a:63:63:b1:c2:46:01:2d:54:95: e8:9e:2d:72:ee:03:3c:bd:6f:bb:36:7e:4b:8e:58:10: 46:1f:78:c7:01:80:e0:f8:91:58:8b:27:a0:8d:a5:84: 80:2a:d1:9c:42:f0:5f:6c:14:cb:02:94:93:c0:22:dd: 8e:cb:b8:38:a8:9b:fa:40:b7:b2:7f:e4:98:8c:e5:a0: 7c:ca:b8:6a:52:e8:0c:7f:cb:73:20:c1:35:2e:18:bd: ea:9f:a3:4e:18:62:bf:ce:4d:f2:cf:c3:b9:e5:c5:8e: 56:c3:75:f0:a5:23:02:9e:ff:65:f1:97:89:16:4d:3d Fingerprint (SHA-256): 74:E9:7E:6B:C1:4E:69:C5:AE:AE:6B:FD:90:07:DD:86:20:77:AA:F7:45:6B:1D:3D:BE:C4:AC:F5:07:8D:07:54 Fingerprint (SHA1): A3:EB:96:4E:33:FF:0F:44:57:F3:0D:44:7A:46:05:41:3F:89:51:70 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #9757: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064742 (0x670efe6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:27:17 2016 Not After : Fri Jan 08 12:27:17 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:ae:b1:d0:80:ff:1d:1e:3d:eb:69:22:4f:3b:15:3d: 10:aa:dd:9c:51:51:ba:9d:06:0a:9d:8a:82:22:8a:f5: 2b:c8:0d:1a:89:3f:5d:78:5e:22:65:a5:a3:13:d0:6a: c5:f5:c8:5f:69:12:17:66:fd:bd:54:09:c5:1a:b8:3f: 06:0f:2e:3d:59:b6:68:f7:d6:10:ac:a8:9b:e0:88:3e: d4:ac:84:b4:7b:9e:6f:64:32:c5:e3:f6:0a:de:00:38: a2:7f:93:11:d6:83:51:d8:d5:d9:4c:bd:92:76:5a:c1: 62:d3:f0:e8:6b:4b:f1:c1:5f:6b:9d:96:d3:b9:64:21: 2d:19:59:2e:ec:48:be:1d:c9:f1:0c:62:06:9a:51:d3: 00:e8:fa:b0:87:06:c4:f3:24:6e:53:04:6a:38:f6:7e: 56:6b:2e:d1:ad:37:11:c5:e4:aa:54:35:78:14:e9:4d: 81:83:d1:56:e6:b0:35:38:4f:bf:ae:d6:45:68:c5:1a: 9b:28:05:b1:98:3f:06:15:90:d1:f1:04:c7:21:eb:13: 02:6d:ea:07:5b:78:ee:37:46:45:38:46:47:78:be:13: f8:23:e9:79:87:5e:73:71:96:18:6b:ce:3a:14:c4:99: 6d:39:61:c0:96:89:70:68:63:06:96:71:38:b2:d9:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:e7:ac:59:eb:48:c5:4b:6a:2d:06:45:e3:56:c2:ef: eb:fb:93:e8:39:6b:13:f5:d5:42:c2:7f:a3:7d:68:2a: 06:b3:c1:b1:ec:e4:0c:27:d3:aa:a7:09:ee:b6:5c:7d: f6:49:c0:36:c0:18:3c:40:3c:c8:09:46:74:a1:19:fc: c4:6e:6b:2d:e7:ba:2e:60:c0:e0:e9:6b:e1:92:e7:d0: 9f:56:06:32:05:7c:18:50:0b:92:78:66:b2:61:af:61: ef:62:1a:3c:25:0c:ce:0e:ca:fe:e5:ff:0d:26:23:04: 6c:45:67:8d:6c:76:71:ea:f8:86:07:4d:00:c5:46:f6: 1f:88:38:89:e6:5b:9a:63:63:b1:c2:46:01:2d:54:95: e8:9e:2d:72:ee:03:3c:bd:6f:bb:36:7e:4b:8e:58:10: 46:1f:78:c7:01:80:e0:f8:91:58:8b:27:a0:8d:a5:84: 80:2a:d1:9c:42:f0:5f:6c:14:cb:02:94:93:c0:22:dd: 8e:cb:b8:38:a8:9b:fa:40:b7:b2:7f:e4:98:8c:e5:a0: 7c:ca:b8:6a:52:e8:0c:7f:cb:73:20:c1:35:2e:18:bd: ea:9f:a3:4e:18:62:bf:ce:4d:f2:cf:c3:b9:e5:c5:8e: 56:c3:75:f0:a5:23:02:9e:ff:65:f1:97:89:16:4d:3d Fingerprint (SHA-256): 74:E9:7E:6B:C1:4E:69:C5:AE:AE:6B:FD:90:07:DD:86:20:77:AA:F7:45:6B:1D:3D:BE:C4:AC:F5:07:8D:07:54 Fingerprint (SHA1): A3:EB:96:4E:33:FF:0F:44:57:F3:0D:44:7A:46:05:41:3F:89:51:70 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #9758: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9759: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9760: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064772 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9761: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9762: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #9763: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9764: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 108064773 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9765: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9766: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #9767: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9768: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 108064774 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9769: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9770: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #9771: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9772: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 108064775 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9773: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9774: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #9775: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9776: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 108064776 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9777: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9778: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #9779: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9780: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 108064777 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9781: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9782: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #9783: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9784: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 108064778 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9785: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9786: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9787: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064772 (0x670f004) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:33:12 2016 Not After : Fri Jan 08 12:33:12 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:a8:2c:44:05:32:db:10:c6:f0:7c:51:0c:0f:8a:55: be:07:31:39:53:0d:fb:75:30:27:12:6b:69:18:03:5c: ea:00:e4:f7:f9:cf:9b:6d:17:01:44:b7:cd:65:10:d2: fc:7f:a7:1b:58:67:18:01:4f:66:b3:1f:90:7e:43:0c: be:b5:a4:99:20:7f:b4:72:ca:8b:0d:54:0e:ad:fe:7e: ab:6f:3c:71:b0:98:a7:b0:58:aa:39:17:c9:06:af:b0: 7c:8a:56:1c:91:68:bf:ea:c7:d4:24:fd:d6:92:48:81: 7d:75:0a:51:9d:bc:75:cc:ee:c3:21:70:c6:a9:f0:a0: 23:ab:10:8d:83:d2:6c:b1:9f:80:54:cf:d0:38:f8:3f: 25:49:f4:ef:50:51:3b:dd:cc:7f:80:58:b2:2b:2f:c1: 14:41:e9:87:df:9a:61:15:94:80:dc:df:0b:41:42:de: c6:39:20:53:a8:04:4b:59:50:8c:6f:e0:a0:ec:ce:d1: 01:f5:67:f1:f6:48:9f:a6:c5:bf:c4:05:f1:02:ff:a9: 61:9d:33:ff:df:21:a9:f7:ac:09:7e:08:af:db:4c:05: d4:1f:11:b0:51:39:d3:97:52:5d:17:20:b0:41:d4:a6: 52:fc:60:8e:0c:a5:1a:e4:2d:a1:af:f0:d0:43:e1:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d7:d3:44:c3:3b:a0:2f:c3:79:ff:63:4b:b3:9d:f7:7f: 45:12:6c:73:19:4f:70:cb:8e:18:2f:8e:72:e1:b6:93: a4:33:0a:b9:18:ca:d4:ff:c6:90:5f:b3:18:85:d2:4f: a1:e6:d8:a2:21:60:68:dc:3b:d3:03:4c:70:18:93:5b: af:6e:f0:d8:e0:5c:26:79:63:0f:27:3f:e9:82:eb:4d: 05:ec:2c:39:8a:d3:9a:c1:9b:b7:e7:7d:9d:1e:89:fa: 5b:35:ff:c5:9d:18:2f:7e:9a:8f:fd:85:cc:f5:cd:79: 83:84:bc:43:26:d9:9a:1c:1b:b7:80:58:c0:28:ae:6a: f7:ca:95:00:ad:77:76:27:54:fa:0a:c2:92:83:dd:4b: a2:5c:21:fa:d9:b7:af:90:f3:c5:37:d5:cb:7d:ea:23: 50:fb:27:0c:d8:68:c4:e4:d8:c6:9b:4f:6d:09:46:fb: 35:01:9e:34:0a:b6:28:c5:8d:1b:f1:11:56:12:49:16: 50:33:8d:4c:c2:ec:d7:4b:50:d8:f9:20:ef:68:22:d0: 16:c4:dd:0b:97:cf:6c:91:ef:5f:5e:c5:9e:b4:83:f0: 05:73:27:32:e1:60:19:44:96:f9:a5:e4:a9:93:c8:b8: 71:28:66:8c:d7:f6:66:3b:ff:7f:cb:5a:89:f1:5a:2d Fingerprint (SHA-256): 6B:F3:88:7D:A5:03:A9:47:C4:00:F2:BD:0E:66:9F:F8:B9:83:0D:14:7C:51:A8:60:0F:62:6E:09:F6:BD:0C:95 Fingerprint (SHA1): 26:DA:FE:85:12:76:EF:5D:DE:E3:33:96:31:AA:78:5D:62:F1:05:FC Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #9788: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9789: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9790: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #9791: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064772 (0x670f004) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:33:12 2016 Not After : Fri Jan 08 12:33:12 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:a8:2c:44:05:32:db:10:c6:f0:7c:51:0c:0f:8a:55: be:07:31:39:53:0d:fb:75:30:27:12:6b:69:18:03:5c: ea:00:e4:f7:f9:cf:9b:6d:17:01:44:b7:cd:65:10:d2: fc:7f:a7:1b:58:67:18:01:4f:66:b3:1f:90:7e:43:0c: be:b5:a4:99:20:7f:b4:72:ca:8b:0d:54:0e:ad:fe:7e: ab:6f:3c:71:b0:98:a7:b0:58:aa:39:17:c9:06:af:b0: 7c:8a:56:1c:91:68:bf:ea:c7:d4:24:fd:d6:92:48:81: 7d:75:0a:51:9d:bc:75:cc:ee:c3:21:70:c6:a9:f0:a0: 23:ab:10:8d:83:d2:6c:b1:9f:80:54:cf:d0:38:f8:3f: 25:49:f4:ef:50:51:3b:dd:cc:7f:80:58:b2:2b:2f:c1: 14:41:e9:87:df:9a:61:15:94:80:dc:df:0b:41:42:de: c6:39:20:53:a8:04:4b:59:50:8c:6f:e0:a0:ec:ce:d1: 01:f5:67:f1:f6:48:9f:a6:c5:bf:c4:05:f1:02:ff:a9: 61:9d:33:ff:df:21:a9:f7:ac:09:7e:08:af:db:4c:05: d4:1f:11:b0:51:39:d3:97:52:5d:17:20:b0:41:d4:a6: 52:fc:60:8e:0c:a5:1a:e4:2d:a1:af:f0:d0:43:e1:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d7:d3:44:c3:3b:a0:2f:c3:79:ff:63:4b:b3:9d:f7:7f: 45:12:6c:73:19:4f:70:cb:8e:18:2f:8e:72:e1:b6:93: a4:33:0a:b9:18:ca:d4:ff:c6:90:5f:b3:18:85:d2:4f: a1:e6:d8:a2:21:60:68:dc:3b:d3:03:4c:70:18:93:5b: af:6e:f0:d8:e0:5c:26:79:63:0f:27:3f:e9:82:eb:4d: 05:ec:2c:39:8a:d3:9a:c1:9b:b7:e7:7d:9d:1e:89:fa: 5b:35:ff:c5:9d:18:2f:7e:9a:8f:fd:85:cc:f5:cd:79: 83:84:bc:43:26:d9:9a:1c:1b:b7:80:58:c0:28:ae:6a: f7:ca:95:00:ad:77:76:27:54:fa:0a:c2:92:83:dd:4b: a2:5c:21:fa:d9:b7:af:90:f3:c5:37:d5:cb:7d:ea:23: 50:fb:27:0c:d8:68:c4:e4:d8:c6:9b:4f:6d:09:46:fb: 35:01:9e:34:0a:b6:28:c5:8d:1b:f1:11:56:12:49:16: 50:33:8d:4c:c2:ec:d7:4b:50:d8:f9:20:ef:68:22:d0: 16:c4:dd:0b:97:cf:6c:91:ef:5f:5e:c5:9e:b4:83:f0: 05:73:27:32:e1:60:19:44:96:f9:a5:e4:a9:93:c8:b8: 71:28:66:8c:d7:f6:66:3b:ff:7f:cb:5a:89:f1:5a:2d Fingerprint (SHA-256): 6B:F3:88:7D:A5:03:A9:47:C4:00:F2:BD:0E:66:9F:F8:B9:83:0D:14:7C:51:A8:60:0F:62:6E:09:F6:BD:0C:95 Fingerprint (SHA1): 26:DA:FE:85:12:76:EF:5D:DE:E3:33:96:31:AA:78:5D:62:F1:05:FC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #9792: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9793: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9794: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9795: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064779 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9796: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9797: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9798: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9799: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108064780 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #9800: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9801: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9802: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9803: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108064781 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9804: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9805: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #9806: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9807: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108064782 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9808: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9809: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9810: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #9811: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #9812: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #9813: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064779 (0x670f00b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:34:37 2016 Not After : Fri Jan 08 12:34:37 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:49:0c:4c:40:40:a1:79:05:4d:46:d2:31:91:72:44: 68:24:b0:08:08:7c:32:9f:42:46:b1:da:a0:75:99:2f: d2:7c:dd:cd:76:ce:e9:3b:2e:75:b8:be:37:eb:b0:e6: 21:20:26:9b:90:c6:f3:d4:7d:91:fe:c5:8e:cc:79:80: ad:f0:b7:f6:92:23:42:ac:00:d9:66:26:b3:d9:83:da: 4f:e2:1f:96:e4:18:54:8d:98:94:d5:3e:e6:e1:ae:62: 7a:3e:eb:23:97:67:d8:6a:4a:73:91:32:b6:6e:f4:0a: 5c:27:67:9b:04:25:e6:94:f0:d6:5c:fc:aa:29:15:06: 70:cc:b6:9a:1a:20:18:87:4a:cc:4e:b5:74:9a:17:2c: a9:0f:54:bc:d7:29:a1:5a:8c:e9:8e:66:24:31:a0:50: 18:5f:b6:42:60:72:db:2f:80:e2:b7:96:e6:a0:14:e7: b3:30:18:3f:9e:34:38:53:b7:5b:47:5e:8f:d5:dc:f0: ee:44:d1:40:f1:69:c0:9b:32:ca:4e:b7:54:b9:91:49: 66:69:ae:b4:24:25:23:1f:6d:5e:a8:ed:2a:7f:ee:dc: eb:10:44:fd:75:cb:58:ad:09:db:be:a9:e4:e1:7b:de: e4:8f:85:fc:c3:33:c3:f5:cc:19:f8:e2:dd:52:86:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:05:01:74:30:f2:86:69:8b:25:a6:c6:99:d5:1f:bf: 74:a8:1c:e6:c6:b0:7c:91:01:3d:b9:44:8e:fc:3a:17: d6:d1:73:f5:76:74:62:21:4e:6e:12:89:ac:07:4a:2a: 33:dc:a0:d0:e8:51:16:a6:7f:e1:5d:d5:3a:45:87:9f: c5:79:11:2b:0c:14:26:73:30:07:cc:e1:e3:ad:0b:68: be:91:25:13:46:ae:c0:bc:72:50:5d:fc:d2:98:b5:26: de:ae:5a:78:61:a7:e7:20:af:8b:db:61:db:d6:31:81: b4:35:f6:3f:d9:e7:d6:ef:4b:60:16:4d:b1:04:ed:de: 8d:44:5d:e6:99:8a:cf:7e:9e:21:21:f9:eb:b7:ab:e2: 85:9b:81:24:89:f4:c8:44:1d:86:da:45:ad:ec:3a:e4: 67:d8:16:0c:48:64:b4:20:58:2c:d8:1f:72:53:da:49: 51:12:83:2d:93:c6:5d:35:66:bf:87:2a:e7:53:15:00: 7e:88:50:b2:d6:4a:06:c1:25:a8:a1:f6:0b:4b:84:b9: a2:a2:e7:7a:b1:08:74:22:ec:8f:06:26:b1:1d:96:5f: d3:c9:8b:dd:14:93:4e:b7:a0:32:34:3b:b0:bf:7b:cb: d9:de:d8:9f:e3:8d:12:c5:1e:9d:94:59:ef:8a:dd:e9 Fingerprint (SHA-256): 58:10:EB:10:41:C8:36:F4:D4:B6:52:28:4B:F4:78:12:C3:2C:F1:93:ED:1A:AB:44:6E:FF:A2:03:3B:9C:34:B6 Fingerprint (SHA1): 61:C5:2B:B6:C7:60:A8:9D:70:9D:A7:48:8B:88:A3:BB:F9:58:5B:C4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9814: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9815: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9816: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064780 (0x670f00c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:34:48 2016 Not After : Fri Jan 08 12:34:48 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:2e:fb:83:2a:7d:a1:50:c0:59:db:01:88:fd:9c:40: 86:9f:63:da:7b:27:f7:5f:ec:8e:4f:1b:74:33:4d:cf: 37:92:63:15:ff:59:af:2b:ce:73:90:c5:23:2a:5e:b8: b9:cf:14:f5:14:41:fd:86:59:4d:c9:22:fa:77:5c:55: 1a:2c:d7:66:7e:bf:b4:51:7a:91:d5:30:3f:65:68:62: ce:ca:b3:92:6d:28:ef:b6:48:0b:e8:68:3d:cc:17:b5: d4:90:c5:7e:af:30:dd:ef:2b:18:99:f8:f6:33:e3:a7: ee:03:a6:58:28:c8:6c:96:36:05:80:65:f6:c3:73:4f: bb:0b:6f:72:a7:a3:d9:ae:9e:58:3d:49:be:ac:22:78: 25:63:69:b4:83:cc:1c:d8:cb:2d:06:da:ea:9f:88:14: da:15:31:25:af:0b:8d:f5:b6:e8:d8:7c:43:73:61:b0: 9f:fc:b3:f3:3f:07:4b:d9:2c:38:a2:15:22:a4:47:46: 6f:34:f4:55:9d:02:3f:1b:f8:aa:49:b6:88:c7:74:8b: 2a:c7:b3:0e:12:ad:d4:31:cf:9c:10:af:2d:f4:76:ec: 5e:2b:08:bd:84:70:38:c0:63:c0:ff:b9:2e:7e:fc:c9: 31:fe:39:39:a7:43:5c:e3:ad:9e:e0:4b:ab:20:b1:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:f2:ad:dc:03:63:a2:fa:d8:e3:dc:52:52:6d:21:10: 61:66:71:d4:ee:67:f0:eb:93:a6:0a:da:76:0b:3f:b0: 61:ae:19:74:86:97:5d:c9:b4:78:07:52:cf:cc:03:69: 74:55:fb:ad:80:40:d7:e5:4d:d1:1e:e6:f0:b7:ae:12: c7:86:38:15:1d:30:a6:72:89:50:8d:9b:64:60:97:44: 03:3b:16:27:c4:21:96:c2:9a:04:28:07:5f:6c:8b:fd: 70:5a:6f:76:49:5f:21:6b:1e:ee:2b:df:04:4c:de:9a: 3e:0a:71:49:9f:3a:57:a0:c7:21:ce:5b:1e:c9:29:0f: 88:87:09:a1:76:68:d6:ac:ed:99:4c:d6:93:90:81:86: 08:89:8e:67:05:e5:fe:a0:e1:43:f6:44:66:39:1d:7e: 9e:08:c8:38:dd:e3:90:3b:cb:fd:d9:71:c9:de:36:dd: a8:3c:3f:b4:43:91:58:38:4c:62:1b:50:17:42:e1:90: 82:e7:98:3a:d6:15:36:5f:e9:d4:bf:1d:81:b5:66:41: 4a:42:71:2c:f8:c6:29:cd:26:20:01:ab:7f:08:38:f1: ee:4d:35:f5:e1:54:0f:cf:8d:47:71:83:8b:55:c9:b9: b2:4b:a8:24:4b:03:9e:e6:4b:b8:e4:1b:11:ac:86:19 Fingerprint (SHA-256): 49:1F:C8:B7:FA:CA:9E:B3:4E:C3:20:96:6E:A6:A4:95:3E:D4:7F:FE:A8:78:3A:0B:C7:DC:29:5D:5E:6F:79:2E Fingerprint (SHA1): 18:E2:31:66:23:8F:04:05:ED:D6:82:6B:DB:B3:A5:30:42:D6:7B:55 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9817: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9818: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064781 (0x670f00d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 12:35:18 2016 Not After : Fri Jan 08 12:35:18 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:7e:a8:dc:48:be:bd:84:35:87:c3:da:27:17:a0:28: 09:19:e0:8d:8b:41:fe:40:cb:9c:57:f7:0e:b0:3d:a3: 6e:55:de:29:6e:b0:54:a5:8a:89:2e:28:f9:28:25:d5: db:fe:fc:7b:f1:ba:f7:d8:82:a2:3d:33:16:26:8f:fe: 32:d3:a6:4f:9e:d6:af:9d:4c:3c:3f:5c:56:5e:c1:7c: e2:4d:ed:dc:71:0f:50:1c:7c:55:df:ac:23:de:ce:89: 04:78:f6:d0:af:94:93:68:cb:ec:c1:99:d4:1f:df:f2: c8:ea:9c:36:02:e2:ca:f3:62:e3:de:6d:e6:fc:b0:02: 34:3a:8d:d0:4e:31:36:f3:eb:9b:84:a5:fa:88:1e:77: ac:e7:b8:b4:0c:df:8d:c3:1a:4e:18:62:89:bb:c4:ed: 5c:fd:19:43:04:d5:4c:0c:30:3f:a7:d6:5c:a2:a3:e9: ab:90:24:84:7f:06:d6:1f:c0:56:a9:2d:4c:d0:be:58: 05:55:6b:55:1c:e0:d0:0b:7b:11:0f:fc:91:70:47:1b: f2:b1:25:27:71:5a:cc:f2:4f:a0:f7:d4:f6:17:ac:1a: da:ac:62:86:6c:53:82:27:d0:47:23:dd:dd:9b:05:81: b4:e3:f0:a7:2f:93:49:c5:a2:cc:73:69:fb:33:d9:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:62:b7:0a:5e:cd:30:d8:9d:62:55:6c:76:83:83:13: d1:25:fb:bf:e5:fb:cc:ed:43:43:57:ae:56:5d:9a:27: 95:41:0b:b3:52:c8:3b:5f:c5:79:e6:c1:fe:cb:14:b0: 56:cf:7f:2a:4f:69:bd:07:da:f0:34:88:88:e4:6e:38: a4:bf:7d:da:54:4d:d5:a3:74:72:cc:ef:9d:ba:f6:a1: 6a:54:d3:fc:cc:c5:56:b4:71:ec:3c:ea:2e:90:3d:87: ff:a0:9a:3c:79:bf:03:60:fc:24:ee:22:91:35:89:4f: e2:25:33:b7:ca:f6:60:1e:6b:35:0c:22:19:bc:40:92: 85:08:17:3f:8a:d3:b5:97:68:47:d4:c5:3c:1d:c9:bc: 23:40:cf:c4:9e:03:2c:62:45:23:d9:85:b1:7a:4b:af: 94:71:2f:12:20:50:34:0c:92:05:54:49:7d:c3:9a:36: c3:7f:b2:58:63:b8:70:7f:6c:b4:39:50:0c:c6:26:de: 2a:b0:e3:ef:ee:4f:80:37:78:e6:00:d8:b8:f4:ca:b5: 02:34:51:94:a0:33:64:c6:ce:82:39:2d:86:35:86:74: 22:77:d3:f4:a5:57:66:35:18:3d:c2:cd:30:bd:dc:5f: 1b:96:71:2a:79:bc:28:bc:6b:d6:b2:bb:10:59:91:ac Fingerprint (SHA-256): 11:34:8D:A7:B5:60:F4:F0:EA:17:D7:68:7D:BA:E5:C3:02:36:6A:F7:65:A8:A3:8F:9E:FC:EC:F2:8E:FB:EC:07 Fingerprint (SHA1): D7:5A:50:6C:B9:BF:DF:C4:8A:01:28:C6:E9:91:BC:39:CC:6D:A0:7F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #9819: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9820: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064783 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9821: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9822: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9823: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9824: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108064784 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9825: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9826: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9827: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9828: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108064785 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #9829: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9830: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #9831: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9832: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 108064786 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9833: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9834: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #9835: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9836: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 108064787 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9837: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9838: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9839: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #9840: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #9841: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #9842: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #9843: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064783 (0x670f00f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:35:48 2016 Not After : Fri Jan 08 12:35:48 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:35:8a:9c:97:ac:79:e8:58:44:3c:34:79:38:2c:2f: 9e:e2:3a:32:a8:23:6a:56:3d:48:89:29:43:90:7b:c7: 79:f1:82:78:10:d0:d6:02:a3:11:72:e9:63:d6:e5:a1: 92:97:40:f5:8f:e6:71:18:d2:0d:24:30:d8:ca:86:8b: 6a:1b:1d:df:44:ee:79:8b:d8:a4:e8:19:74:48:06:ed: 1b:5e:c6:e8:67:15:9a:21:8c:4d:e6:71:ec:27:2c:44: 5c:14:7d:fe:a5:e1:b9:04:4f:74:91:9f:9c:43:ab:74: a6:e9:44:5e:db:bf:ed:eb:e0:d6:b1:99:ad:aa:4e:d7: d8:44:3e:0a:97:71:35:6c:9b:e4:77:d4:61:72:15:6f: f3:95:d8:d9:df:7d:36:63:aa:ac:32:7d:59:40:fd:a8: 8f:92:39:db:ce:01:0b:fa:3a:23:23:98:f8:53:ce:01: 44:4f:21:f2:73:01:00:ff:bc:c8:26:38:66:4a:5f:d4: 85:c2:a4:fb:1d:7b:81:3e:b5:62:f6:aa:8f:02:e2:17: f0:5a:f3:7c:46:35:d9:90:67:64:ab:e1:d9:f4:28:8c: 26:f9:1f:a4:5f:75:05:f9:90:f5:56:a7:d6:07:4f:f9: c1:24:4c:b4:d6:93:5e:29:0d:83:af:37:d1:b9:c4:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e6:28:05:c1:9a:92:d3:3c:cd:ac:0a:15:5c:e4:87: 78:09:6f:d5:de:31:43:18:dc:e3:a1:a1:48:e5:44:b6: b7:a4:46:16:5d:c6:9a:3a:03:36:94:8d:b0:36:d4:48: f7:23:48:92:7f:3a:94:5f:ca:80:59:de:1d:8b:35:25: e7:76:a9:aa:f1:7e:90:90:b7:cd:ca:52:1c:da:4a:fc: b8:6d:30:8e:51:ce:c0:52:3e:bc:02:18:88:c1:8d:0f: 39:11:f5:06:33:82:c5:39:d9:32:56:b5:6d:e9:3d:68: 01:e4:36:9a:82:f2:ef:18:44:90:98:d7:a3:c0:24:4a: 49:ef:28:48:4f:56:be:c9:fd:18:d2:f9:99:0a:dd:17: 79:34:4e:ab:e1:6f:9c:56:f8:4e:d6:84:cd:ff:66:78: 91:44:21:54:d6:58:48:08:4d:55:e3:82:69:33:68:05: 46:fd:7a:4c:2e:60:22:c0:aa:8f:33:fc:93:08:83:67: 11:ec:05:4f:68:71:b2:14:cd:99:8c:94:68:fc:2a:02: 5f:06:46:c4:c5:f8:44:21:87:64:8d:bb:70:74:00:44: e8:31:f7:d6:65:4a:25:0b:a3:18:26:f9:8d:9c:e1:c6: 2a:9b:d6:36:34:f3:39:f4:92:f9:53:d8:91:01:4d:96 Fingerprint (SHA-256): 73:38:A7:A0:E9:FB:06:4D:5F:CE:C2:52:A9:86:D5:7A:2E:9D:A2:FB:2E:CF:C8:F4:C7:B9:D6:63:E0:C6:90:9C Fingerprint (SHA1): BB:06:85:6E:1C:2F:4B:2F:75:E2:B6:F1:97:75:69:AF:3C:F1:FE:B8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9844: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9845: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064784 (0x670f010) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:35:56 2016 Not After : Fri Jan 08 12:35:56 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:fd:66:cb:6e:34:9b:46:9f:84:b6:a6:30:7f:14:2b: 67:a6:9f:88:93:10:68:4a:53:f2:a0:69:93:f1:da:ac: dc:1f:dd:bf:01:2e:63:ab:18:7a:db:51:4a:f5:7b:c5: 63:ff:c0:8a:fc:34:9b:0c:b2:46:59:c5:82:0b:b6:db: a4:23:df:62:62:ae:c9:72:74:35:6c:4e:cb:91:54:0b: de:c1:6d:f6:c8:f7:07:0b:e9:73:e0:29:57:2a:04:fa: 70:3c:91:75:98:0f:65:4b:09:db:97:08:ac:5f:10:24: 03:9a:ad:f2:0a:d9:fa:e4:d5:63:df:06:4a:82:3e:11: c7:83:48:ab:4a:e3:6f:a7:48:8c:bc:57:f8:06:a9:9e: 53:52:45:da:29:d6:4f:9f:f5:7a:d0:ca:3d:7d:d1:ed: dd:65:14:a8:bf:99:60:df:fd:0a:29:3d:06:d5:f2:b7: e8:b4:c7:99:ff:8d:35:4e:42:1a:49:2a:81:e2:d1:3d: 80:23:af:15:5a:f3:9d:c0:83:e6:62:6a:bb:5d:eb:de: a0:69:d2:ae:95:ef:4e:72:94:35:74:d4:e5:46:fd:f4: c0:17:fd:ae:a3:ad:17:57:55:1c:60:53:9f:85:ff:9b: 16:75:45:fa:ff:0d:99:18:2e:13:40:6b:0b:3b:3d:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:fd:6b:50:69:c3:01:18:ba:ef:fa:41:94:a6:e7:1f: 3a:02:83:2e:af:11:72:6f:bd:d0:3a:55:b7:0b:8c:d7: eb:a0:0d:c7:12:2f:6e:6f:10:45:6b:99:d7:f5:58:b4: 24:8c:af:1b:7e:9a:2d:3a:c6:98:b3:d3:ac:12:6e:8a: 74:09:e9:99:24:75:33:f5:77:60:60:41:f4:b8:0d:5a: 84:82:81:ee:9d:ad:f5:09:d3:c8:cb:f0:d7:29:1c:ed: 05:3b:15:9c:6c:97:1e:aa:6d:ea:9b:7c:9c:a9:cb:9b: 50:e3:80:47:8c:66:34:52:de:be:f0:d6:e3:96:22:59: 8a:bf:58:4b:64:ca:9f:bc:b7:9e:2e:07:71:da:f5:cf: 06:7b:9a:69:a4:6b:7c:41:aa:0b:92:3e:04:61:1d:8c: 32:68:4e:3a:d1:78:cd:cf:6d:c1:f6:f8:71:76:20:ab: 6d:08:d1:ac:94:ae:51:0f:62:4c:4e:43:19:f5:f5:60: 24:0b:d4:e9:e2:ec:52:2f:ce:04:ec:83:ad:36:d7:1e: eb:b6:91:ef:ab:73:60:d9:81:b5:58:5e:c4:c4:ec:76: 82:8a:2c:8c:1c:b0:49:0f:c7:e2:8b:6a:3c:85:ab:a5: fe:f6:60:3e:19:9e:51:4a:59:8b:76:bf:89:47:12:36 Fingerprint (SHA-256): A2:F6:91:54:57:A1:9B:54:1D:40:7C:D8:CD:87:C5:50:D9:4A:37:C5:1F:BB:4E:BE:CC:95:7D:FD:C7:BD:A4:E8 Fingerprint (SHA1): 7C:EC:18:89:7E:DD:00:A0:B3:AB:EF:0D:DB:57:FE:F8:7F:38:4E:C4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9846: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9847: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9848: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064785 (0x670f011) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 12:36:11 2016 Not After : Fri Jan 08 12:36:11 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:88:ab:fa:7b:5b:57:a5:5c:d4:cc:7a:5d:f1:46:70: 7b:d9:ea:89:26:73:9e:28:96:c7:13:ff:89:63:79:55: 70:e9:dd:71:bc:ea:a4:13:6c:13:b5:47:2d:f8:91:f1: 85:82:67:b3:e1:b3:c9:b5:7d:ef:38:2b:85:3b:89:d2: 2d:0a:75:3d:78:62:a0:e1:39:6c:fe:7c:e1:b7:4f:e9: c2:2a:c8:24:e8:3c:95:0b:c5:1d:5c:77:f4:49:bd:4f: 26:56:b5:38:f1:74:ce:cc:be:33:7f:1c:09:7a:29:84: f0:81:cf:7a:3b:b3:78:86:d2:ad:27:d7:ed:6d:47:25: bd:4c:05:ea:34:9e:8d:58:1f:1b:da:06:a9:0f:bc:06: b4:11:ba:e3:0e:93:f5:64:89:c4:54:ec:51:16:75:47: f3:17:4f:3e:ec:5b:fb:d5:e8:42:00:81:30:40:70:df: 86:5c:b5:f2:57:f5:5e:f0:b4:16:86:21:d6:b7:6e:cf: 3d:0e:b2:31:a3:1f:67:07:d4:1e:15:c9:3a:fb:e3:99: 7b:19:90:c1:90:57:62:4b:3a:29:14:5e:b6:0a:d0:61: 29:c5:24:62:f9:18:b1:14:88:8e:75:ff:17:02:9e:40: 20:89:06:60:52:ca:7b:be:41:5d:9f:0c:e9:25:dd:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e7:70:1a:64:2a:76:de:ce:5d:aa:61:ca:52:c6:98:f6: 6b:a6:db:e1:4f:35:08:5d:e6:fa:f4:af:b2:b0:cb:b5: 1c:79:5d:41:8b:39:92:a5:85:03:90:13:04:14:20:e2: 89:51:75:29:f1:0f:68:f3:27:90:cc:8f:8b:67:ad:b6: f3:37:71:fe:96:57:81:8c:8e:85:5b:43:b1:38:e1:de: d7:28:64:a4:88:2d:c0:cc:85:13:c9:81:99:54:00:eb: 49:53:db:e3:8d:1b:fb:28:e3:8f:d6:2d:81:ab:cc:42: 1d:eb:ce:dd:a3:31:bb:aa:96:b8:64:da:f2:b7:0e:f3: f9:7a:b3:60:06:b6:ac:68:dc:7d:5e:21:ca:75:79:60: 7e:54:d3:17:f9:a1:9f:04:9b:53:4a:8b:96:99:ee:0a: 1d:b4:54:bb:c3:7c:da:cd:72:ea:70:1b:96:5d:30:65: c0:7f:96:86:eb:b5:6e:e9:f3:bd:59:ea:a9:cf:c3:40: 4b:2b:b3:53:11:52:1c:f2:16:28:c1:60:6e:fd:21:00: 9d:d5:ab:fc:2e:2e:2b:61:3e:37:0c:7e:45:cf:8c:d9: 3c:ca:ea:7f:17:04:60:c3:2e:ee:37:85:64:53:7d:1d: 13:db:08:53:0e:aa:63:9a:c5:15:df:9b:12:fe:9e:e5 Fingerprint (SHA-256): C1:C4:7C:0E:19:91:08:B8:04:9D:05:6F:12:E9:B7:E9:BC:B8:98:93:A8:C9:A0:18:6E:DE:32:B1:06:00:5A:8F Fingerprint (SHA1): CF:EB:94:9E:96:29:2D:16:39:B3:6D:D6:0E:0D:BA:CA:03:CE:C6:DD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #9849: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9850: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064788 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9851: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9852: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9853: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9854: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108064789 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9855: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9856: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9857: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9858: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108064790 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA1Root-108064567.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9859: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9860: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #9861: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9862: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108064791 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9863: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9864: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #9865: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064788 (0x670f014) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:37:03 2016 Not After : Fri Jan 08 12:37:03 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:bc:29:63:c6:9a:cb:b6:1b:15:a4:3b:50:c6:59:5c: b1:c9:84:16:c7:f7:7e:ed:8e:36:20:5e:b1:2e:32:a7: 54:ce:54:7a:53:7c:f8:41:c7:95:7d:09:e3:18:f3:da: 18:a4:3c:50:c5:3c:ad:5b:fe:c4:d4:c7:f5:82:29:52: 07:8e:6c:4e:94:72:2e:9c:56:ff:7a:ed:e4:7c:21:c7: 50:c7:f0:2b:f2:c9:95:a0:3f:5c:61:2b:da:67:6e:f5: f5:28:19:e8:a0:bb:60:0a:60:0b:97:fa:5c:c6:56:45: a4:6f:01:e3:ae:78:ab:bd:c5:24:4c:75:bb:8c:5b:02: 97:5e:48:a6:d6:08:bd:b9:c5:d1:5a:3c:ac:12:00:ea: 80:60:b7:d7:82:18:3c:0e:15:9f:bc:b1:b1:bd:7e:33: 35:66:8f:af:ec:13:8f:24:63:44:b6:cb:08:08:a6:1f: 80:e8:a9:90:39:e2:0c:8c:42:f4:89:b1:b1:9c:b8:de: 8e:33:01:99:2a:bb:ee:38:e1:e3:f0:7c:bb:ad:30:67: 9e:e7:68:63:54:91:e6:4b:86:59:70:fc:b0:79:25:f2: 32:25:da:d2:db:6f:3c:0a:27:5f:96:98:b8:da:b7:e4: 69:b1:6e:f6:6e:da:de:86:75:6d:ca:3d:77:e8:ff:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:48:9d:47:89:bf:ea:05:6c:58:ca:d8:92:b3:f1:c7: d0:76:2a:ec:69:6c:5e:42:b5:89:1f:ab:d2:4a:ad:e8: 73:a7:a8:c7:ab:e3:80:c2:92:eb:d4:ea:9e:be:af:84: 19:8e:16:c3:e9:3a:7d:31:5e:78:8f:6f:2b:85:89:3f: 8b:f6:97:db:de:ef:ea:40:29:dd:9b:ae:37:5e:7a:81: 3c:7e:c8:01:7e:5e:27:36:6f:78:6d:20:b8:d2:ef:76: 0c:be:c2:6a:9d:1b:f0:be:74:ef:19:41:99:27:00:a4: 2d:84:ca:36:96:9f:9f:2d:9b:d9:3b:b0:e8:44:b1:6e: 93:cb:c8:7a:9b:a8:65:b9:11:27:ca:d7:49:1c:4f:b3: 3e:ac:04:6c:1d:54:d1:c4:84:77:d1:27:fe:46:fc:52: a3:e5:f8:eb:84:70:be:d8:bc:a3:f5:b4:65:a6:04:ea: 21:13:cd:f2:fd:97:0a:f6:0c:7c:2c:5a:fc:f0:16:08: 4d:14:d9:20:7d:dd:b5:3f:70:88:3c:c4:4f:ce:0c:64: aa:d3:7d:c2:c1:85:69:d2:54:58:a9:29:83:3f:4a:56: 2c:59:9b:9a:71:0d:65:54:0b:f8:d3:e3:47:d3:19:2f: b0:0f:ec:38:c3:87:36:f8:36:01:0a:08:23:ba:e7:ac Fingerprint (SHA-256): 97:AF:76:41:44:E3:CF:2E:A0:A3:A7:05:00:DE:68:28:EF:A4:85:5A:47:AF:70:D2:AD:4C:88:D1:9C:59:63:1B Fingerprint (SHA1): 98:9B:B1:31:46:48:43:A1:3B:69:23:01:DA:DB:F1:7B:F8:82:3E:A8 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9866: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #9867: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064792 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9868: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #9869: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #9870: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064793 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9871: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #9872: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #9873: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9874: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108064794 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9875: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9876: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108064795 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9877: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9878: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #9879: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9880: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9881: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108064796 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-Bridge-108064568.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9882: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9883: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9884: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9885: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108064797 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9886: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9887: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #9888: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #9889: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064793 (0x670f019) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:37:56 2016 Not After : Fri Jan 08 12:37:56 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:69:77:c0:74:2c:b6:01:bd:78:25:6a:98:6a:7b:8a: 5b:0c:8c:d5:72:14:74:dc:38:99:cd:3f:aa:ca:f7:b7: 17:1b:72:d3:c6:1c:98:63:9b:75:fd:54:8a:a9:e6:05: db:1f:2a:55:2f:f9:bb:83:d3:07:47:07:fd:c2:0d:a3: 40:7b:2b:98:16:70:56:f0:b2:c4:82:b0:d1:2e:b0:c8: 63:ed:f4:34:0f:2e:79:0a:39:f0:9c:b5:ab:cd:2a:11: 25:8b:6d:50:d3:1f:e2:a3:75:e4:a6:ab:af:56:2a:55: c8:52:57:33:0b:ad:20:4e:c0:3f:44:67:68:d4:b9:d7: f6:03:1c:10:21:bd:3a:07:0e:6a:02:3f:51:f6:b9:ca: 50:3d:1b:5b:9f:11:0d:9e:29:60:31:10:5c:87:ac:12: f8:5c:66:29:c6:37:6c:19:4c:b4:b4:46:41:8b:5b:29: 78:13:7a:f6:94:3b:1d:b8:f8:26:af:ea:42:03:94:f1: 18:3d:15:c6:d6:4d:e2:f3:f0:dc:6f:df:a7:9d:76:35: 00:ab:06:ed:65:81:33:ac:09:1b:1d:cc:fd:0d:d3:a7: ab:bf:82:11:f3:54:d3:41:f3:3d:a1:77:00:7b:16:77: ac:99:93:49:b6:ad:76:76:fd:cf:fc:86:af:27:b1:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:24:b7:d5:75:8a:79:29:88:0a:2c:ef:2a:dd:7e:93: 45:5a:ca:10:47:1e:ea:a3:28:93:5e:c6:f5:5a:75:18: a7:f3:d4:a5:66:be:25:61:af:c2:e2:d4:0a:43:b7:91: a2:dc:4f:7d:b1:f0:ee:96:80:a0:44:c7:c7:57:bf:5a: 5b:60:b8:07:c1:d6:0f:3e:be:3d:61:03:9e:ee:51:5a: 7e:bb:44:3f:08:2e:8c:a3:94:59:89:5e:d3:ee:ee:09: b5:e1:4c:dc:1b:03:ce:1b:6d:30:94:bd:c4:d7:33:b2: 5d:9d:70:66:32:b2:21:e2:96:56:72:1e:f7:40:0b:68: 51:94:19:79:d2:3c:b7:ef:1e:ab:9e:26:a2:b7:fa:f2: 9e:12:d1:f2:6e:06:33:77:c6:fd:9e:ad:5b:47:f9:6a: c6:e5:cc:b2:7e:be:8e:82:3d:86:2c:79:df:4d:8b:29: 16:52:5f:c3:87:5f:6c:28:a7:f8:03:97:12:32:53:f4: 23:99:63:dc:b2:68:c4:b6:ca:dd:0a:ce:bb:72:6e:29: ae:a4:94:86:31:aa:89:50:9a:35:c4:a8:00:95:cf:b6: f3:10:65:97:c7:54:98:00:bb:ea:97:93:e0:1e:8c:7f: b9:31:5d:f8:52:e2:85:6a:8a:9f:bd:fb:d5:29:fd:dd Fingerprint (SHA-256): 57:FA:4C:AE:05:3E:A9:C9:7B:91:B1:14:BE:5A:3C:48:37:50:05:74:AA:F0:FC:16:7E:62:45:A4:43:7F:84:A5 Fingerprint (SHA1): A9:9E:0C:63:B2:7F:E9:F6:66:CB:9D:4F:7E:1F:7B:42:42:AC:79:27 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9890: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064793 (0x670f019) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:37:56 2016 Not After : Fri Jan 08 12:37:56 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:69:77:c0:74:2c:b6:01:bd:78:25:6a:98:6a:7b:8a: 5b:0c:8c:d5:72:14:74:dc:38:99:cd:3f:aa:ca:f7:b7: 17:1b:72:d3:c6:1c:98:63:9b:75:fd:54:8a:a9:e6:05: db:1f:2a:55:2f:f9:bb:83:d3:07:47:07:fd:c2:0d:a3: 40:7b:2b:98:16:70:56:f0:b2:c4:82:b0:d1:2e:b0:c8: 63:ed:f4:34:0f:2e:79:0a:39:f0:9c:b5:ab:cd:2a:11: 25:8b:6d:50:d3:1f:e2:a3:75:e4:a6:ab:af:56:2a:55: c8:52:57:33:0b:ad:20:4e:c0:3f:44:67:68:d4:b9:d7: f6:03:1c:10:21:bd:3a:07:0e:6a:02:3f:51:f6:b9:ca: 50:3d:1b:5b:9f:11:0d:9e:29:60:31:10:5c:87:ac:12: f8:5c:66:29:c6:37:6c:19:4c:b4:b4:46:41:8b:5b:29: 78:13:7a:f6:94:3b:1d:b8:f8:26:af:ea:42:03:94:f1: 18:3d:15:c6:d6:4d:e2:f3:f0:dc:6f:df:a7:9d:76:35: 00:ab:06:ed:65:81:33:ac:09:1b:1d:cc:fd:0d:d3:a7: ab:bf:82:11:f3:54:d3:41:f3:3d:a1:77:00:7b:16:77: ac:99:93:49:b6:ad:76:76:fd:cf:fc:86:af:27:b1:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:24:b7:d5:75:8a:79:29:88:0a:2c:ef:2a:dd:7e:93: 45:5a:ca:10:47:1e:ea:a3:28:93:5e:c6:f5:5a:75:18: a7:f3:d4:a5:66:be:25:61:af:c2:e2:d4:0a:43:b7:91: a2:dc:4f:7d:b1:f0:ee:96:80:a0:44:c7:c7:57:bf:5a: 5b:60:b8:07:c1:d6:0f:3e:be:3d:61:03:9e:ee:51:5a: 7e:bb:44:3f:08:2e:8c:a3:94:59:89:5e:d3:ee:ee:09: b5:e1:4c:dc:1b:03:ce:1b:6d:30:94:bd:c4:d7:33:b2: 5d:9d:70:66:32:b2:21:e2:96:56:72:1e:f7:40:0b:68: 51:94:19:79:d2:3c:b7:ef:1e:ab:9e:26:a2:b7:fa:f2: 9e:12:d1:f2:6e:06:33:77:c6:fd:9e:ad:5b:47:f9:6a: c6:e5:cc:b2:7e:be:8e:82:3d:86:2c:79:df:4d:8b:29: 16:52:5f:c3:87:5f:6c:28:a7:f8:03:97:12:32:53:f4: 23:99:63:dc:b2:68:c4:b6:ca:dd:0a:ce:bb:72:6e:29: ae:a4:94:86:31:aa:89:50:9a:35:c4:a8:00:95:cf:b6: f3:10:65:97:c7:54:98:00:bb:ea:97:93:e0:1e:8c:7f: b9:31:5d:f8:52:e2:85:6a:8a:9f:bd:fb:d5:29:fd:dd Fingerprint (SHA-256): 57:FA:4C:AE:05:3E:A9:C9:7B:91:B1:14:BE:5A:3C:48:37:50:05:74:AA:F0:FC:16:7E:62:45:A4:43:7F:84:A5 Fingerprint (SHA1): A9:9E:0C:63:B2:7F:E9:F6:66:CB:9D:4F:7E:1F:7B:42:42:AC:79:27 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9891: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #9892: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064798 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9893: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #9894: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #9895: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064799 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9896: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #9897: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #9898: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9899: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108064800 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9900: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9901: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108064801 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9902: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9903: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #9904: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9905: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9906: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108064802 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-Bridge-108064569.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9907: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9908: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9909: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9910: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108064803 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9911: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9912: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9913: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9914: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108064804 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-BridgeNavy-108064570.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9915: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9916: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9917: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9918: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108064805 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9919: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9920: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #9921: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #9922: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064799 (0x670f01f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:38:28 2016 Not After : Fri Jan 08 12:38:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:c9:2b:d1:c2:a6:25:d3:aa:36:ed:91:54:3f:a3:ec: 32:a7:17:43:e0:ec:e8:14:34:a6:98:28:07:08:89:f9: cf:dd:f3:ae:94:9e:81:90:19:d3:be:9b:40:dd:5a:41: d3:6d:00:57:ce:9f:3b:18:30:87:e7:09:9a:7b:1a:97: 24:24:4a:8f:cf:e8:31:be:49:20:2b:66:4b:a6:1c:2c: 95:c2:b4:5c:6b:9d:bd:dd:eb:58:5d:22:39:d4:1c:10: be:83:d3:59:54:be:1d:9a:08:19:7c:9d:24:c7:17:ce: 3a:66:67:29:54:2e:75:56:2b:8c:bc:b6:91:29:9c:b8: 15:8f:23:51:52:b0:f2:d4:c3:e3:88:b7:7d:6f:74:80: d3:a1:7f:a3:a1:3b:5d:75:88:72:5e:50:14:2d:41:0e: 43:ba:cb:d4:d4:5d:be:4c:8b:22:c2:97:ca:4d:2f:ae: 88:68:5a:27:88:86:d0:72:f5:40:08:82:f3:62:b5:be: a1:c1:0f:a9:b1:42:8d:d8:a4:8e:6c:cc:e7:dc:8f:a6: d3:01:97:2d:53:1a:f4:cb:b6:e8:f9:8a:3a:de:b9:b2: 79:12:75:27:9d:bd:6a:f9:25:c2:e1:52:54:c1:05:22: d8:0b:bf:02:fa:82:f0:02:60:8e:94:01:ca:8c:a1:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:c2:c4:e5:18:a1:86:f9:f8:f6:6f:93:5e:d1:54:71: 16:33:99:53:fe:68:c1:c1:a0:47:21:dd:b3:a6:0e:51: 32:99:c7:80:79:8f:83:3a:cb:c4:8b:e5:a1:e4:8a:6d: a1:b2:4f:c5:5e:7d:88:25:ae:75:ee:08:37:c5:bf:fb: 46:17:01:34:31:62:5a:1f:94:6a:b4:4a:3f:d5:48:63: b4:c2:e4:4c:82:1f:b1:71:11:21:2b:a4:22:fe:8b:76: 97:0e:76:5a:a0:c1:2e:43:b1:0e:90:5d:56:ef:86:ff: 97:4f:6a:ac:9c:01:62:5e:e9:a0:02:b1:55:84:f1:1c: 7a:a8:7a:2e:55:98:d0:78:03:18:63:49:a7:ed:76:64: 8a:38:9b:e3:4d:b0:eb:17:27:35:97:82:41:67:17:23: fd:71:42:3b:3a:9e:55:9e:64:ff:89:e5:72:7f:4a:9a: 29:70:26:25:06:0a:25:82:74:6e:75:4a:79:e3:10:8a: 47:aa:37:06:0f:e8:26:bb:58:39:e1:5d:3f:e8:5d:8e: 94:9e:e2:9f:f8:37:94:80:fb:bd:18:0a:85:3e:02:b3: 03:3d:1e:44:9c:12:8c:9a:5e:dd:dd:e3:28:d2:9b:18: 95:8e:d1:1a:8c:90:7b:47:49:e3:e4:bd:d1:fd:57:7a Fingerprint (SHA-256): A0:66:4E:04:5B:6C:B2:7E:9E:59:FC:45:C4:AD:FE:FD:DA:B1:04:29:33:77:50:18:5B:F8:50:D2:97:89:3B:F9 Fingerprint (SHA1): 7B:B4:18:8A:1A:C6:F7:13:C9:B9:33:E3:9C:56:51:43:7B:94:1E:EA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9923: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064799 (0x670f01f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:38:28 2016 Not After : Fri Jan 08 12:38:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:c9:2b:d1:c2:a6:25:d3:aa:36:ed:91:54:3f:a3:ec: 32:a7:17:43:e0:ec:e8:14:34:a6:98:28:07:08:89:f9: cf:dd:f3:ae:94:9e:81:90:19:d3:be:9b:40:dd:5a:41: d3:6d:00:57:ce:9f:3b:18:30:87:e7:09:9a:7b:1a:97: 24:24:4a:8f:cf:e8:31:be:49:20:2b:66:4b:a6:1c:2c: 95:c2:b4:5c:6b:9d:bd:dd:eb:58:5d:22:39:d4:1c:10: be:83:d3:59:54:be:1d:9a:08:19:7c:9d:24:c7:17:ce: 3a:66:67:29:54:2e:75:56:2b:8c:bc:b6:91:29:9c:b8: 15:8f:23:51:52:b0:f2:d4:c3:e3:88:b7:7d:6f:74:80: d3:a1:7f:a3:a1:3b:5d:75:88:72:5e:50:14:2d:41:0e: 43:ba:cb:d4:d4:5d:be:4c:8b:22:c2:97:ca:4d:2f:ae: 88:68:5a:27:88:86:d0:72:f5:40:08:82:f3:62:b5:be: a1:c1:0f:a9:b1:42:8d:d8:a4:8e:6c:cc:e7:dc:8f:a6: d3:01:97:2d:53:1a:f4:cb:b6:e8:f9:8a:3a:de:b9:b2: 79:12:75:27:9d:bd:6a:f9:25:c2:e1:52:54:c1:05:22: d8:0b:bf:02:fa:82:f0:02:60:8e:94:01:ca:8c:a1:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:c2:c4:e5:18:a1:86:f9:f8:f6:6f:93:5e:d1:54:71: 16:33:99:53:fe:68:c1:c1:a0:47:21:dd:b3:a6:0e:51: 32:99:c7:80:79:8f:83:3a:cb:c4:8b:e5:a1:e4:8a:6d: a1:b2:4f:c5:5e:7d:88:25:ae:75:ee:08:37:c5:bf:fb: 46:17:01:34:31:62:5a:1f:94:6a:b4:4a:3f:d5:48:63: b4:c2:e4:4c:82:1f:b1:71:11:21:2b:a4:22:fe:8b:76: 97:0e:76:5a:a0:c1:2e:43:b1:0e:90:5d:56:ef:86:ff: 97:4f:6a:ac:9c:01:62:5e:e9:a0:02:b1:55:84:f1:1c: 7a:a8:7a:2e:55:98:d0:78:03:18:63:49:a7:ed:76:64: 8a:38:9b:e3:4d:b0:eb:17:27:35:97:82:41:67:17:23: fd:71:42:3b:3a:9e:55:9e:64:ff:89:e5:72:7f:4a:9a: 29:70:26:25:06:0a:25:82:74:6e:75:4a:79:e3:10:8a: 47:aa:37:06:0f:e8:26:bb:58:39:e1:5d:3f:e8:5d:8e: 94:9e:e2:9f:f8:37:94:80:fb:bd:18:0a:85:3e:02:b3: 03:3d:1e:44:9c:12:8c:9a:5e:dd:dd:e3:28:d2:9b:18: 95:8e:d1:1a:8c:90:7b:47:49:e3:e4:bd:d1:fd:57:7a Fingerprint (SHA-256): A0:66:4E:04:5B:6C:B2:7E:9E:59:FC:45:C4:AD:FE:FD:DA:B1:04:29:33:77:50:18:5B:F8:50:D2:97:89:3B:F9 Fingerprint (SHA1): 7B:B4:18:8A:1A:C6:F7:13:C9:B9:33:E3:9C:56:51:43:7B:94:1E:EA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9924: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #9925: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064798 (0x670f01e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 12:38:19 2016 Not After : Fri Jan 08 12:38:19 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:30:4e:dd:2b:4b:8c:de:ec:3b:cb:61:6b:51:1f:61: ae:8d:a3:c1:08:f4:65:76:6a:6c:d6:15:a1:57:80:67: 4e:2f:aa:dd:1e:9a:81:51:68:4c:01:bf:d4:6a:fb:04: df:b8:91:c8:93:89:c0:9a:55:c9:66:79:e8:9d:a8:32: 75:5b:50:03:62:29:7d:4c:3f:aa:63:77:6b:53:e9:97: ed:ac:53:99:77:26:73:d7:a3:c3:72:87:04:bd:d6:53: aa:97:b1:57:70:29:ac:20:bf:7e:95:97:7f:8b:4b:8a: 97:6f:ec:8d:7d:9d:50:6e:73:15:e3:f4:50:3f:2d:ee: bd:b1:34:0d:7f:19:90:2e:20:a0:eb:37:e1:45:8b:92: 0a:84:53:85:b9:94:6e:76:af:88:eb:16:18:e4:fa:4a: df:99:f8:ac:9c:54:45:7b:34:43:30:f9:3b:e1:4e:7f: 1d:09:15:d3:77:17:dc:b2:51:69:15:d8:c6:f9:ac:e3: f7:80:9c:22:aa:b2:00:eb:e7:0d:98:cb:7b:e1:26:65: b2:f1:54:1b:9e:77:81:ee:47:f9:50:e7:6f:07:47:b7: c1:57:b3:ce:c5:af:20:f5:6b:a2:0d:7e:b8:98:c5:11: 91:27:44:4c:6f:b8:c4:1c:ad:1f:8f:3f:61:14:e6:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:d3:ce:78:64:03:f8:b8:58:04:76:27:fa:d4:6f:cf: 8b:2d:b9:70:e6:01:36:98:2d:75:b2:f7:3f:bb:77:08: 46:86:ee:7f:3b:9c:12:6a:96:a7:c8:e3:44:7c:f3:5f: 4d:d0:f0:51:31:98:2e:6a:e8:70:2e:4b:5c:1e:e9:a8: 22:d8:8c:11:f6:92:b4:d5:44:f7:3e:72:8d:45:de:95: a7:68:13:b8:b5:db:aa:ee:eb:a4:cb:cb:9f:61:b8:f9: c0:3c:cc:29:5e:4c:ef:e4:ca:36:7e:53:5d:96:53:7a: 99:dc:6e:66:ef:fa:8f:ca:ed:28:e0:44:c9:56:ee:b4: f9:c9:85:ce:0e:10:76:cc:5c:df:0b:85:e8:a9:60:fb: b1:be:ae:5c:e0:ce:b9:0a:ad:3d:52:2a:7b:3b:6f:00: ff:af:09:83:f8:0f:ed:05:64:08:92:ba:d9:7a:b9:da: d2:a9:57:eb:81:8d:07:94:ef:da:7a:bc:cc:f5:ff:c6: 64:a8:54:45:d8:47:88:f9:93:c7:9b:96:63:04:17:8a: 1b:df:99:6e:41:ed:e2:8d:0e:9e:12:5f:7d:6a:c1:81: f8:f1:ec:43:4a:7d:1f:b2:4b:a3:2f:3c:85:b4:41:7f: 83:07:03:39:b2:a1:fe:06:f3:39:ad:d8:5f:9c:6a:1f Fingerprint (SHA-256): A6:46:73:29:AD:39:59:29:35:02:0C:E6:9A:37:64:A3:65:50:E2:85:9F:C7:65:5E:B8:65:0C:F8:4B:C0:15:0E Fingerprint (SHA1): 12:04:23:80:60:BB:6D:C5:B4:4C:34:C3:75:A2:55:EE:6F:D0:00:65 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9926: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064799 (0x670f01f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:38:28 2016 Not After : Fri Jan 08 12:38:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:c9:2b:d1:c2:a6:25:d3:aa:36:ed:91:54:3f:a3:ec: 32:a7:17:43:e0:ec:e8:14:34:a6:98:28:07:08:89:f9: cf:dd:f3:ae:94:9e:81:90:19:d3:be:9b:40:dd:5a:41: d3:6d:00:57:ce:9f:3b:18:30:87:e7:09:9a:7b:1a:97: 24:24:4a:8f:cf:e8:31:be:49:20:2b:66:4b:a6:1c:2c: 95:c2:b4:5c:6b:9d:bd:dd:eb:58:5d:22:39:d4:1c:10: be:83:d3:59:54:be:1d:9a:08:19:7c:9d:24:c7:17:ce: 3a:66:67:29:54:2e:75:56:2b:8c:bc:b6:91:29:9c:b8: 15:8f:23:51:52:b0:f2:d4:c3:e3:88:b7:7d:6f:74:80: d3:a1:7f:a3:a1:3b:5d:75:88:72:5e:50:14:2d:41:0e: 43:ba:cb:d4:d4:5d:be:4c:8b:22:c2:97:ca:4d:2f:ae: 88:68:5a:27:88:86:d0:72:f5:40:08:82:f3:62:b5:be: a1:c1:0f:a9:b1:42:8d:d8:a4:8e:6c:cc:e7:dc:8f:a6: d3:01:97:2d:53:1a:f4:cb:b6:e8:f9:8a:3a:de:b9:b2: 79:12:75:27:9d:bd:6a:f9:25:c2:e1:52:54:c1:05:22: d8:0b:bf:02:fa:82:f0:02:60:8e:94:01:ca:8c:a1:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:c2:c4:e5:18:a1:86:f9:f8:f6:6f:93:5e:d1:54:71: 16:33:99:53:fe:68:c1:c1:a0:47:21:dd:b3:a6:0e:51: 32:99:c7:80:79:8f:83:3a:cb:c4:8b:e5:a1:e4:8a:6d: a1:b2:4f:c5:5e:7d:88:25:ae:75:ee:08:37:c5:bf:fb: 46:17:01:34:31:62:5a:1f:94:6a:b4:4a:3f:d5:48:63: b4:c2:e4:4c:82:1f:b1:71:11:21:2b:a4:22:fe:8b:76: 97:0e:76:5a:a0:c1:2e:43:b1:0e:90:5d:56:ef:86:ff: 97:4f:6a:ac:9c:01:62:5e:e9:a0:02:b1:55:84:f1:1c: 7a:a8:7a:2e:55:98:d0:78:03:18:63:49:a7:ed:76:64: 8a:38:9b:e3:4d:b0:eb:17:27:35:97:82:41:67:17:23: fd:71:42:3b:3a:9e:55:9e:64:ff:89:e5:72:7f:4a:9a: 29:70:26:25:06:0a:25:82:74:6e:75:4a:79:e3:10:8a: 47:aa:37:06:0f:e8:26:bb:58:39:e1:5d:3f:e8:5d:8e: 94:9e:e2:9f:f8:37:94:80:fb:bd:18:0a:85:3e:02:b3: 03:3d:1e:44:9c:12:8c:9a:5e:dd:dd:e3:28:d2:9b:18: 95:8e:d1:1a:8c:90:7b:47:49:e3:e4:bd:d1:fd:57:7a Fingerprint (SHA-256): A0:66:4E:04:5B:6C:B2:7E:9E:59:FC:45:C4:AD:FE:FD:DA:B1:04:29:33:77:50:18:5B:F8:50:D2:97:89:3B:F9 Fingerprint (SHA1): 7B:B4:18:8A:1A:C6:F7:13:C9:B9:33:E3:9C:56:51:43:7B:94:1E:EA Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9927: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064799 (0x670f01f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:38:28 2016 Not After : Fri Jan 08 12:38:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:c9:2b:d1:c2:a6:25:d3:aa:36:ed:91:54:3f:a3:ec: 32:a7:17:43:e0:ec:e8:14:34:a6:98:28:07:08:89:f9: cf:dd:f3:ae:94:9e:81:90:19:d3:be:9b:40:dd:5a:41: d3:6d:00:57:ce:9f:3b:18:30:87:e7:09:9a:7b:1a:97: 24:24:4a:8f:cf:e8:31:be:49:20:2b:66:4b:a6:1c:2c: 95:c2:b4:5c:6b:9d:bd:dd:eb:58:5d:22:39:d4:1c:10: be:83:d3:59:54:be:1d:9a:08:19:7c:9d:24:c7:17:ce: 3a:66:67:29:54:2e:75:56:2b:8c:bc:b6:91:29:9c:b8: 15:8f:23:51:52:b0:f2:d4:c3:e3:88:b7:7d:6f:74:80: d3:a1:7f:a3:a1:3b:5d:75:88:72:5e:50:14:2d:41:0e: 43:ba:cb:d4:d4:5d:be:4c:8b:22:c2:97:ca:4d:2f:ae: 88:68:5a:27:88:86:d0:72:f5:40:08:82:f3:62:b5:be: a1:c1:0f:a9:b1:42:8d:d8:a4:8e:6c:cc:e7:dc:8f:a6: d3:01:97:2d:53:1a:f4:cb:b6:e8:f9:8a:3a:de:b9:b2: 79:12:75:27:9d:bd:6a:f9:25:c2:e1:52:54:c1:05:22: d8:0b:bf:02:fa:82:f0:02:60:8e:94:01:ca:8c:a1:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:c2:c4:e5:18:a1:86:f9:f8:f6:6f:93:5e:d1:54:71: 16:33:99:53:fe:68:c1:c1:a0:47:21:dd:b3:a6:0e:51: 32:99:c7:80:79:8f:83:3a:cb:c4:8b:e5:a1:e4:8a:6d: a1:b2:4f:c5:5e:7d:88:25:ae:75:ee:08:37:c5:bf:fb: 46:17:01:34:31:62:5a:1f:94:6a:b4:4a:3f:d5:48:63: b4:c2:e4:4c:82:1f:b1:71:11:21:2b:a4:22:fe:8b:76: 97:0e:76:5a:a0:c1:2e:43:b1:0e:90:5d:56:ef:86:ff: 97:4f:6a:ac:9c:01:62:5e:e9:a0:02:b1:55:84:f1:1c: 7a:a8:7a:2e:55:98:d0:78:03:18:63:49:a7:ed:76:64: 8a:38:9b:e3:4d:b0:eb:17:27:35:97:82:41:67:17:23: fd:71:42:3b:3a:9e:55:9e:64:ff:89:e5:72:7f:4a:9a: 29:70:26:25:06:0a:25:82:74:6e:75:4a:79:e3:10:8a: 47:aa:37:06:0f:e8:26:bb:58:39:e1:5d:3f:e8:5d:8e: 94:9e:e2:9f:f8:37:94:80:fb:bd:18:0a:85:3e:02:b3: 03:3d:1e:44:9c:12:8c:9a:5e:dd:dd:e3:28:d2:9b:18: 95:8e:d1:1a:8c:90:7b:47:49:e3:e4:bd:d1:fd:57:7a Fingerprint (SHA-256): A0:66:4E:04:5B:6C:B2:7E:9E:59:FC:45:C4:AD:FE:FD:DA:B1:04:29:33:77:50:18:5B:F8:50:D2:97:89:3B:F9 Fingerprint (SHA1): 7B:B4:18:8A:1A:C6:F7:13:C9:B9:33:E3:9C:56:51:43:7B:94:1E:EA Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9928: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #9929: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064806 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9930: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #9931: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #9932: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064807 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9933: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #9934: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #9935: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9936: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 108064808 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9937: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9938: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #9939: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9940: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 108064809 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9941: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9942: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #9943: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9944: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 108064810 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #9945: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9946: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 108064811 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #9947: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9948: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #9949: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9950: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9951: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108064812 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9952: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9953: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9954: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9955: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108064813 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9956: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9957: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9958: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9959: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108064814 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9960: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9961: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9962: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9963: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108064815 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9964: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9965: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9966: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064806 (0x670f026) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 12:39:48 2016 Not After : Fri Jan 08 12:39:48 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:de:f1:53:d9:41:27:56:d7:3c:c5:eb:d8:32:21:0b: 2c:44:d2:06:f9:0f:ac:fb:55:8e:88:32:0b:f1:67:ba: c8:5d:1e:e0:82:cf:b1:83:fe:42:fa:65:a4:a8:5c:56: f7:86:ac:ab:fc:6d:f5:19:b2:73:b7:fc:b6:c3:e3:3e: e2:69:88:6f:35:5e:04:c4:c8:9a:4e:5c:27:4d:91:47: c3:60:0c:7a:2a:c8:af:2e:8e:16:30:c2:36:6d:84:87: 8f:5f:5f:44:35:38:5b:e5:d3:18:f2:0d:ec:e8:08:ad: 53:4c:7f:62:d4:55:e4:25:0a:de:70:b1:51:be:49:f0: 7b:02:df:bd:2d:31:6a:99:48:71:b4:7c:c6:b5:1f:1a: 4d:24:5c:da:9f:00:b4:ae:14:52:86:18:64:a7:11:44: 99:b2:59:a5:63:8a:d8:6e:43:3e:d1:e3:bb:a0:5e:31: 03:6b:43:b7:fe:4a:c0:d9:8a:f5:5c:61:73:fd:3f:0e: 3b:50:eb:22:7d:1c:19:5e:b9:2b:dc:e7:1d:76:e5:c3: a3:7b:2e:36:82:ee:5a:5b:35:26:c9:ea:bd:a3:40:69: af:50:e5:0f:53:ca:e3:a8:0f:1a:8d:3f:42:58:68:a6: 6d:5f:17:94:eb:04:37:52:f0:a9:4c:a5:0c:c5:0f:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:9a:83:88:18:50:a4:79:58:5c:16:f7:28:ef:27:a2: 45:f2:f0:b0:22:2d:57:82:40:ac:9b:98:66:f4:54:6d: 28:44:47:1b:8e:7c:1a:68:46:6a:34:43:a2:60:0b:5d: b8:cd:01:f7:d0:ce:b1:e1:93:43:29:9b:8e:5a:8a:1f: f3:1c:3f:b9:aa:57:c0:66:8f:51:b1:ac:48:00:05:05: 63:88:aa:3a:8d:91:e8:f2:61:b2:19:67:45:49:9b:e6: 44:17:47:cd:b1:95:92:71:c5:f7:42:78:6c:f2:4a:0f: 5f:ce:ec:b1:d7:de:f0:b6:bb:e4:e3:14:cd:5e:76:85: 04:fe:38:73:dc:26:5d:4d:73:e4:19:27:8d:a2:83:02: 77:f5:4f:a1:aa:8e:9a:4c:8f:12:6c:d1:6b:5f:fd:e9: f9:8f:ff:3b:f7:be:7b:06:f8:fa:55:cd:b8:42:51:c2: e4:99:c9:74:7c:ca:2e:95:c3:25:27:b4:4c:10:07:d1: 60:a0:08:c7:76:06:15:6b:68:1d:95:45:48:70:a7:b4: a3:25:59:82:d3:be:78:56:be:1c:38:f0:bb:52:0f:e8: c6:26:24:23:f0:63:74:c5:49:af:2e:fc:05:f9:6c:af: 7c:32:b9:92:86:9d:28:6e:ad:81:2f:26:d7:4b:65:62 Fingerprint (SHA-256): F6:0F:5B:3E:0F:94:E2:FC:74:4E:3F:36:44:5D:AB:51:5E:4C:2C:43:CF:A1:69:12:A5:2E:00:37:9D:64:0F:16 Fingerprint (SHA1): FE:9C:44:20:07:02:45:9E:BF:12:71:9B:CA:83:79:CC:EC:26:AA:B6 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #9967: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9968: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9969: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9970: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9971: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9972: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9973: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9974: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9975: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064807 (0x670f027) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 12:39:59 2016 Not After : Fri Jan 08 12:39:59 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:69:57:cf:00:56:78:5d:34:59:b7:bd:77:da:4a:82: 0f:a2:e5:fc:74:16:ad:68:53:49:44:75:ad:c7:43:74: ec:a1:15:d1:23:44:75:a4:a1:57:43:c2:f9:71:97:52: 56:b3:2c:5a:ac:f0:59:e8:da:0b:2c:d6:e5:35:98:78: 3e:8c:f2:ff:44:07:60:3e:3c:f1:b0:12:01:35:f1:9f: ef:47:0c:7d:7f:46:f6:38:b6:b4:16:d9:49:14:4b:3e: ac:53:e1:20:f6:cb:ce:fe:33:71:4a:40:a6:a3:8e:8a: 80:51:6a:1b:c0:f9:e8:ea:db:6b:e8:40:5c:9a:58:dc: 8a:48:5d:f7:e4:92:8f:5b:d8:8b:ba:c1:12:4e:3f:84: 67:24:4d:f0:e7:fe:60:fb:54:34:0e:a6:27:33:f6:8a: cb:30:99:bc:d2:07:cd:b5:8f:b7:b0:fe:9b:96:bd:ae: 12:86:2d:e4:85:43:37:f0:84:fc:12:0b:04:80:63:fa: 1a:9c:70:be:e9:a3:7d:72:10:38:45:61:8a:f8:f1:b8: ee:82:f7:31:98:a6:c2:1e:f4:a6:61:26:f3:fd:66:98: d6:4c:2f:52:98:22:95:14:3d:46:af:2d:dc:92:f2:16: 5f:2a:9a:6c:17:60:e5:b7:7b:e0:f8:06:37:f0:96:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:ec:e5:3c:2d:4b:40:0d:51:43:e3:d2:2d:e8:e7:8d: 04:33:61:18:5f:9e:5b:aa:16:37:e9:6f:40:d2:0d:00: c3:88:7d:64:31:1e:86:f3:22:ec:c6:af:15:cc:d5:19: b2:b4:1e:c9:1d:21:68:8c:ad:ba:6e:a3:f2:17:2b:42: e1:2f:36:2e:e8:7e:83:62:9c:c6:bc:cf:67:af:1b:61: c9:42:ae:30:ae:bc:f4:dd:38:64:e9:f4:c4:53:61:2f: 20:29:04:ac:40:cb:91:ab:7d:f4:72:55:a6:cd:5f:fe: a9:32:99:71:a6:64:14:50:de:36:06:c2:ef:62:15:9c: 8b:af:63:83:1c:ed:e7:b7:32:45:6d:5c:f4:d4:61:25: dd:74:6d:9e:f6:e6:5d:08:98:14:39:1a:a2:1f:2f:98: 5d:75:eb:a0:6b:4b:ba:e2:bc:2b:ce:6b:02:38:41:21: 62:b8:e6:d8:06:64:31:19:e3:d0:e3:3a:f0:11:c7:e6: 2c:d8:71:6a:67:d9:86:63:fb:b3:5f:6f:72:bd:b3:78: 4f:18:f1:64:58:5a:f8:c9:51:4d:35:a7:4b:e6:b0:d5: 97:90:e1:82:a4:b3:25:57:9a:7a:ee:78:10:a5:61:70: aa:03:ec:e5:21:b9:4e:dd:1a:d5:6a:e2:a2:a8:43:45 Fingerprint (SHA-256): A5:A1:1F:74:98:FA:1A:01:59:77:38:41:1F:AE:A2:89:EE:B3:1C:EC:94:71:A7:6E:8F:E4:3D:42:68:62:0D:74 Fingerprint (SHA1): C0:EE:25:4A:C5:43:7F:FD:D9:92:71:51:8D:9B:99:D9:8D:04:E9:5F Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #9976: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9977: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9978: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9979: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9980: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9981: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9982: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #9983: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #9984: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #9985: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #9986: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #9987: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #9988: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #9989: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #9990: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #9991: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #9992: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #9993: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9994: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064816 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9995: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9996: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9997: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9998: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108064817 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9999: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10000: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #10001: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10002: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108064818 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10003: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10004: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #10005: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10006: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 108064819 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10007: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10008: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #10009: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10010: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108064820 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10011: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10012: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #10013: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10014: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 108064821 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10015: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10016: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #10017: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10018: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 108064822 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10019: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10020: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #10021: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10022: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 108064823 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10023: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10024: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #10025: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10026: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 108064824 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10027: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10028: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #10029: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064816 (0x670f030) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:41:32 2016 Not After : Fri Jan 08 12:41:32 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: b6:b5:af:ae:45:2c:ee:55:71:2b:0e:4a:4d:ea:c6:92: a6:68:b7:ad:d6:6c:74:a8:74:0a:83:4c:83:f4:a2:d8: f8:ea:4f:e3:7a:e3:40:1e:37:62:e5:a6:2a:93:d1:94: 46:2d:56:74:79:39:10:78:5d:d5:df:09:54:6a:b0:e0: 50:aa:15:29:9f:72:a6:47:0a:aa:13:59:72:b3:9b:01: 09:8e:1d:e6:e0:e1:9d:14:c0:69:a4:6b:7f:20:bb:d5: ea:71:fc:e1:3a:d7:8e:e0:5d:0e:f0:0c:cf:1c:12:ae: c6:9d:60:69:9b:d2:3d:b8:32:ea:0a:9b:e0:88:df:0d: 98:7f:d8:2d:1c:36:8a:db:14:79:6b:fc:d6:13:3d:80: 92:46:1e:6b:c0:0b:5f:04:96:51:ec:60:31:4d:a1:52: bc:20:38:f9:28:83:80:bb:2e:2d:dd:bf:2f:c3:f4:1c: c3:65:f1:00:f2:8c:05:6d:1d:ff:7a:7a:13:0f:11:4c: 35:ac:3e:af:dd:2e:2c:e8:2a:7d:90:a0:8d:0e:01:3c: 66:38:1a:f9:75:24:af:8e:49:4d:49:dd:6f:a7:fd:81: 94:da:f0:c7:ca:7f:7e:12:b7:2c:f3:83:6f:a1:41:70: 44:fb:5d:a1:bc:76:12:0f:15:85:b9:c8:96:45:41:2d Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:a3:b1:5d:9a:89:79:a5:ad:3e:9c:0d: 30:c6:88:93:fd:86:a9:92:ea:3b:b2:5c:e8:d0:c7:e2: 29:02:1c:3d:28:75:06:f0:78:4a:21:5e:ba:08:d7:c3: 02:53:a6:db:a4:69:f6:6c:de:07:62:14:a9:83:19 Fingerprint (SHA-256): 8D:E8:B6:DD:FE:9A:8B:6F:1E:77:B6:75:07:CE:D9:F7:A8:B8:D2:D2:15:DE:4F:2F:30:F1:1D:E1:82:B8:AC:9C Fingerprint (SHA1): ED:C0:29:0F:43:F8:BA:60:48:76:ED:2D:A8:58:74:13:ED:AA:7F:EB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #10030: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064816 (0x670f030) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:41:32 2016 Not After : Fri Jan 08 12:41:32 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: b6:b5:af:ae:45:2c:ee:55:71:2b:0e:4a:4d:ea:c6:92: a6:68:b7:ad:d6:6c:74:a8:74:0a:83:4c:83:f4:a2:d8: f8:ea:4f:e3:7a:e3:40:1e:37:62:e5:a6:2a:93:d1:94: 46:2d:56:74:79:39:10:78:5d:d5:df:09:54:6a:b0:e0: 50:aa:15:29:9f:72:a6:47:0a:aa:13:59:72:b3:9b:01: 09:8e:1d:e6:e0:e1:9d:14:c0:69:a4:6b:7f:20:bb:d5: ea:71:fc:e1:3a:d7:8e:e0:5d:0e:f0:0c:cf:1c:12:ae: c6:9d:60:69:9b:d2:3d:b8:32:ea:0a:9b:e0:88:df:0d: 98:7f:d8:2d:1c:36:8a:db:14:79:6b:fc:d6:13:3d:80: 92:46:1e:6b:c0:0b:5f:04:96:51:ec:60:31:4d:a1:52: bc:20:38:f9:28:83:80:bb:2e:2d:dd:bf:2f:c3:f4:1c: c3:65:f1:00:f2:8c:05:6d:1d:ff:7a:7a:13:0f:11:4c: 35:ac:3e:af:dd:2e:2c:e8:2a:7d:90:a0:8d:0e:01:3c: 66:38:1a:f9:75:24:af:8e:49:4d:49:dd:6f:a7:fd:81: 94:da:f0:c7:ca:7f:7e:12:b7:2c:f3:83:6f:a1:41:70: 44:fb:5d:a1:bc:76:12:0f:15:85:b9:c8:96:45:41:2d Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:a3:b1:5d:9a:89:79:a5:ad:3e:9c:0d: 30:c6:88:93:fd:86:a9:92:ea:3b:b2:5c:e8:d0:c7:e2: 29:02:1c:3d:28:75:06:f0:78:4a:21:5e:ba:08:d7:c3: 02:53:a6:db:a4:69:f6:6c:de:07:62:14:a9:83:19 Fingerprint (SHA-256): 8D:E8:B6:DD:FE:9A:8B:6F:1E:77:B6:75:07:CE:D9:F7:A8:B8:D2:D2:15:DE:4F:2F:30:F1:1D:E1:82:B8:AC:9C Fingerprint (SHA1): ED:C0:29:0F:43:F8:BA:60:48:76:ED:2D:A8:58:74:13:ED:AA:7F:EB Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #10031: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064816 (0x670f030) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:41:32 2016 Not After : Fri Jan 08 12:41:32 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: b6:b5:af:ae:45:2c:ee:55:71:2b:0e:4a:4d:ea:c6:92: a6:68:b7:ad:d6:6c:74:a8:74:0a:83:4c:83:f4:a2:d8: f8:ea:4f:e3:7a:e3:40:1e:37:62:e5:a6:2a:93:d1:94: 46:2d:56:74:79:39:10:78:5d:d5:df:09:54:6a:b0:e0: 50:aa:15:29:9f:72:a6:47:0a:aa:13:59:72:b3:9b:01: 09:8e:1d:e6:e0:e1:9d:14:c0:69:a4:6b:7f:20:bb:d5: ea:71:fc:e1:3a:d7:8e:e0:5d:0e:f0:0c:cf:1c:12:ae: c6:9d:60:69:9b:d2:3d:b8:32:ea:0a:9b:e0:88:df:0d: 98:7f:d8:2d:1c:36:8a:db:14:79:6b:fc:d6:13:3d:80: 92:46:1e:6b:c0:0b:5f:04:96:51:ec:60:31:4d:a1:52: bc:20:38:f9:28:83:80:bb:2e:2d:dd:bf:2f:c3:f4:1c: c3:65:f1:00:f2:8c:05:6d:1d:ff:7a:7a:13:0f:11:4c: 35:ac:3e:af:dd:2e:2c:e8:2a:7d:90:a0:8d:0e:01:3c: 66:38:1a:f9:75:24:af:8e:49:4d:49:dd:6f:a7:fd:81: 94:da:f0:c7:ca:7f:7e:12:b7:2c:f3:83:6f:a1:41:70: 44:fb:5d:a1:bc:76:12:0f:15:85:b9:c8:96:45:41:2d Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:a3:b1:5d:9a:89:79:a5:ad:3e:9c:0d: 30:c6:88:93:fd:86:a9:92:ea:3b:b2:5c:e8:d0:c7:e2: 29:02:1c:3d:28:75:06:f0:78:4a:21:5e:ba:08:d7:c3: 02:53:a6:db:a4:69:f6:6c:de:07:62:14:a9:83:19 Fingerprint (SHA-256): 8D:E8:B6:DD:FE:9A:8B:6F:1E:77:B6:75:07:CE:D9:F7:A8:B8:D2:D2:15:DE:4F:2F:30:F1:1D:E1:82:B8:AC:9C Fingerprint (SHA1): ED:C0:29:0F:43:F8:BA:60:48:76:ED:2D:A8:58:74:13:ED:AA:7F:EB Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #10032: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064816 (0x670f030) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:41:32 2016 Not After : Fri Jan 08 12:41:32 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: b6:b5:af:ae:45:2c:ee:55:71:2b:0e:4a:4d:ea:c6:92: a6:68:b7:ad:d6:6c:74:a8:74:0a:83:4c:83:f4:a2:d8: f8:ea:4f:e3:7a:e3:40:1e:37:62:e5:a6:2a:93:d1:94: 46:2d:56:74:79:39:10:78:5d:d5:df:09:54:6a:b0:e0: 50:aa:15:29:9f:72:a6:47:0a:aa:13:59:72:b3:9b:01: 09:8e:1d:e6:e0:e1:9d:14:c0:69:a4:6b:7f:20:bb:d5: ea:71:fc:e1:3a:d7:8e:e0:5d:0e:f0:0c:cf:1c:12:ae: c6:9d:60:69:9b:d2:3d:b8:32:ea:0a:9b:e0:88:df:0d: 98:7f:d8:2d:1c:36:8a:db:14:79:6b:fc:d6:13:3d:80: 92:46:1e:6b:c0:0b:5f:04:96:51:ec:60:31:4d:a1:52: bc:20:38:f9:28:83:80:bb:2e:2d:dd:bf:2f:c3:f4:1c: c3:65:f1:00:f2:8c:05:6d:1d:ff:7a:7a:13:0f:11:4c: 35:ac:3e:af:dd:2e:2c:e8:2a:7d:90:a0:8d:0e:01:3c: 66:38:1a:f9:75:24:af:8e:49:4d:49:dd:6f:a7:fd:81: 94:da:f0:c7:ca:7f:7e:12:b7:2c:f3:83:6f:a1:41:70: 44:fb:5d:a1:bc:76:12:0f:15:85:b9:c8:96:45:41:2d Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:a3:b1:5d:9a:89:79:a5:ad:3e:9c:0d: 30:c6:88:93:fd:86:a9:92:ea:3b:b2:5c:e8:d0:c7:e2: 29:02:1c:3d:28:75:06:f0:78:4a:21:5e:ba:08:d7:c3: 02:53:a6:db:a4:69:f6:6c:de:07:62:14:a9:83:19 Fingerprint (SHA-256): 8D:E8:B6:DD:FE:9A:8B:6F:1E:77:B6:75:07:CE:D9:F7:A8:B8:D2:D2:15:DE:4F:2F:30:F1:1D:E1:82:B8:AC:9C Fingerprint (SHA1): ED:C0:29:0F:43:F8:BA:60:48:76:ED:2D:A8:58:74:13:ED:AA:7F:EB Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #10033: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #10034: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10035: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #10036: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #10037: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10038: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10039: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10040: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #10041: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10042: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10043: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10044: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #10045: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10046: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10047: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10048: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #10049: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10050: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10051: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10052: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #10053: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10054: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10055: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10056: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #10057: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10058: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10059: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10060: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108124403Z nextupdate=20170108124403Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 12:44:03 2016 Next Update: Sun Jan 08 12:44:03 2017 CRL Extensions: chains.sh: #10061: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108124403Z nextupdate=20170108124403Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 12:44:03 2016 Next Update: Sun Jan 08 12:44:03 2017 CRL Extensions: chains.sh: #10062: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108124404Z nextupdate=20170108124404Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 12:44:04 2016 Next Update: Sun Jan 08 12:44:04 2017 CRL Extensions: chains.sh: #10063: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108124405Z nextupdate=20170108124405Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 12:44:05 2016 Next Update: Sun Jan 08 12:44:05 2017 CRL Extensions: chains.sh: #10064: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108124406Z addcert 14 20160108124406Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 12:44:06 2016 Next Update: Sun Jan 08 12:44:04 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Jan 08 12:44:06 2016 CRL Extensions: chains.sh: #10065: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108124407Z addcert 15 20160108124407Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 12:44:07 2016 Next Update: Sun Jan 08 12:44:03 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Jan 08 12:44:07 2016 CRL Extensions: chains.sh: #10066: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #10067: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10068: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #10069: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #10070: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #10071: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #10072: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #10073: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #10074: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #10075: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:42:58 2016 Not After : Fri Jan 08 12:42:58 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:43:29:86:eb:3d:dd:18:c1:19:7f:da:60:ca:de:a0: 15:c9:67:27:0c:6b:45:8a:bd:00:92:3d:c9:00:a9:07: 7a:4b:24:75:11:8b:c7:0f:43:bf:0a:4c:a8:4d:e4:fd: 88:dd:97:b5:1a:fc:b5:4d:42:f9:0b:a2:90:ab:00:b7: 95:94:03:cc:a9:70:d5:56:c3:e2:56:87:92:b0:47:3c: 47:51:9a:da:53:71:9e:d6:bd:43:11:ce:18:d9:78:0e: a6:cb:99:9e:c8:15:09:96:d4:09:47:ac:6e:be:fd:3b: 21:78:7c:43:8e:db:ab:45:20:f7:f4:a1:a5:71:fe:bc: 52:fc:15:15:9a:4e:7f:0d:b3:46:de:90:aa:9a:a8:c7: 6a:26:82:77:ba:97:11:09:5e:54:b9:b8:a3:9a:bc:b4: b8:ae:19:94:35:85:b0:ec:fe:7c:ee:18:33:37:d3:ef: ca:8c:b3:b6:e2:7a:62:03:9d:a4:ab:d7:d5:91:5c:3c: 51:2a:af:4a:e0:21:82:ed:fd:1e:57:62:c9:5a:81:a5: 76:82:2a:1f:a0:88:cd:d1:27:e0:17:25:43:e2:f3:ee: 70:87:44:21:4b:a0:b4:4f:a4:92:03:dd:ca:c9:53:20: 31:70:ed:37:da:60:73:2b:2e:bf:d9:14:8e:31:bb:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:94:df:c8:bb:6b:13:11:d5:ea:3c:b0:ca:23:af:ff: 19:0f:f4:3f:18:64:f0:9d:5f:e9:e1:af:2a:4f:2f:4e: 17:4b:2d:8d:97:fe:08:04:32:71:9d:a6:c9:53:8f:f4: ff:6c:e8:08:eb:84:88:64:22:69:4d:3c:87:a7:26:f8: f5:ff:f8:ad:c0:bb:8f:e4:1d:6c:55:2a:d1:98:b4:0f: e4:a0:98:15:34:42:4a:a1:5f:52:8b:e7:49:db:b0:24: ed:46:45:91:aa:23:ba:e0:19:de:bc:e1:a8:91:4a:6a: 77:53:c0:e0:76:e3:53:f1:6d:06:d4:8f:66:74:79:96: 0c:4a:3e:36:86:9e:5c:16:87:80:a4:2d:32:36:43:5a: 30:9c:44:ef:4f:d8:24:d9:8a:67:f0:ab:39:86:86:9b: 1e:98:47:58:a2:a4:a0:af:ac:3e:07:ab:45:46:b1:9f: 64:c4:bd:3e:ad:b2:5f:54:6e:83:0d:56:f9:c8:f8:a5: 75:7e:6d:d3:a8:8a:85:e7:a2:e5:06:64:95:f9:79:15: 52:be:e5:56:dc:7d:c9:74:53:df:e5:58:ad:ed:6b:02: 25:5d:f9:3d:7e:a8:2a:5c:3a:96:38:81:36:7f:11:c5: eb:16:9d:dd:f6:af:e4:4c:95:06:b6:94:2b:a9:98:92 Fingerprint (SHA-256): A2:32:E5:91:3A:24:DC:AB:5D:25:45:B0:34:9B:92:A2:0F:D0:CF:24:38:C1:02:9A:13:B2:57:02:B0:B7:57:63 Fingerprint (SHA1): 58:D0:17:22:2B:7E:6E:AD:BD:2E:02:84:63:71:23:49:6C:97:B6:80 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #10076: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #10077: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:42:58 2016 Not After : Fri Jan 08 12:42:58 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:43:29:86:eb:3d:dd:18:c1:19:7f:da:60:ca:de:a0: 15:c9:67:27:0c:6b:45:8a:bd:00:92:3d:c9:00:a9:07: 7a:4b:24:75:11:8b:c7:0f:43:bf:0a:4c:a8:4d:e4:fd: 88:dd:97:b5:1a:fc:b5:4d:42:f9:0b:a2:90:ab:00:b7: 95:94:03:cc:a9:70:d5:56:c3:e2:56:87:92:b0:47:3c: 47:51:9a:da:53:71:9e:d6:bd:43:11:ce:18:d9:78:0e: a6:cb:99:9e:c8:15:09:96:d4:09:47:ac:6e:be:fd:3b: 21:78:7c:43:8e:db:ab:45:20:f7:f4:a1:a5:71:fe:bc: 52:fc:15:15:9a:4e:7f:0d:b3:46:de:90:aa:9a:a8:c7: 6a:26:82:77:ba:97:11:09:5e:54:b9:b8:a3:9a:bc:b4: b8:ae:19:94:35:85:b0:ec:fe:7c:ee:18:33:37:d3:ef: ca:8c:b3:b6:e2:7a:62:03:9d:a4:ab:d7:d5:91:5c:3c: 51:2a:af:4a:e0:21:82:ed:fd:1e:57:62:c9:5a:81:a5: 76:82:2a:1f:a0:88:cd:d1:27:e0:17:25:43:e2:f3:ee: 70:87:44:21:4b:a0:b4:4f:a4:92:03:dd:ca:c9:53:20: 31:70:ed:37:da:60:73:2b:2e:bf:d9:14:8e:31:bb:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:94:df:c8:bb:6b:13:11:d5:ea:3c:b0:ca:23:af:ff: 19:0f:f4:3f:18:64:f0:9d:5f:e9:e1:af:2a:4f:2f:4e: 17:4b:2d:8d:97:fe:08:04:32:71:9d:a6:c9:53:8f:f4: ff:6c:e8:08:eb:84:88:64:22:69:4d:3c:87:a7:26:f8: f5:ff:f8:ad:c0:bb:8f:e4:1d:6c:55:2a:d1:98:b4:0f: e4:a0:98:15:34:42:4a:a1:5f:52:8b:e7:49:db:b0:24: ed:46:45:91:aa:23:ba:e0:19:de:bc:e1:a8:91:4a:6a: 77:53:c0:e0:76:e3:53:f1:6d:06:d4:8f:66:74:79:96: 0c:4a:3e:36:86:9e:5c:16:87:80:a4:2d:32:36:43:5a: 30:9c:44:ef:4f:d8:24:d9:8a:67:f0:ab:39:86:86:9b: 1e:98:47:58:a2:a4:a0:af:ac:3e:07:ab:45:46:b1:9f: 64:c4:bd:3e:ad:b2:5f:54:6e:83:0d:56:f9:c8:f8:a5: 75:7e:6d:d3:a8:8a:85:e7:a2:e5:06:64:95:f9:79:15: 52:be:e5:56:dc:7d:c9:74:53:df:e5:58:ad:ed:6b:02: 25:5d:f9:3d:7e:a8:2a:5c:3a:96:38:81:36:7f:11:c5: eb:16:9d:dd:f6:af:e4:4c:95:06:b6:94:2b:a9:98:92 Fingerprint (SHA-256): A2:32:E5:91:3A:24:DC:AB:5D:25:45:B0:34:9B:92:A2:0F:D0:CF:24:38:C1:02:9A:13:B2:57:02:B0:B7:57:63 Fingerprint (SHA1): 58:D0:17:22:2B:7E:6E:AD:BD:2E:02:84:63:71:23:49:6C:97:B6:80 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #10078: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #10079: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #10080: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064825 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10081: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #10082: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #10083: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10084: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 108064826 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10085: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10086: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #10087: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108064597.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #10088: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108064571.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10089: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10090: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #10091: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108064597.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #10092: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 108064827 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10093: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10094: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #10095: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108064597.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #10096: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108064572.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10097: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10098: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #10099: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10100: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 108064828 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10101: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10102: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #10103: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108064597.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #10104: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108064573.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10105: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10106: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #10107: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108064597.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #10108: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108064574.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10109: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10110: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108124539Z nextupdate=20170108124539Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 12:45:39 2016 Next Update: Sun Jan 08 12:45:39 2017 CRL Extensions: chains.sh: #10111: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108124540Z nextupdate=20170108124540Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 12:45:40 2016 Next Update: Sun Jan 08 12:45:40 2017 CRL Extensions: chains.sh: #10112: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108124540Z nextupdate=20170108124540Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 12:45:40 2016 Next Update: Sun Jan 08 12:45:40 2017 CRL Extensions: chains.sh: #10113: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108124541Z nextupdate=20170108124541Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 12:45:41 2016 Next Update: Sun Jan 08 12:45:41 2017 CRL Extensions: chains.sh: #10114: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108124542Z addcert 20 20160108124542Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 12:45:42 2016 Next Update: Sun Jan 08 12:45:40 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 12:45:42 2016 CRL Extensions: chains.sh: #10115: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108124543Z addcert 40 20160108124543Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 12:45:43 2016 Next Update: Sun Jan 08 12:45:40 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 12:45:42 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 12:45:43 2016 CRL Extensions: chains.sh: #10116: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #10117: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10118: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #10119: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064825 (0x670f039) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:44:25 2016 Not After : Fri Jan 08 12:44:25 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:9d:7e:df:dc:fb:8a:f3:70:a4:81:82:18:93:70:d3: ab:a0:61:89:e3:c3:74:73:6e:22:54:c9:55:cc:6f:a0: e6:81:c9:46:1b:15:20:6a:8b:3a:bb:21:70:cd:3e:cf: e1:0d:78:56:3c:05:6e:2e:94:f9:fc:24:61:63:4c:eb: 6e:4b:be:c9:f1:db:be:7c:18:f5:65:a7:b9:09:16:76: 4d:c4:2a:ab:75:22:09:a3:c2:1a:6a:6b:5e:a7:95:0b: 47:60:ea:b4:c6:14:21:ed:f5:fe:d0:92:de:09:0a:4a: 5d:93:45:ac:2c:4f:5a:f0:a7:8f:06:ae:c2:92:61:15: 09:c7:95:25:1f:41:13:30:e9:fc:11:ff:b2:28:b4:fc: 3e:11:4d:b2:7b:8d:9d:02:38:13:14:5d:af:4d:24:af: fa:32:5a:06:0e:f1:ad:2e:1b:5d:aa:29:b2:59:21:a3: f6:f9:4b:c4:56:b1:b9:0a:8f:67:7a:aa:22:18:50:3e: 20:a2:19:40:a7:d7:8b:79:af:10:34:73:3d:9e:e2:89: cb:95:00:b6:7e:05:26:75:d4:34:d8:c6:66:a7:46:24: 5a:e5:17:fa:ea:2c:24:45:c6:a0:04:03:33:b2:f8:05: d1:5d:2d:a6:34:bf:91:a6:df:fe:45:6c:22:b7:2e:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d6:6f:eb:45:d1:f5:b3:a7:7b:02:ff:6f:f9:f8:26:51: 93:81:5c:34:5e:a1:d7:e1:a5:7d:69:0e:2e:18:70:c3: a5:f1:1f:ed:3c:2b:5b:ac:09:87:fc:67:c8:32:69:e5: b4:d9:3e:9a:70:0c:0e:af:7e:78:89:d3:ac:71:b8:e2: 62:55:c7:52:4d:d5:fa:54:02:98:24:75:58:a3:4c:db: cd:d0:e4:e6:8d:fd:4e:de:7e:23:59:85:24:91:79:e9: 6c:b2:c8:db:e4:86:0d:de:0d:4f:23:92:ff:af:43:44: 67:f5:da:41:12:98:6d:a3:32:2e:91:a6:8c:5a:da:bb: 14:42:5d:8c:28:da:d4:5b:af:9c:f7:40:5e:c4:38:76: f5:e1:47:d6:c3:69:80:10:66:c4:ff:6b:08:e6:a6:57: 1b:d9:a5:59:08:9a:4b:8a:de:99:ae:75:14:f9:85:be: ad:bf:13:0a:f7:f9:4a:d0:b1:77:5b:b4:b0:a7:79:09: 8e:0e:a0:8a:5b:93:ba:5d:00:2a:3d:8b:7a:93:18:20: 85:7b:fa:14:46:7b:34:cf:aa:99:ea:98:c1:f5:c9:6c: a0:79:b4:61:cb:b6:ea:56:46:c0:20:8d:09:e8:69:01: f7:1a:ec:87:cf:9e:23:f2:68:cf:59:7d:aa:ef:4d:8a Fingerprint (SHA-256): D2:38:FA:18:1D:2F:78:42:1D:5E:32:0F:02:D0:6E:73:36:10:6D:A4:8E:A5:F6:8E:B9:5C:53:A8:58:BB:5B:73 Fingerprint (SHA1): 7E:92:30:EC:30:3B:65:66:B9:8B:6C:E6:68:30:7F:2D:82:81:FB:18 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #10120: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #10121: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064825 (0x670f039) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 12:44:25 2016 Not After : Fri Jan 08 12:44:25 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:9d:7e:df:dc:fb:8a:f3:70:a4:81:82:18:93:70:d3: ab:a0:61:89:e3:c3:74:73:6e:22:54:c9:55:cc:6f:a0: e6:81:c9:46:1b:15:20:6a:8b:3a:bb:21:70:cd:3e:cf: e1:0d:78:56:3c:05:6e:2e:94:f9:fc:24:61:63:4c:eb: 6e:4b:be:c9:f1:db:be:7c:18:f5:65:a7:b9:09:16:76: 4d:c4:2a:ab:75:22:09:a3:c2:1a:6a:6b:5e:a7:95:0b: 47:60:ea:b4:c6:14:21:ed:f5:fe:d0:92:de:09:0a:4a: 5d:93:45:ac:2c:4f:5a:f0:a7:8f:06:ae:c2:92:61:15: 09:c7:95:25:1f:41:13:30:e9:fc:11:ff:b2:28:b4:fc: 3e:11:4d:b2:7b:8d:9d:02:38:13:14:5d:af:4d:24:af: fa:32:5a:06:0e:f1:ad:2e:1b:5d:aa:29:b2:59:21:a3: f6:f9:4b:c4:56:b1:b9:0a:8f:67:7a:aa:22:18:50:3e: 20:a2:19:40:a7:d7:8b:79:af:10:34:73:3d:9e:e2:89: cb:95:00:b6:7e:05:26:75:d4:34:d8:c6:66:a7:46:24: 5a:e5:17:fa:ea:2c:24:45:c6:a0:04:03:33:b2:f8:05: d1:5d:2d:a6:34:bf:91:a6:df:fe:45:6c:22:b7:2e:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d6:6f:eb:45:d1:f5:b3:a7:7b:02:ff:6f:f9:f8:26:51: 93:81:5c:34:5e:a1:d7:e1:a5:7d:69:0e:2e:18:70:c3: a5:f1:1f:ed:3c:2b:5b:ac:09:87:fc:67:c8:32:69:e5: b4:d9:3e:9a:70:0c:0e:af:7e:78:89:d3:ac:71:b8:e2: 62:55:c7:52:4d:d5:fa:54:02:98:24:75:58:a3:4c:db: cd:d0:e4:e6:8d:fd:4e:de:7e:23:59:85:24:91:79:e9: 6c:b2:c8:db:e4:86:0d:de:0d:4f:23:92:ff:af:43:44: 67:f5:da:41:12:98:6d:a3:32:2e:91:a6:8c:5a:da:bb: 14:42:5d:8c:28:da:d4:5b:af:9c:f7:40:5e:c4:38:76: f5:e1:47:d6:c3:69:80:10:66:c4:ff:6b:08:e6:a6:57: 1b:d9:a5:59:08:9a:4b:8a:de:99:ae:75:14:f9:85:be: ad:bf:13:0a:f7:f9:4a:d0:b1:77:5b:b4:b0:a7:79:09: 8e:0e:a0:8a:5b:93:ba:5d:00:2a:3d:8b:7a:93:18:20: 85:7b:fa:14:46:7b:34:cf:aa:99:ea:98:c1:f5:c9:6c: a0:79:b4:61:cb:b6:ea:56:46:c0:20:8d:09:e8:69:01: f7:1a:ec:87:cf:9e:23:f2:68:cf:59:7d:aa:ef:4d:8a Fingerprint (SHA-256): D2:38:FA:18:1D:2F:78:42:1D:5E:32:0F:02:D0:6E:73:36:10:6D:A4:8E:A5:F6:8E:B9:5C:53:A8:58:BB:5B:73 Fingerprint (SHA1): 7E:92:30:EC:30:3B:65:66:B9:8B:6C:E6:68:30:7F:2D:82:81:FB:18 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #10122: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #10123: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #10124: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064829 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10125: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #10126: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #10127: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10128: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108064830 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10129: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10130: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #10131: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10132: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108064831 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10133: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10134: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #10135: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10136: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 108064832 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10137: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10138: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #10139: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108064833 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10140: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #10141: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #10142: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10143: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 108064834 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10144: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10145: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #10146: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10147: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 108064835 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10148: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10149: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #10150: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #10151: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #10152: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064829 (0x670f03d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:45:52 2016 Not After : Fri Jan 08 12:45:52 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:db:d3:16:7e:a3:11:50:8d:a7:9d:8a:3f:ba:4c:66: 30:30:4f:11:33:1e:b6:7f:0a:6a:b3:86:41:e8:8e:e4: 80:19:1d:a0:64:f9:99:7d:25:2a:a6:15:8e:ec:bb:45: 32:e0:fb:29:be:5f:39:98:65:d2:11:74:d1:c1:05:31: 05:39:e2:03:3d:0f:e6:46:c4:52:b0:6c:3b:26:94:95: 5e:be:02:bb:9f:31:f2:a4:18:ef:55:5f:bf:f3:5f:c2: 55:21:b3:22:4d:2f:da:02:9a:d5:09:5d:9c:fb:3a:a1: 14:ff:28:f3:09:7a:5a:02:1c:87:0e:35:a5:ec:08:50: 8c:df:bc:84:94:71:8a:17:30:c2:61:ba:23:ef:9b:c7: 79:eb:21:c4:e3:39:b5:e9:a2:c1:29:54:92:43:ee:cd: 62:59:8c:eb:64:ba:ba:8e:81:bd:f3:5c:2a:e1:56:c8: 91:05:85:37:9a:76:c7:bd:fa:ea:c5:b8:01:56:1e:d9: 5b:35:69:97:11:34:de:b9:c9:02:9e:87:10:e0:20:f2: 26:53:7c:90:27:f5:96:62:76:87:99:e4:76:1e:f6:9d: 89:0c:db:c7:82:70:b5:61:2f:5a:0e:4d:e7:be:ad:fa: 77:73:8d:37:6d:90:1a:4f:82:46:c4:c6:27:ab:cc:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:ae:30:15:c9:17:66:c4:43:59:d4:7c:50:e9:e6:c1: 5d:f4:2e:40:cb:dc:c0:55:f7:cb:18:6e:dd:6c:5f:28: 90:b2:e2:46:95:b7:4a:47:d5:c3:97:2e:5a:0b:8f:2c: 0a:06:c0:56:7c:0a:dc:a6:dc:9e:0c:df:e2:3a:a9:ba: 74:b5:cd:72:51:d8:43:3d:41:f6:48:2b:1d:dd:9d:46: e6:43:11:80:e0:7c:33:f7:00:c9:b6:66:d9:ea:b7:f5: 21:d9:a4:3f:7c:f3:7d:ef:69:bf:2d:2c:61:09:05:9f: 57:c0:2a:d6:31:5b:6d:2b:24:8f:88:4b:28:ec:c3:ba: e0:05:3d:38:fa:51:94:ac:47:50:7c:4d:da:4e:19:65: 26:62:f3:00:c3:9c:8a:c4:f4:e3:34:5f:a7:cc:6e:69: 64:e9:5f:18:52:55:0c:4d:11:0c:57:5d:89:f5:28:a3: 83:e4:bd:44:c9:f9:f9:7e:5e:78:52:ab:f3:e5:c9:07: 18:81:25:86:d9:c9:f7:94:b0:fa:d9:93:5e:12:2a:af: 3e:d7:f7:b8:0b:72:5d:90:ff:81:69:9d:3f:96:6f:55: 9d:0f:bb:7f:1d:ee:9b:04:4f:c0:d6:1c:d5:8e:b2:b2: 8d:15:b3:a3:c6:5e:76:f9:f4:3a:24:29:74:6b:0d:72 Fingerprint (SHA-256): DD:05:70:E0:6A:34:85:42:1C:AF:D6:7B:68:7A:BD:E9:18:90:DF:68:19:17:4A:4B:CC:A3:96:39:3A:F0:B1:8A Fingerprint (SHA1): 95:C1:B6:15:9D:16:80:8F:5C:32:B8:03:24:E3:F6:9E:27:07:00:C5 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #10153: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064831 (0x670f03f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 12:46:09 2016 Not After : Fri Jan 08 12:46:09 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:5e:a0:57:57:86:48:50:07:8b:99:39:6f:0b:68:99: cb:21:8b:30:9f:5f:a8:06:89:60:83:b1:56:1d:ad:f3: 81:6c:62:ff:35:f6:96:f9:e6:a0:21:01:a7:77:48:5b: 4e:c9:dd:c6:96:99:5e:7a:25:f4:2a:a4:0d:13:b1:ee: 24:0b:33:f2:86:c9:28:b4:d6:6a:be:ad:c0:7a:19:09: c8:80:50:d3:39:a4:95:3e:29:bf:e3:1d:48:d0:6b:7e: c9:de:63:55:6c:90:cc:a2:7e:72:35:c1:57:7e:4b:31: 76:92:a9:9e:48:a5:b6:e2:08:ff:79:85:67:0c:16:e1: 24:5f:f0:1b:54:bb:a5:74:83:b9:39:2c:15:2a:c4:c2: 00:c1:db:1a:73:96:6c:a5:60:fc:35:3d:d4:81:09:72: 2a:f6:b1:78:7e:54:95:ae:d3:73:4f:e5:77:5e:0f:f6: 01:64:ab:60:76:d1:b0:71:04:3f:86:52:69:4b:98:0c: cd:dd:fc:88:f5:eb:f4:9b:c6:b8:da:71:b9:fc:f3:89: 29:c0:58:3f:ba:18:0f:9e:a2:f3:f1:d9:1f:61:28:61: e7:fb:11:22:13:8e:14:fe:f7:fa:46:28:7a:97:10:d7: 18:dd:d4:38:42:1b:90:a6:cb:a7:fb:2c:32:95:49:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:6b:ea:b9:ab:a5:bd:ee:37:b3:82:c9:b0:af:cb:a6: 8d:54:08:3d:8a:4f:cb:5d:be:53:c7:c2:a5:14:32:62: 17:85:0c:b4:5a:b2:6a:b3:d2:1f:e6:8a:09:f5:b3:46: f1:63:fc:9a:71:74:fa:2b:66:54:41:6a:1a:0d:89:03: 88:cd:c8:02:2f:af:d5:6a:d3:a1:74:fd:d6:08:90:90: b8:1a:b7:94:5b:e3:80:22:47:c1:62:dd:ff:67:f9:3d: e4:62:83:a1:9b:91:a1:48:4d:32:6a:d5:9d:9f:0c:a3: cf:f8:1a:08:da:ed:f6:18:22:b5:56:0d:c1:61:96:e6: a7:48:23:3b:31:80:04:23:eb:4e:f6:56:a0:e1:fd:26: 10:93:cf:fd:b7:93:98:8c:b5:3e:34:ac:84:47:1e:94: aa:82:2a:a2:6a:f0:57:fe:1d:94:a1:3e:54:58:6f:5e: c3:58:0d:d6:80:5c:ce:44:ee:88:cb:41:d8:da:d6:2b: 26:56:34:c3:3d:f8:4c:da:60:12:cc:4c:45:cb:c7:f2: 6d:aa:6c:f1:ed:23:b9:98:8b:ec:bf:e9:c5:99:0b:1e: be:d9:19:82:74:78:fa:04:2c:b4:97:98:9e:fe:bf:df: 4a:4c:a7:bd:51:fd:58:71:2e:6d:24:c6:0a:49:19:7b Fingerprint (SHA-256): EF:40:03:F1:02:51:35:18:EF:65:B1:87:03:FD:3B:86:2F:27:B1:B0:41:D8:5D:B1:DA:91:41:45:CD:5D:18:02 Fingerprint (SHA1): 27:0B:4D:F4:EB:7F:15:C9:FE:3C:05:D7:C5:D1:51:DE:75:3A:68:5E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #10154: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064829 (0x670f03d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:45:52 2016 Not After : Fri Jan 08 12:45:52 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:db:d3:16:7e:a3:11:50:8d:a7:9d:8a:3f:ba:4c:66: 30:30:4f:11:33:1e:b6:7f:0a:6a:b3:86:41:e8:8e:e4: 80:19:1d:a0:64:f9:99:7d:25:2a:a6:15:8e:ec:bb:45: 32:e0:fb:29:be:5f:39:98:65:d2:11:74:d1:c1:05:31: 05:39:e2:03:3d:0f:e6:46:c4:52:b0:6c:3b:26:94:95: 5e:be:02:bb:9f:31:f2:a4:18:ef:55:5f:bf:f3:5f:c2: 55:21:b3:22:4d:2f:da:02:9a:d5:09:5d:9c:fb:3a:a1: 14:ff:28:f3:09:7a:5a:02:1c:87:0e:35:a5:ec:08:50: 8c:df:bc:84:94:71:8a:17:30:c2:61:ba:23:ef:9b:c7: 79:eb:21:c4:e3:39:b5:e9:a2:c1:29:54:92:43:ee:cd: 62:59:8c:eb:64:ba:ba:8e:81:bd:f3:5c:2a:e1:56:c8: 91:05:85:37:9a:76:c7:bd:fa:ea:c5:b8:01:56:1e:d9: 5b:35:69:97:11:34:de:b9:c9:02:9e:87:10:e0:20:f2: 26:53:7c:90:27:f5:96:62:76:87:99:e4:76:1e:f6:9d: 89:0c:db:c7:82:70:b5:61:2f:5a:0e:4d:e7:be:ad:fa: 77:73:8d:37:6d:90:1a:4f:82:46:c4:c6:27:ab:cc:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:ae:30:15:c9:17:66:c4:43:59:d4:7c:50:e9:e6:c1: 5d:f4:2e:40:cb:dc:c0:55:f7:cb:18:6e:dd:6c:5f:28: 90:b2:e2:46:95:b7:4a:47:d5:c3:97:2e:5a:0b:8f:2c: 0a:06:c0:56:7c:0a:dc:a6:dc:9e:0c:df:e2:3a:a9:ba: 74:b5:cd:72:51:d8:43:3d:41:f6:48:2b:1d:dd:9d:46: e6:43:11:80:e0:7c:33:f7:00:c9:b6:66:d9:ea:b7:f5: 21:d9:a4:3f:7c:f3:7d:ef:69:bf:2d:2c:61:09:05:9f: 57:c0:2a:d6:31:5b:6d:2b:24:8f:88:4b:28:ec:c3:ba: e0:05:3d:38:fa:51:94:ac:47:50:7c:4d:da:4e:19:65: 26:62:f3:00:c3:9c:8a:c4:f4:e3:34:5f:a7:cc:6e:69: 64:e9:5f:18:52:55:0c:4d:11:0c:57:5d:89:f5:28:a3: 83:e4:bd:44:c9:f9:f9:7e:5e:78:52:ab:f3:e5:c9:07: 18:81:25:86:d9:c9:f7:94:b0:fa:d9:93:5e:12:2a:af: 3e:d7:f7:b8:0b:72:5d:90:ff:81:69:9d:3f:96:6f:55: 9d:0f:bb:7f:1d:ee:9b:04:4f:c0:d6:1c:d5:8e:b2:b2: 8d:15:b3:a3:c6:5e:76:f9:f4:3a:24:29:74:6b:0d:72 Fingerprint (SHA-256): DD:05:70:E0:6A:34:85:42:1C:AF:D6:7B:68:7A:BD:E9:18:90:DF:68:19:17:4A:4B:CC:A3:96:39:3A:F0:B1:8A Fingerprint (SHA1): 95:C1:B6:15:9D:16:80:8F:5C:32:B8:03:24:E3:F6:9E:27:07:00:C5 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #10155: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #10156: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064829 (0x670f03d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:45:52 2016 Not After : Fri Jan 08 12:45:52 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:db:d3:16:7e:a3:11:50:8d:a7:9d:8a:3f:ba:4c:66: 30:30:4f:11:33:1e:b6:7f:0a:6a:b3:86:41:e8:8e:e4: 80:19:1d:a0:64:f9:99:7d:25:2a:a6:15:8e:ec:bb:45: 32:e0:fb:29:be:5f:39:98:65:d2:11:74:d1:c1:05:31: 05:39:e2:03:3d:0f:e6:46:c4:52:b0:6c:3b:26:94:95: 5e:be:02:bb:9f:31:f2:a4:18:ef:55:5f:bf:f3:5f:c2: 55:21:b3:22:4d:2f:da:02:9a:d5:09:5d:9c:fb:3a:a1: 14:ff:28:f3:09:7a:5a:02:1c:87:0e:35:a5:ec:08:50: 8c:df:bc:84:94:71:8a:17:30:c2:61:ba:23:ef:9b:c7: 79:eb:21:c4:e3:39:b5:e9:a2:c1:29:54:92:43:ee:cd: 62:59:8c:eb:64:ba:ba:8e:81:bd:f3:5c:2a:e1:56:c8: 91:05:85:37:9a:76:c7:bd:fa:ea:c5:b8:01:56:1e:d9: 5b:35:69:97:11:34:de:b9:c9:02:9e:87:10:e0:20:f2: 26:53:7c:90:27:f5:96:62:76:87:99:e4:76:1e:f6:9d: 89:0c:db:c7:82:70:b5:61:2f:5a:0e:4d:e7:be:ad:fa: 77:73:8d:37:6d:90:1a:4f:82:46:c4:c6:27:ab:cc:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:ae:30:15:c9:17:66:c4:43:59:d4:7c:50:e9:e6:c1: 5d:f4:2e:40:cb:dc:c0:55:f7:cb:18:6e:dd:6c:5f:28: 90:b2:e2:46:95:b7:4a:47:d5:c3:97:2e:5a:0b:8f:2c: 0a:06:c0:56:7c:0a:dc:a6:dc:9e:0c:df:e2:3a:a9:ba: 74:b5:cd:72:51:d8:43:3d:41:f6:48:2b:1d:dd:9d:46: e6:43:11:80:e0:7c:33:f7:00:c9:b6:66:d9:ea:b7:f5: 21:d9:a4:3f:7c:f3:7d:ef:69:bf:2d:2c:61:09:05:9f: 57:c0:2a:d6:31:5b:6d:2b:24:8f:88:4b:28:ec:c3:ba: e0:05:3d:38:fa:51:94:ac:47:50:7c:4d:da:4e:19:65: 26:62:f3:00:c3:9c:8a:c4:f4:e3:34:5f:a7:cc:6e:69: 64:e9:5f:18:52:55:0c:4d:11:0c:57:5d:89:f5:28:a3: 83:e4:bd:44:c9:f9:f9:7e:5e:78:52:ab:f3:e5:c9:07: 18:81:25:86:d9:c9:f7:94:b0:fa:d9:93:5e:12:2a:af: 3e:d7:f7:b8:0b:72:5d:90:ff:81:69:9d:3f:96:6f:55: 9d:0f:bb:7f:1d:ee:9b:04:4f:c0:d6:1c:d5:8e:b2:b2: 8d:15:b3:a3:c6:5e:76:f9:f4:3a:24:29:74:6b:0d:72 Fingerprint (SHA-256): DD:05:70:E0:6A:34:85:42:1C:AF:D6:7B:68:7A:BD:E9:18:90:DF:68:19:17:4A:4B:CC:A3:96:39:3A:F0:B1:8A Fingerprint (SHA1): 95:C1:B6:15:9D:16:80:8F:5C:32:B8:03:24:E3:F6:9E:27:07:00:C5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #10157: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064831 (0x670f03f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 12:46:09 2016 Not After : Fri Jan 08 12:46:09 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:5e:a0:57:57:86:48:50:07:8b:99:39:6f:0b:68:99: cb:21:8b:30:9f:5f:a8:06:89:60:83:b1:56:1d:ad:f3: 81:6c:62:ff:35:f6:96:f9:e6:a0:21:01:a7:77:48:5b: 4e:c9:dd:c6:96:99:5e:7a:25:f4:2a:a4:0d:13:b1:ee: 24:0b:33:f2:86:c9:28:b4:d6:6a:be:ad:c0:7a:19:09: c8:80:50:d3:39:a4:95:3e:29:bf:e3:1d:48:d0:6b:7e: c9:de:63:55:6c:90:cc:a2:7e:72:35:c1:57:7e:4b:31: 76:92:a9:9e:48:a5:b6:e2:08:ff:79:85:67:0c:16:e1: 24:5f:f0:1b:54:bb:a5:74:83:b9:39:2c:15:2a:c4:c2: 00:c1:db:1a:73:96:6c:a5:60:fc:35:3d:d4:81:09:72: 2a:f6:b1:78:7e:54:95:ae:d3:73:4f:e5:77:5e:0f:f6: 01:64:ab:60:76:d1:b0:71:04:3f:86:52:69:4b:98:0c: cd:dd:fc:88:f5:eb:f4:9b:c6:b8:da:71:b9:fc:f3:89: 29:c0:58:3f:ba:18:0f:9e:a2:f3:f1:d9:1f:61:28:61: e7:fb:11:22:13:8e:14:fe:f7:fa:46:28:7a:97:10:d7: 18:dd:d4:38:42:1b:90:a6:cb:a7:fb:2c:32:95:49:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:6b:ea:b9:ab:a5:bd:ee:37:b3:82:c9:b0:af:cb:a6: 8d:54:08:3d:8a:4f:cb:5d:be:53:c7:c2:a5:14:32:62: 17:85:0c:b4:5a:b2:6a:b3:d2:1f:e6:8a:09:f5:b3:46: f1:63:fc:9a:71:74:fa:2b:66:54:41:6a:1a:0d:89:03: 88:cd:c8:02:2f:af:d5:6a:d3:a1:74:fd:d6:08:90:90: b8:1a:b7:94:5b:e3:80:22:47:c1:62:dd:ff:67:f9:3d: e4:62:83:a1:9b:91:a1:48:4d:32:6a:d5:9d:9f:0c:a3: cf:f8:1a:08:da:ed:f6:18:22:b5:56:0d:c1:61:96:e6: a7:48:23:3b:31:80:04:23:eb:4e:f6:56:a0:e1:fd:26: 10:93:cf:fd:b7:93:98:8c:b5:3e:34:ac:84:47:1e:94: aa:82:2a:a2:6a:f0:57:fe:1d:94:a1:3e:54:58:6f:5e: c3:58:0d:d6:80:5c:ce:44:ee:88:cb:41:d8:da:d6:2b: 26:56:34:c3:3d:f8:4c:da:60:12:cc:4c:45:cb:c7:f2: 6d:aa:6c:f1:ed:23:b9:98:8b:ec:bf:e9:c5:99:0b:1e: be:d9:19:82:74:78:fa:04:2c:b4:97:98:9e:fe:bf:df: 4a:4c:a7:bd:51:fd:58:71:2e:6d:24:c6:0a:49:19:7b Fingerprint (SHA-256): EF:40:03:F1:02:51:35:18:EF:65:B1:87:03:FD:3B:86:2F:27:B1:B0:41:D8:5D:B1:DA:91:41:45:CD:5D:18:02 Fingerprint (SHA1): 27:0B:4D:F4:EB:7F:15:C9:FE:3C:05:D7:C5:D1:51:DE:75:3A:68:5E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #10158: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #10159: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #10160: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #10161: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064829 (0x670f03d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:45:52 2016 Not After : Fri Jan 08 12:45:52 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:db:d3:16:7e:a3:11:50:8d:a7:9d:8a:3f:ba:4c:66: 30:30:4f:11:33:1e:b6:7f:0a:6a:b3:86:41:e8:8e:e4: 80:19:1d:a0:64:f9:99:7d:25:2a:a6:15:8e:ec:bb:45: 32:e0:fb:29:be:5f:39:98:65:d2:11:74:d1:c1:05:31: 05:39:e2:03:3d:0f:e6:46:c4:52:b0:6c:3b:26:94:95: 5e:be:02:bb:9f:31:f2:a4:18:ef:55:5f:bf:f3:5f:c2: 55:21:b3:22:4d:2f:da:02:9a:d5:09:5d:9c:fb:3a:a1: 14:ff:28:f3:09:7a:5a:02:1c:87:0e:35:a5:ec:08:50: 8c:df:bc:84:94:71:8a:17:30:c2:61:ba:23:ef:9b:c7: 79:eb:21:c4:e3:39:b5:e9:a2:c1:29:54:92:43:ee:cd: 62:59:8c:eb:64:ba:ba:8e:81:bd:f3:5c:2a:e1:56:c8: 91:05:85:37:9a:76:c7:bd:fa:ea:c5:b8:01:56:1e:d9: 5b:35:69:97:11:34:de:b9:c9:02:9e:87:10:e0:20:f2: 26:53:7c:90:27:f5:96:62:76:87:99:e4:76:1e:f6:9d: 89:0c:db:c7:82:70:b5:61:2f:5a:0e:4d:e7:be:ad:fa: 77:73:8d:37:6d:90:1a:4f:82:46:c4:c6:27:ab:cc:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:ae:30:15:c9:17:66:c4:43:59:d4:7c:50:e9:e6:c1: 5d:f4:2e:40:cb:dc:c0:55:f7:cb:18:6e:dd:6c:5f:28: 90:b2:e2:46:95:b7:4a:47:d5:c3:97:2e:5a:0b:8f:2c: 0a:06:c0:56:7c:0a:dc:a6:dc:9e:0c:df:e2:3a:a9:ba: 74:b5:cd:72:51:d8:43:3d:41:f6:48:2b:1d:dd:9d:46: e6:43:11:80:e0:7c:33:f7:00:c9:b6:66:d9:ea:b7:f5: 21:d9:a4:3f:7c:f3:7d:ef:69:bf:2d:2c:61:09:05:9f: 57:c0:2a:d6:31:5b:6d:2b:24:8f:88:4b:28:ec:c3:ba: e0:05:3d:38:fa:51:94:ac:47:50:7c:4d:da:4e:19:65: 26:62:f3:00:c3:9c:8a:c4:f4:e3:34:5f:a7:cc:6e:69: 64:e9:5f:18:52:55:0c:4d:11:0c:57:5d:89:f5:28:a3: 83:e4:bd:44:c9:f9:f9:7e:5e:78:52:ab:f3:e5:c9:07: 18:81:25:86:d9:c9:f7:94:b0:fa:d9:93:5e:12:2a:af: 3e:d7:f7:b8:0b:72:5d:90:ff:81:69:9d:3f:96:6f:55: 9d:0f:bb:7f:1d:ee:9b:04:4f:c0:d6:1c:d5:8e:b2:b2: 8d:15:b3:a3:c6:5e:76:f9:f4:3a:24:29:74:6b:0d:72 Fingerprint (SHA-256): DD:05:70:E0:6A:34:85:42:1C:AF:D6:7B:68:7A:BD:E9:18:90:DF:68:19:17:4A:4B:CC:A3:96:39:3A:F0:B1:8A Fingerprint (SHA1): 95:C1:B6:15:9D:16:80:8F:5C:32:B8:03:24:E3:F6:9E:27:07:00:C5 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #10162: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064833 (0x670f041) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 12:46:33 2016 Not After : Fri Jan 08 12:46:33 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:bf:c4:60:3e:c9:1d:47:47:88:02:cc:23:d5:fa:8e: 4f:24:2b:21:7a:b9:8d:26:c8:34:5b:ea:be:41:0b:f1: e0:bf:23:e3:5a:ea:40:46:11:c5:e7:54:94:7d:95:a0: 77:8f:88:ab:c8:76:6d:e0:2a:29:ac:8a:37:12:6e:fd: ae:6e:07:85:c1:22:c3:6d:4a:d3:4e:9d:dd:62:44:b7: e4:16:a2:b6:78:73:dd:f4:0c:df:89:bf:37:f9:5f:4b: ac:1d:68:62:7b:70:eb:db:04:4a:3e:b2:16:3e:ea:06: 98:9f:06:87:84:a7:fc:0c:8b:a0:a6:d6:cc:3d:60:db: 81:d2:03:9a:7a:5c:57:da:6d:e3:21:23:00:43:6b:20: d6:2a:6b:ac:4d:16:fb:8e:61:64:23:b2:1a:29:f2:8c: 94:d2:19:e7:36:c8:6f:c2:9f:44:1a:95:f8:87:ce:61: 75:96:af:95:7f:eb:53:af:ac:30:f1:c1:3d:a6:24:0b: 04:1c:09:ef:b2:63:13:19:93:37:fa:be:f7:fb:b7:b5: 10:7e:d5:4c:e8:1c:5c:a7:e6:cf:9e:c4:6d:fc:79:29: 36:83:62:07:65:6b:df:2d:b7:74:a2:e1:34:88:46:b6: 4b:f1:e2:de:ef:48:cf:5c:85:b8:da:eb:ee:b1:42:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:9c:23:73:74:53:c2:eb:82:fc:66:e0:ab:f9:cc:28: d9:a5:cd:a1:ae:28:e2:4b:10:fe:69:1a:34:a5:39:76: 53:ab:35:cc:2f:27:0f:a3:65:97:46:a6:3a:e8:92:74: e2:cf:b0:ff:41:96:e9:3e:04:96:44:cf:08:2d:e0:20: 18:26:b3:10:ca:09:c9:e5:e0:1e:97:14:3c:2e:60:b9: e3:a2:5c:92:3d:19:6f:d0:76:48:c1:87:70:1a:b5:0c: 43:ae:46:27:27:85:4f:7e:57:fe:58:e0:09:06:52:12: 60:29:e4:12:a2:08:a8:7b:0b:0a:9d:ca:3e:15:e8:de: 1a:e7:81:e0:c5:80:18:6b:52:ca:00:2c:f4:6d:54:53: d8:13:8c:5a:f3:fb:f2:00:2d:e1:cb:b5:34:29:fb:42: b2:93:55:b5:f5:37:85:a2:60:9f:60:f5:0e:7c:b6:f9: 98:50:50:01:f6:ac:3a:81:bd:67:28:82:f9:8d:dd:95: 9e:a3:d8:2e:19:d6:a6:0f:fa:48:55:d5:9f:ca:a7:f8: 4f:5f:be:7c:e8:e0:64:61:f7:af:ca:f7:08:d1:f9:8a: 56:53:cb:cd:b9:e0:9a:9d:33:fe:99:1d:d0:9a:8c:fd: 80:5b:cf:b0:69:61:05:aa:fb:27:30:83:e0:41:5d:8e Fingerprint (SHA-256): AA:10:3B:1A:BB:F6:A7:9B:E7:AA:2F:F9:1D:F5:87:9C:5E:31:1A:94:4E:2F:17:DE:D7:48:E8:89:31:3F:1A:6C Fingerprint (SHA1): 0F:A8:7A:5F:A8:D6:54:5A:CB:24:DA:7D:D4:37:92:B4:54:CA:F1:FA Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #10163: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064829 (0x670f03d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 12:45:52 2016 Not After : Fri Jan 08 12:45:52 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:db:d3:16:7e:a3:11:50:8d:a7:9d:8a:3f:ba:4c:66: 30:30:4f:11:33:1e:b6:7f:0a:6a:b3:86:41:e8:8e:e4: 80:19:1d:a0:64:f9:99:7d:25:2a:a6:15:8e:ec:bb:45: 32:e0:fb:29:be:5f:39:98:65:d2:11:74:d1:c1:05:31: 05:39:e2:03:3d:0f:e6:46:c4:52:b0:6c:3b:26:94:95: 5e:be:02:bb:9f:31:f2:a4:18:ef:55:5f:bf:f3:5f:c2: 55:21:b3:22:4d:2f:da:02:9a:d5:09:5d:9c:fb:3a:a1: 14:ff:28:f3:09:7a:5a:02:1c:87:0e:35:a5:ec:08:50: 8c:df:bc:84:94:71:8a:17:30:c2:61:ba:23:ef:9b:c7: 79:eb:21:c4:e3:39:b5:e9:a2:c1:29:54:92:43:ee:cd: 62:59:8c:eb:64:ba:ba:8e:81:bd:f3:5c:2a:e1:56:c8: 91:05:85:37:9a:76:c7:bd:fa:ea:c5:b8:01:56:1e:d9: 5b:35:69:97:11:34:de:b9:c9:02:9e:87:10:e0:20:f2: 26:53:7c:90:27:f5:96:62:76:87:99:e4:76:1e:f6:9d: 89:0c:db:c7:82:70:b5:61:2f:5a:0e:4d:e7:be:ad:fa: 77:73:8d:37:6d:90:1a:4f:82:46:c4:c6:27:ab:cc:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:ae:30:15:c9:17:66:c4:43:59:d4:7c:50:e9:e6:c1: 5d:f4:2e:40:cb:dc:c0:55:f7:cb:18:6e:dd:6c:5f:28: 90:b2:e2:46:95:b7:4a:47:d5:c3:97:2e:5a:0b:8f:2c: 0a:06:c0:56:7c:0a:dc:a6:dc:9e:0c:df:e2:3a:a9:ba: 74:b5:cd:72:51:d8:43:3d:41:f6:48:2b:1d:dd:9d:46: e6:43:11:80:e0:7c:33:f7:00:c9:b6:66:d9:ea:b7:f5: 21:d9:a4:3f:7c:f3:7d:ef:69:bf:2d:2c:61:09:05:9f: 57:c0:2a:d6:31:5b:6d:2b:24:8f:88:4b:28:ec:c3:ba: e0:05:3d:38:fa:51:94:ac:47:50:7c:4d:da:4e:19:65: 26:62:f3:00:c3:9c:8a:c4:f4:e3:34:5f:a7:cc:6e:69: 64:e9:5f:18:52:55:0c:4d:11:0c:57:5d:89:f5:28:a3: 83:e4:bd:44:c9:f9:f9:7e:5e:78:52:ab:f3:e5:c9:07: 18:81:25:86:d9:c9:f7:94:b0:fa:d9:93:5e:12:2a:af: 3e:d7:f7:b8:0b:72:5d:90:ff:81:69:9d:3f:96:6f:55: 9d:0f:bb:7f:1d:ee:9b:04:4f:c0:d6:1c:d5:8e:b2:b2: 8d:15:b3:a3:c6:5e:76:f9:f4:3a:24:29:74:6b:0d:72 Fingerprint (SHA-256): DD:05:70:E0:6A:34:85:42:1C:AF:D6:7B:68:7A:BD:E9:18:90:DF:68:19:17:4A:4B:CC:A3:96:39:3A:F0:B1:8A Fingerprint (SHA1): 95:C1:B6:15:9D:16:80:8F:5C:32:B8:03:24:E3:F6:9E:27:07:00:C5 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #10164: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #10165: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #10166: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #10167: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #10168: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #10169: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108064834 (0x670f042) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 12:46:39 2016 Not After : Fri Jan 08 12:46:39 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:46:6b:8a:24:95:7f:2a:a1:3e:97:a6:b6:45:7f:9b: 15:5f:55:04:78:7a:d1:70:be:d8:c9:a9:af:82:a9:85: 92:57:9b:88:27:4c:9a:79:b4:86:c0:ea:2f:3d:2d:8c: 06:e5:91:15:50:bb:87:92:64:dd:fa:ba:8a:5e:11:88: ce:00:d1:72:3d:5a:d3:aa:95:9e:87:55:99:92:1f:f0: 73:72:c4:13:c3:77:a7:82:f7:cd:57:07:68:33:d8:ed: 60:07:14:a5:13:c8:15:1f:a6:ea:7f:36:8e:8c:65:6d: fe:29:00:52:6c:93:ab:f0:28:4b:9d:aa:72:26:e0:23: d3:39:28:bf:63:96:f1:d8:6e:b7:da:06:42:fa:43:49: ba:bc:dd:8f:43:47:fb:44:a3:70:48:39:18:19:53:61: 3a:86:10:bd:31:b9:d9:89:b9:6a:fc:ae:a1:12:26:8e: ce:41:d1:86:96:7d:c5:bc:1e:98:e0:5a:70:fe:fb:dd: d6:ea:b4:ef:9b:8d:78:7b:35:98:f1:db:56:97:86:c5: e2:86:46:63:59:d1:0c:4b:c4:80:48:77:48:f7:42:f7: 3b:30:b9:d4:e8:cd:7f:15:27:b7:01:39:2a:01:8a:75: 46:7e:5f:48:23:80:30:70:63:0b:09:55:37:e1:51:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:e1:8f:bc:24:ff:f8:da:2b:66:fe:33:fe:7f:b0:db: ac:ab:d4:ee:aa:d0:8b:29:ae:e2:56:7b:4f:95:ad:1c: c7:aa:11:f0:5f:e2:e9:48:4b:d2:38:08:9e:10:14:40: 4b:22:c5:47:aa:58:f9:b5:9f:8c:26:07:d7:63:d8:64: d2:d4:56:60:bd:13:d1:9d:b5:7e:64:b8:6d:80:35:a3: 09:10:6a:3b:fc:9f:2d:95:0b:ba:a3:a9:a5:a7:28:22: a4:b8:70:58:29:1e:24:37:3e:61:f1:48:06:b3:5e:3a: 2f:85:ff:20:e6:68:47:20:cf:b7:ee:4e:e5:71:b5:50: 87:9b:ad:76:43:a9:0a:7b:72:33:ed:6b:a5:d1:d7:5a: 9d:69:3b:4f:1f:01:09:81:2d:57:1b:2d:bc:17:7b:4a: 4f:33:f7:dc:b1:c4:d9:1c:51:f2:2c:a8:b4:14:73:be: 7d:5c:a9:b8:39:31:86:ca:54:9b:68:50:88:27:90:c1: 4c:b4:9b:54:c7:86:3d:19:42:45:80:be:5c:25:72:96: ba:dc:87:b0:70:7a:41:73:5f:ce:88:80:42:67:5a:fb: 2a:9c:84:72:13:68:2e:16:e8:38:62:8c:09:7f:f0:c3: c3:ea:92:e1:35:7c:ec:05:17:21:ce:4e:1f:e1:3a:2a Fingerprint (SHA-256): 77:9A:E7:41:11:EE:3D:55:7B:4E:67:DF:F7:15:8A:23:F0:DD:C4:0C:E7:32:24:B5:47:25:59:9C:64:CB:05:CC Fingerprint (SHA1): 24:8E:1E:DF:87:29:33:27:92:14:D9:32:03:1B:77:98:E1:2F:CC:73 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #10170: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #10171: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #10172: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #10173: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #10174: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #10175: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #10176: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #10177: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #10178: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #10179: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #10180: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #10181: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #10182: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #10183: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #10184: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #10185: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #10186: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #10187: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #10188: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #10189: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #10190: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #10191: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #10192: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #10193: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 3254 at Fri Jan 8 07:47:11 EST 2016 kill -USR1 3254 httpserv: normal termination httpserv -b -p 9601 2>/dev/null; httpserv with PID 3254 killed at Fri Jan 8 07:47:12 EST 2016 TIMESTAMP chains END: Fri Jan 8 07:47:12 EST 2016 chains.sh: Testing with upgraded library =============================== cp: cannot stat '/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert.done': No such file or directory Running tests for dbupgrade TIMESTAMP dbupgrade BEGIN: Fri Jan 8 07:47:12 EST 2016 dbupgrade.sh: DB upgrade tests =============================== Reset databases to their initial values: certutil: could not find certificate named "objsigner": SEC_ERROR_BAD_DATABASE: security library: bad database. Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu dbupgrade.sh: Legacy to shared Library update =============================== alicedir upgrading db alicedir Generating key. This may take a few moments... dbupgrade.sh: #10194: Upgrading alicedir - PASSED bobdir upgrading db bobdir Generating key. This may take a few moments... dbupgrade.sh: #10195: Upgrading bobdir - PASSED CA upgrading db CA Generating key. This may take a few moments... dbupgrade.sh: #10196: Upgrading CA - PASSED cert_extensions upgrading db cert_extensions Generating key. This may take a few moments... dbupgrade.sh: #10197: Upgrading cert_extensions - PASSED client upgrading db client Generating key. This may take a few moments... dbupgrade.sh: #10198: Upgrading client - PASSED clientCA upgrading db clientCA Generating key. This may take a few moments... dbupgrade.sh: #10199: Upgrading clientCA - PASSED dave upgrading db dave Generating key. This may take a few moments... dbupgrade.sh: #10200: Upgrading dave - PASSED eccurves upgrading db eccurves Generating key. This may take a few moments... dbupgrade.sh: #10201: Upgrading eccurves - PASSED eve upgrading db eve Generating key. This may take a few moments... dbupgrade.sh: #10202: Upgrading eve - PASSED ext_client upgrading db ext_client Generating key. This may take a few moments... dbupgrade.sh: #10203: Upgrading ext_client - PASSED ext_server upgrading db ext_server Generating key. This may take a few moments... dbupgrade.sh: #10204: Upgrading ext_server - PASSED SDR upgrading db SDR Generating key. This may take a few moments... dbupgrade.sh: #10205: Upgrading SDR - PASSED server upgrading db server Generating key. This may take a few moments... dbupgrade.sh: #10206: Upgrading server - PASSED serverCA upgrading db serverCA Generating key. This may take a few moments... dbupgrade.sh: #10207: Upgrading serverCA - PASSED ssl_gtests skipping db ssl_gtests dbupgrade.sh: #10208: No directory ssl_gtests - PASSED stapling upgrading db stapling Generating key. This may take a few moments... dbupgrade.sh: #10209: Upgrading stapling - PASSED tools/copydir skipping db tools/copydir dbupgrade.sh: #10210: No directory tools/copydir - PASSED upgrading db fips Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. dbupgrade.sh: #10211: Upgrading fips - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu TIMESTAMP dbupgrade END: Fri Jan 8 07:47:53 EST 2016 Running tests for tools TIMESTAMP tools BEGIN: Fri Jan 8 07:47:53 EST 2016 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10212: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e0:69:cc:81:ad:be:31:a7:b9:3d:63:fd:a7:d0:0c:7d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10213: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10214: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10215: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10216: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5c:e5:25:6d:49:bd:fa:23:c0:da:a0:70:28:44:29:4d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 07:14:36 2016 Not After : Fri Jan 08 07:14:36 2066 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:f3:04:60:fc:37:5e:ef:c5:1d:25:68:90:ba:97: 91:d3:ce:4b:a1:9f:5a:fc:b6:56:78:12:c2:db:37:c6: f6:62:bd:8e:63:f2:f8:5b:3b:c3:c1:00:e2:cf:ae:af: 9c:56:1b:e6:00:98:f9:a6:c5:a3:37:4e:36:31:db:35: 4e:a3:f4:01:28:09:f8:8d:d5:a1:c9:92:0e:b2:b9:5c: 68:82:02:88:e6:d1:af:6d:1e:7f:42:73:b7:2b:ee:1f: 2d:d7:f1:6d:27:14:8d:ae:91:7f:e3:f9:44:2b:9c:a0: 78:aa:88:b7:b0:25:67:89:3a:de:36:53:21:88:c5:2f: 4d:76:02:c9:8d Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:da:74:66:ea:39:d8:43:18:06:e8: 42:4a:c6:32:e9:72:df:25:74:96:c7:ed:ac:7a:72:70: 4b:72:72:e1:7b:36:c5:02:bf:b5:76:a4:e2:a4:e6:a5: c8:16:54:f3:f2:a8:c7:b5:80:c2:5b:bc:93:d1:c2:f0: 6f:76:38:63:b8:f2:6f:02:42:01:21:ad:0e:a6:9f:dc: a1:9f:ec:17:13:a7:04:14:6a:0f:a6:6f:98:eb:ca:8f: 11:4d:dd:ed:fb:73:b2:47:d4:0b:55:1d:57:04:58:d4: 8c:63:ae:33:f6:98:fe:5d:75:cc:e2:a8:8a:07:30:2d: 56:4c:86:22:8a:08:a2:8f:1d:f5:ea Fingerprint (SHA-256): 82:B2:89:6E:4A:EC:72:6D:C2:ED:6A:11:75:CD:CB:B9:93:20:15:C5:97:3E:59:C6:57:5F:A0:7B:B4:A9:26:EE Fingerprint (SHA1): A3:10:F6:B5:AF:EC:A0:DA:07:62:B8:64:EF:6F:44:13:3A:06:2F:55 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 07:17:34 2016 Not After : Fri Jan 08 07:17:34 2021 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:cc:bc:be:ac:d1:c2:18:35:35:7e:27:a4:ae:df:83: 5d:47:39:07:37:c5:35:31:d1:44:27:a5:d8:1c:87:bd: a3:cb:04:87:87:55:cd:8a:4c:49:5b:1f:1b:29:3d:1f: 67:9c:c5:4d:2c:b9:88:f2:d3:09:b9:2c:0f:e1:e1:9b: 2b:df:56:9f:82:a6:f2:8d:ee:7f:e8:03:b1:cd:d2:d7: 59:82:6a:55:40:eb:31:ca:1a:13:3e:af:5a:98:04:74: fc Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:1c:56:0a:3f:9c:18:ff:60:76:ef: 77:aa:2e:b2:fd:df:7d:5b:6c:d9:2b:2c:2f:07:5c:6d: 06:90:62:f3:8f:b3:7b:9c:fe:b2:e6:ae:57:01:f2:e0: 93:33:45:0c:f7:ac:65:16:70:16:a9:19:b3:dd:22:11: 0f:4b:1e:d8:55:eb:42:02:42:01:2b:72:d7:46:19:c0: 21:08:aa:cd:d0:fc:6a:02:4c:f3:7a:25:a0:3e:cc:c0: 55:a5:80:dd:9c:75:76:7a:1c:17:a5:0b:f1:4e:29:d5: e7:2f:b3:21:f8:7b:19:53:77:33:92:90:32:94:11:d5: 05:b6:0b:31:6c:2b:4b:94:8b:ad:e0 Fingerprint (SHA-256): BF:29:58:3F:B3:11:57:07:B1:EC:D1:FE:AC:96:E3:8D:B0:17:77:5F:1E:98:18:2C:A0:97:A1:39:59:96:29:C3 Fingerprint (SHA1): F1:71:BE:1B:65:2F:30:87:2A:A6:54:0F:4F:61:E4:66:2E:8E:CC:41 Friendly Name: Alice-ec tools.sh: #10217: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10218: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 51:f3:20:f9:89:d8:54:33:21:e3:6d:a4:c1:45:69:39 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10219: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10220: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10221: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 13:04:2a:e7:09:25:f2:c6:97:86:27:ed:af:84:95:46 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10222: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10223: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10224: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 89:67:30:a6:6c:f5:0a:d6:da:28:b6:c9:66:cb:dd:07 Iteration Count: 2000 (0x7d0) tools.sh: #10225: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10226: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10227: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 80:5d:36:33:d3:39:1a:a6:56:5d:7d:7c:c5:d7:ee:2a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10228: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10229: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10230: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ec:c7:e6:9e:d2:0c:1d:b0:02:95:96:1b:1d:37:7c:54 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10231: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10232: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10233: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0d:65:a0:77:7c:8d:cf:b4:f1:92:cd:a0:82:85:6e:ea Iteration Count: 2000 (0x7d0) tools.sh: #10234: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10235: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10236: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 45:cf:86:19:7e:d8:d1:7b:dd:ce:38:a0:ed:fd:4b:30 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:4a:c7:7b:01:5a:59:3c:d9:b5:ed:2a:49:07:fa: df:ac Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10237: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10238: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10239: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8a:68:a0:67:a6:51:ac:44:81:3f:11:f8:e7:7a:1a:70 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:57:14:16:f0:4e:5d:7e:7b:5d:69:d6:9c:e5:a1: c0:2e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10240: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10241: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10242: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e7:36:ae:a4:39:33:be:f4:2e:5b:38:8c:5a:7a:63:ae Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:3e:76:c9:de:ca:fa:d9:96:12:2f:6b:5f:cf:0b: d6:bf tools.sh: #10243: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10244: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10245: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 87:e7:3a:70:72:4e:f0:1a:cc:8c:b7:bf:ac:a9:42:5e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:ec:a2:e3:49:70:b0:f4:a1:62:ed:c1:f2:e1:65: 5c:47 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10246: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10247: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10248: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 80:14:1a:3f:52:bc:d4:47:8d:83:70:43:a7:e7:35:80 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:db:d1:b6:d5:57:d3:ff:33:0f:4c:5d:44:2a:91: 5b:d2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10249: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10250: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10251: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b1:b6:1b:e7:25:c6:89:7a:5c:e6:08:b7:4c:72:69:47 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:2a:35:a4:04:36:04:ca:ac:fd:d3:45:5d:bb:95: 5a:85 tools.sh: #10252: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10253: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10254: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 66:a2:72:16:83:89:ff:0e:43:1a:20:80:e2:a3:9a:13 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:de:82:3d:a6:5c:16:2d:4d:5c:c9:f9:5e:cb:e4: 8d:08 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10255: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10256: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10257: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 85:40:45:fd:6a:b0:04:6c:17:ef:08:7b:fd:85:c3:6c Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:43:d6:aa:ee:df:56:47:4f:a9:08:bb:b9:eb:e4: c6:11 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10258: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10259: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10260: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 47:f0:41:f8:84:67:b4:7c:f2:7b:6f:17:6b:9e:41:0f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:9f:a2:5b:78:60:2b:d0:9e:bc:9c:d1:c2:7d:e6: de:a1 tools.sh: #10261: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10262: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10263: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fa:8f:38:54:b4:45:fd:e0:0e:cc:2f:f3:c2:1d:d1:a2 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:73:23:43:98:58:30:07:68:4b:b1:bc:f3:3b:22: 82:ae Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10264: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10265: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10266: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 62:ab:41:10:f2:d3:83:34:25:71:b0:f2:12:bf:57:84 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:dd:51:86:2c:ce:79:38:ab:c2:08:76:cf:1c:f4: 8f:c5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10267: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10268: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10269: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2e:ba:98:9e:82:2c:1d:14:dd:54:0c:fe:f1:80:e2:c4 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:74:00:59:86:5c:15:d8:f4:18:4d:9d:35:5d:fd: c6:88 tools.sh: #10270: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10271: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10272: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8e:fa:77:c9:97:0a:13:b4:e2:a9:c2:d4:d7:f3:23:85 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:0f:89:82:99:99:b9:bd:32:09:4e:8d:29:51:94: ed:38 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10273: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10274: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10275: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 33:db:f4:ac:7c:d4:67:58:56:6b:ac:2f:ac:56:c4:e0 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:c9:f4:35:56:a9:1d:7f:78:f3:39:fd:ed:ab:aa: 73:ab Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10276: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10277: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10278: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8d:f5:46:32:35:59:e2:a6:14:d1:32:63:d6:8a:e0:6a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:6e:c0:a8:46:af:d7:64:ed:61:0e:21:b3:55:70: 27:1c tools.sh: #10279: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10280: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10281: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5e:aa:5e:42:75:d5:a0:2c:2e:d8:9b:f4:4a:96:16:42 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:7a:8f:2f:12:63:16:af:68:36:14:90:ed:b4:b4: 9b:65 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10282: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10283: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10284: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 61:4c:4a:14:b9:b2:ee:b1:0d:0d:22:79:8d:56:5f:5f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:47:aa:6c:32:20:f0:85:1c:44:5d:18:48:52:3a: 6f:ca Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10285: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10286: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10287: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4d:66:f1:81:f5:a7:12:db:31:38:84:af:84:9c:31:eb Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:bb:34:aa:78:78:49:d4:a1:3d:eb:64:46:c6:5d: 32:1c tools.sh: #10288: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10289: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10290: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 82:53:1b:d0:e6:49:c9:33:72:1d:75:61:9a:ce:a8:de Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10291: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10292: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10293: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 4f:36:38:0c:c6:3b:8a:d9:a4:2d:11:e5:28:0d:62:cc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10294: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10295: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10296: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: b8:88:7c:cf:61:89:a6:ee:d8:de:ba:2a:20:a0:03:2c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10297: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10298: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10299: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: e9:36:ba:b1:8e:23:90:5f:a6:96:cf:ab:a2:14:13:5d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10300: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10301: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10302: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 68:51:01:f0:d7:6c:d4:6b:fe:78:4f:c0:62:99:d6:c6 Iteration Count: 2000 (0x7d0) tools.sh: #10303: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10304: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10305: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: bc:19:a9:b7:65:cf:49:7d:b8:e2:4c:2f:6a:ef:68:de Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10306: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10307: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10308: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ec:6e:cb:2a:53:63:dd:56:2e:17:f2:a3:a8:61:ae:a7 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10309: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10310: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10311: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 0c:7b:c9:0c:98:e9:3e:22:61:2d:49:20:77:22:09:75 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10312: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10313: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10314: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 86:59:e8:c6:54:49:c7:8b:7b:92:38:c0:99:20:61:b6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10315: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10316: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10317: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 9d:a1:a5:d4:45:6c:16:93:2a:9e:57:f3:ed:9c:27:9f Iteration Count: 2000 (0x7d0) tools.sh: #10318: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10319: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10320: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8a:99:ee:63:e0:b8:2a:29:1e:3e:38:b2:d8:30:6a:b3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10321: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10322: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10323: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 54:80:8c:51:b7:03:24:c5:ea:ed:9c:3a:8d:90:c3:2b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10324: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10325: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10326: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0b:45:df:32:f7:5b:a5:a7:25:d5:6e:ca:46:5f:78:52 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10327: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10328: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10329: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 02:7d:54:ec:01:9f:37:2f:57:b5:c6:74:c2:c0:a2:5c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10330: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10331: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10332: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3c:83:b8:12:dc:a8:3a:1c:de:c7:0c:03:c1:2d:40:46 Iteration Count: 2000 (0x7d0) tools.sh: #10333: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10334: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10335: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 78:40:a4:b4:70:b5:81:c5:46:42:c1:8f:d4:bb:79:7b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10336: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10337: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10338: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b0:64:7a:28:19:56:2b:71:88:34:4f:96:27:48:86:cb Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10339: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10340: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10341: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e6:54:6a:93:9b:5d:0c:bb:0a:78:03:3f:4f:2c:c2:3e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10342: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10343: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10344: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4e:03:5d:4a:15:39:bb:6a:33:a3:3e:4d:37:8e:aa:17 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10345: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10346: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10347: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8c:17:7c:aa:17:d6:81:cb:f2:03:55:f0:23:40:73:8b Iteration Count: 2000 (0x7d0) tools.sh: #10348: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10349: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10350: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 09:69:09:be:fd:69:89:e6:30:8c:1c:38:d4:5a:f9:dd Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10351: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10352: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10353: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1b:70:e7:8d:76:85:50:d2:96:3f:bf:6e:61:1c:57:bc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10354: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10355: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10356: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2e:00:12:87:1a:a6:29:ae:35:fa:01:6b:02:ba:e5:6f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10357: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10358: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10359: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 92:6a:91:4a:74:5f:f2:12:41:ff:26:a8:75:ca:33:dc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10360: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10361: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10362: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 52:be:0c:9f:64:f9:0d:1c:86:0c:68:83:88:98:93:85 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10363: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10364: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10365: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2e:13:37:08:92:0f:74:1a:62:ee:42:c7:de:fa:e1:a9 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10366: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10367: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10368: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 23:06:92:49:b2:2e:d9:35:55:c3:0d:2a:b5:c7:e7:0b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10369: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10370: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10371: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e5:ed:c7:ab:6d:5e:f2:17:78:9b:10:9b:52:f4:3f:0a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10372: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10373: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10374: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5f:bc:60:97:2a:7b:b0:fb:b0:99:f4:a4:c4:21:9a:68 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10375: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10376: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10377: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 92:f4:e3:6a:bf:15:62:50:04:8c:31:a4:e7:ad:5d:95 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:13:26 2016 Not After : Fri Jan 08 07:13:26 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:73:04:07:b7:74:58:60:cd:a6:70:1a:e4:46:bf:87: 3d:16:8e:6f:87:e0:17:85:41:f3:64:0a:6a:d8:57:2b: c4:b6:2a:27:2b:41:fd:60:37:0b:4d:1b:7e:db:13:c5: 9b:19:10:93:34:41:99:38:29:53:60:77:95:99:eb:83: 40:b3:e3:0d:e3:fc:18:81:2f:fc:a0:ce:fc:dd:87:58: 01:72:2a:13:18:60:49:cb:fb:d1:cb:65:ba:ba:ab:67: e6:fe:9d:5f:01:08:63:e5:d7:cb:e0:c0:45:f4:c7:3f: 5e:fd:0f:0b:f3:96:e3:3c:16:e2:cc:b8:12:8f:5a:a5: c7:09:9b:30:44:b8:cf:12:5a:57:c5:33:1a:ab:f7:6c: e9:35:f5:f8:6f:ff:01:24:7a:a0:70:4b:7c:76:c4:ce: ba:fa:3e:cc:a3:ab:61:76:f6:ab:86:8e:5f:71:52:ed: 14:b7:cd:35:ad:60:d3:19:d9:ca:ad:51:ea:f3:80:29: 39:ec:bb:aa:a2:2e:fa:f9:13:ac:df:45:50:61:ee:4c: b6:53:ef:08:55:9c:28:78:c1:71:b6:af:28:71:d7:ce: bf:54:33:10:65:64:37:75:85:3f:5d:9f:f6:8b:c4:e9: 12:e9:e1:a9:8d:12:12:4f:e4:85:23:e8:61:fd:6f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:02:b9:e9:71:a1:8f:a6:9c:00:65:08:d5:d7:37: be:61:4b:43:9c:b9:29:c5:f2:2c:bc:2d:53:32:5f:68: 5f:d8:fa:e8:00:33:47:09:90:46:e7:da:39:5d:20:6e: 9f:56:4b:85:f9:01:3e:22:26:e6:a5:df:a5:26:d3:28: 80:b7:2d:80:23:f8:a9:af:8b:5d:0e:c7:fb:61:5e:c4: 8c:92:f7:01:30:06:fc:e8:a1:ca:03:43:53:38:5a:89: 5e:2e:28:f0:4f:41:a6:73:e5:2f:55:8c:70:dd:52:3b: ad:8c:2d:1b:66:43:a6:2d:83:15:33:d4:2b:26:ce:a2: ec:e3:8a:77:4d:1c:61:fc:80:3a:01:bb:7a:f3:5a:3b: 0a:ec:a9:3c:2f:02:f9:8b:ff:9a:87:df:c8:2e:37:72: 9a:73:d3:29:b4:b1:8a:65:3f:55:9d:5d:f3:38:3f:c7: 87:9f:ca:ce:28:c5:b1:ba:c7:c0:17:61:32:f9:25:ad: 1c:d1:2d:27:d1:13:fa:36:e8:c7:3b:85:3c:f7:06:66: 2b:44:44:0a:54:95:3a:c7:20:e0:cf:66:ec:6b:61:9d: 24:bd:b3:43:6e:db:41:8c:f0:d8:9b:32:93:bf:0b:1b: 01:c9:c2:d2:1e:cc:95:5e:67:55:c1:c9:cc:d0:d5:e2 Fingerprint (SHA-256): EE:80:86:F5:03:AB:09:C0:9A:04:CE:A2:79:72:F5:0D:C8:CB:7C:52:F5:C8:01:2E:C0:36:65:71:55:7A:F0:FA Fingerprint (SHA1): AD:50:82:45:2C:84:77:11:A6:8A:6E:A5:0B:C6:E0:89:F3:1B:74:B1 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:17:29 2016 Not After : Fri Jan 08 07:17:29 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:75:9d:62:69:51:c1:43:80:20:8a:80:8e:91:56: 66:df:9c:c6:d8:71:94:d5:ea:40:5d:cf:db:d4:08:81: 92:41:8a:ec:37:6a:d3:7d:a1:31:7a:05:da:97:c7:9d: a1:54:72:40:60:6d:68:9d:d7:c9:37:1f:6d:7e:b6:be: ab:a8:b6:7e:e2:ce:87:b4:4e:27:46:7a:42:d1:61:f6: f6:f1:c8:95:c1:55:a8:96:60:84:d2:7c:51:11:53:44: 31:bc:40:79:71:9b:bc:54:a0:69:59:24:80:f0:b3:8a: 50:cd:4d:8f:28:4a:b8:ac:c3:4a:51:b2:f3:65:66:50: 05:93:51:7a:00:2b:b8:e8:c1:95:12:d4:5a:38:bd:d7: fe:6f:45:9f:e9:91:3e:29:31:f1:c6:5a:d9:61:93:a1: 20:0a:7e:9c:bb:a6:c1:86:1a:6b:7d:ea:ca:8e:84:d1: 90:82:54:ea:4a:a9:0e:aa:4a:e6:02:34:c1:71:3f:65: bb:34:1f:9c:41:b1:5b:6d:90:f7:e6:9f:9f:58:49:06: 1e:5d:73:4a:e4:e4:e9:35:2f:b4:32:5e:42:0e:c7:74: 1d:04:b1:32:e3:21:a0:2a:12:d6:55:c2:96:e3:1a:71: 0e:b9:4b:15:e6:a4:15:3b:65:f6:8b:78:eb:54:26:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:47:07:74:92:52:c0:ad:cd:99:0d:af:8c:79:c8:88: 99:32:59:08:6d:2b:2a:ae:31:57:88:db:38:87:81:db: 9b:f4:ed:43:f5:5e:76:af:a9:4e:6b:05:f9:8f:c3:06: 24:49:2f:49:50:19:49:00:11:e0:a7:3e:1a:3b:52:cb: a1:e0:8b:cb:7d:de:6e:73:8e:6d:a8:2d:fb:6d:ee:f9: e6:d1:61:7c:e9:90:53:19:0f:f0:3b:f7:d3:7c:b4:52: 3c:18:4b:29:0e:c4:fe:84:fc:10:67:b9:67:f3:f4:ca: 09:09:25:1d:1b:2a:b1:e3:f3:78:37:e6:34:26:5c:92: fe:8a:8a:e3:a8:f2:ea:eb:f1:be:7d:c3:25:4e:9b:2c: 1b:c1:88:6a:bd:d2:ca:d4:d4:54:40:5b:31:81:0a:4e: 58:0e:f5:f3:2c:ad:7c:d4:92:f5:12:d3:ca:39:31:7e: 20:48:8e:7b:a2:e3:65:79:c0:fe:9c:0a:9d:cb:f8:cd: 8f:1e:fb:b9:8d:63:ff:08:fc:8a:90:4d:55:8b:95:22: e8:9f:bf:49:1e:6b:d6:de:5d:42:ea:07:7e:83:0e:36: 0e:56:7b:d7:00:ee:5f:ab:51:87:42:85:32:75:fe:0a: f2:d5:8d:21:b4:59:43:f5:ff:8a:71:a3:20:3d:42:1f Fingerprint (SHA-256): 0C:EA:1F:A7:DE:6A:4B:9C:5E:2C:C3:B6:96:D0:50:82:26:17:BF:7E:A9:7A:92:2D:41:D4:B5:5C:66:A0:5C:0E Fingerprint (SHA1): B4:21:CB:7E:49:B6:22:04:A7:F2:F4:89:76:CD:FE:4B:42:82:E5:BB Friendly Name: Alice tools.sh: #10378: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10379: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #10380: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10381: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #10382: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #10383: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #10384: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #10385: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #10386: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #10387: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #10388: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Fri Jan 8 07:49:53 EST 2016 Running tests for fips TIMESTAMP fips BEGIN: Fri Jan 8 07:49:53 EST 2016 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #10389: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #10390: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1c5921e1ef426e08718d8e0f17a4b528f65a29d3 FIPS_PUB_140_Test_Certificate fips.sh: #10391: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #10392: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #10393: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #10394: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #10395: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #10396: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #10397: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10398: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #10399: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #10400: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #10401: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1c5921e1ef426e08718d8e0f17a4b528f65a29d3 FIPS_PUB_140_Test_Certificate fips.sh: #10402: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #10403: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10404: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #10405: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #10406: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1c5921e1ef426e08718d8e0f17a4b528f65a29d3 FIPS_PUB_140_Test_Certificate fips.sh: #10407: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #10408: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #10409: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle mkdir: cannot create directory '/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle': File exists cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x00032fe4 (208868): from 21 (33) to 01 (1) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle dbtest -r -d ../fips fips.sh: #10410: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Fri Jan 8 07:51:00 EST 2016 Running tests for crmf TIMESTAMP crmf BEGIN: Fri Jan 8 07:51:00 EST 2016 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #10411: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #10412: CMMF test . - PASSED TIMESTAMP crmf END: Fri Jan 8 07:51:02 EST 2016 Running tests for smime TIMESTAMP smime BEGIN: Fri Jan 8 07:51:02 EST 2016 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #10413: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10414: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #10415: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #10416: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #10417: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #10418: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10419: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #10420: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #10421: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #10422: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #10423: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10424: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #10425: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #10426: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #10427: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #10428: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10429: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #10430: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #10431: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #10432: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #10433: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10434: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #10435: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #10436: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #10437: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #10438: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10439: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #10440: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #10441: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #10442: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #10443: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10444: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #10445: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #10446: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #10447: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #10448: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10449: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #10450: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #10451: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #10452: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #10453: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #10454: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #10455: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #10456: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #10457: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #10458: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #10459: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #10460: Decrypt with a Multiple Email cert . - PASSED smime.sh: #10461: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #10462: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #10463: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #10464: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #10465: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #10466: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #10467: Decode Encrypted-Data . - PASSED smime.sh: #10468: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #10469: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #10470: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #10471: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #10472: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #10473: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Fri Jan 8 07:51:35 EST 2016 Running tests for ssl TIMESTAMP ssl BEGIN: Fri Jan 8 07:51:35 EST 2016 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:51:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:51:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:51:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10474: Waiting for Server - FAILED kill -0 21623 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21623 found at Fri Jan 8 07:51:41 EST 2016 selfserv_9591 with PID 21623 started at Fri Jan 8 07:51:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10475: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 21623 at Fri Jan 8 07:51:41 EST 2016 kill -USR1 21623 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21623 killed at Fri Jan 8 07:51:42 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:51:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:51:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:51:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10476: Waiting for Server - FAILED kill -0 21691 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21691 found at Fri Jan 8 07:51:48 EST 2016 selfserv_9591 with PID 21691 started at Fri Jan 8 07:51:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10477: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 21691 at Fri Jan 8 07:51:48 EST 2016 kill -USR1 21691 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21691 killed at Fri Jan 8 07:51:49 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:51:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:51:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:51:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10478: Waiting for Server - FAILED kill -0 21759 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21759 found at Fri Jan 8 07:51:55 EST 2016 selfserv_9591 with PID 21759 started at Fri Jan 8 07:51:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10479: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 21759 at Fri Jan 8 07:51:55 EST 2016 kill -USR1 21759 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21759 killed at Fri Jan 8 07:51:56 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:51:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:51:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:52:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10480: Waiting for Server - FAILED kill -0 21840 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21840 found at Fri Jan 8 07:52:02 EST 2016 selfserv_9591 with PID 21840 started at Fri Jan 8 07:52:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10481: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 21840 at Fri Jan 8 07:52:02 EST 2016 kill -USR1 21840 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21840 killed at Fri Jan 8 07:52:03 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:52:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:52:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:52:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10482: Waiting for Server - FAILED kill -0 21908 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21908 found at Fri Jan 8 07:52:09 EST 2016 selfserv_9591 with PID 21908 started at Fri Jan 8 07:52:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10483: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 21908 at Fri Jan 8 07:52:09 EST 2016 kill -USR1 21908 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21908 killed at Fri Jan 8 07:52:09 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:52:10 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:52:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:52:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10484: Waiting for Server - FAILED kill -0 21976 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21976 found at Fri Jan 8 07:52:15 EST 2016 selfserv_9591 with PID 21976 started at Fri Jan 8 07:52:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10485: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 21976 at Fri Jan 8 07:52:16 EST 2016 kill -USR1 21976 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21976 killed at Fri Jan 8 07:52:16 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:52:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:52:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:52:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10486: Waiting for Server - FAILED kill -0 22057 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22057 found at Fri Jan 8 07:52:22 EST 2016 selfserv_9591 with PID 22057 started at Fri Jan 8 07:52:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10487: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 22057 at Fri Jan 8 07:52:23 EST 2016 kill -USR1 22057 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22057 killed at Fri Jan 8 07:52:23 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:52:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:52:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:52:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10488: Waiting for Server - FAILED kill -0 22125 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22125 found at Fri Jan 8 07:52:29 EST 2016 selfserv_9591 with PID 22125 started at Fri Jan 8 07:52:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10489: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 22125 at Fri Jan 8 07:52:30 EST 2016 kill -USR1 22125 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22125 killed at Fri Jan 8 07:52:30 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:52:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:52:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:52:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10490: Waiting for Server - FAILED kill -0 22193 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22193 found at Fri Jan 8 07:52:36 EST 2016 selfserv_9591 with PID 22193 started at Fri Jan 8 07:52:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10491: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 22193 at Fri Jan 8 07:52:37 EST 2016 kill -USR1 22193 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22193 killed at Fri Jan 8 07:52:37 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:52:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:52:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:52:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10492: Waiting for Server - FAILED kill -0 22274 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22274 found at Fri Jan 8 07:52:43 EST 2016 selfserv_9591 with PID 22274 started at Fri Jan 8 07:52:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10493: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 22274 at Fri Jan 8 07:52:44 EST 2016 kill -USR1 22274 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22274 killed at Fri Jan 8 07:52:44 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:52:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:52:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:52:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10494: Waiting for Server - FAILED kill -0 22342 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22342 found at Fri Jan 8 07:52:50 EST 2016 selfserv_9591 with PID 22342 started at Fri Jan 8 07:52:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10495: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 22342 at Fri Jan 8 07:52:51 EST 2016 kill -USR1 22342 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22342 killed at Fri Jan 8 07:52:51 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:52:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:52:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:52:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10496: Waiting for Server - FAILED kill -0 22411 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22411 found at Fri Jan 8 07:52:57 EST 2016 selfserv_9591 with PID 22411 started at Fri Jan 8 07:52:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10497: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 22411 at Fri Jan 8 07:52:57 EST 2016 kill -USR1 22411 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22411 killed at Fri Jan 8 07:52:58 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:52:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:52:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:53:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10498: Waiting for Server - FAILED kill -0 22493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22493 found at Fri Jan 8 07:53:04 EST 2016 selfserv_9591 with PID 22493 started at Fri Jan 8 07:53:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10499: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 22493 at Fri Jan 8 07:53:04 EST 2016 kill -USR1 22493 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22493 killed at Fri Jan 8 07:53:05 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:53:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:53:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:53:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10500: Waiting for Server - FAILED kill -0 22561 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22561 found at Fri Jan 8 07:53:11 EST 2016 selfserv_9591 with PID 22561 started at Fri Jan 8 07:53:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10501: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 22561 at Fri Jan 8 07:53:11 EST 2016 kill -USR1 22561 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22561 killed at Fri Jan 8 07:53:12 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:53:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:53:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:53:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10502: Waiting for Server - FAILED kill -0 22630 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22630 found at Fri Jan 8 07:53:18 EST 2016 selfserv_9591 with PID 22630 started at Fri Jan 8 07:53:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10503: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 22630 at Fri Jan 8 07:53:18 EST 2016 kill -USR1 22630 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22630 killed at Fri Jan 8 07:53:19 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:53:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:53:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:53:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10504: Waiting for Server - FAILED kill -0 22710 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22710 found at Fri Jan 8 07:53:25 EST 2016 selfserv_9591 with PID 22710 started at Fri Jan 8 07:53:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10505: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 22710 at Fri Jan 8 07:53:25 EST 2016 kill -USR1 22710 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22710 killed at Fri Jan 8 07:53:26 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:53:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:53:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:53:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10506: Waiting for Server - FAILED kill -0 22778 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22778 found at Fri Jan 8 07:53:32 EST 2016 selfserv_9591 with PID 22778 started at Fri Jan 8 07:53:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10507: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 22778 at Fri Jan 8 07:53:32 EST 2016 kill -USR1 22778 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22778 killed at Fri Jan 8 07:53:32 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:53:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:53:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:53:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10508: Waiting for Server - FAILED kill -0 22847 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22847 found at Fri Jan 8 07:53:38 EST 2016 selfserv_9591 with PID 22847 started at Fri Jan 8 07:53:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10509: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 22847 at Fri Jan 8 07:53:39 EST 2016 kill -USR1 22847 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22847 killed at Fri Jan 8 07:53:39 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:53:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:53:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:53:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10510: Waiting for Server - FAILED kill -0 22927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22927 found at Fri Jan 8 07:53:45 EST 2016 selfserv_9591 with PID 22927 started at Fri Jan 8 07:53:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10511: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 22927 at Fri Jan 8 07:53:46 EST 2016 kill -USR1 22927 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22927 killed at Fri Jan 8 07:53:46 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:53:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:53:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:53:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10512: Waiting for Server - FAILED kill -0 22995 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22995 found at Fri Jan 8 07:53:52 EST 2016 selfserv_9591 with PID 22995 started at Fri Jan 8 07:53:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10513: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 22995 at Fri Jan 8 07:53:53 EST 2016 kill -USR1 22995 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22995 killed at Fri Jan 8 07:53:53 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:53:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:53:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:53:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10514: Waiting for Server - FAILED kill -0 23064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23064 found at Fri Jan 8 07:53:59 EST 2016 selfserv_9591 with PID 23064 started at Fri Jan 8 07:53:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10515: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 23064 at Fri Jan 8 07:54:00 EST 2016 kill -USR1 23064 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23064 killed at Fri Jan 8 07:54:00 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:54:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:54:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:54:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10516: Waiting for Server - FAILED kill -0 23144 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23144 found at Fri Jan 8 07:54:06 EST 2016 selfserv_9591 with PID 23144 started at Fri Jan 8 07:54:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10517: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 23144 at Fri Jan 8 07:54:07 EST 2016 kill -USR1 23144 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23144 killed at Fri Jan 8 07:54:07 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:54:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:54:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:54:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10518: Waiting for Server - FAILED kill -0 23212 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23212 found at Fri Jan 8 07:54:13 EST 2016 selfserv_9591 with PID 23212 started at Fri Jan 8 07:54:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10519: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 23212 at Fri Jan 8 07:54:14 EST 2016 kill -USR1 23212 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23212 killed at Fri Jan 8 07:54:14 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:54:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:54:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:54:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10520: Waiting for Server - FAILED kill -0 23281 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23281 found at Fri Jan 8 07:54:20 EST 2016 selfserv_9591 with PID 23281 started at Fri Jan 8 07:54:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10521: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 23281 at Fri Jan 8 07:54:20 EST 2016 kill -USR1 23281 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23281 killed at Fri Jan 8 07:54:21 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:54:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:54:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:54:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10522: Waiting for Server - FAILED kill -0 23361 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23361 found at Fri Jan 8 07:54:27 EST 2016 selfserv_9591 with PID 23361 started at Fri Jan 8 07:54:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10523: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 23361 at Fri Jan 8 07:54:27 EST 2016 kill -USR1 23361 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23361 killed at Fri Jan 8 07:54:28 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:54:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:54:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:54:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10524: Waiting for Server - FAILED kill -0 23429 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23429 found at Fri Jan 8 07:54:34 EST 2016 selfserv_9591 with PID 23429 started at Fri Jan 8 07:54:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10525: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 23429 at Fri Jan 8 07:54:34 EST 2016 kill -USR1 23429 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23429 killed at Fri Jan 8 07:54:35 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:54:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:54:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:54:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10526: Waiting for Server - FAILED kill -0 23498 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23498 found at Fri Jan 8 07:54:41 EST 2016 selfserv_9591 with PID 23498 started at Fri Jan 8 07:54:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10527: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 23498 at Fri Jan 8 07:54:41 EST 2016 kill -USR1 23498 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23498 killed at Fri Jan 8 07:54:42 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:54:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:54:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:54:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10528: Waiting for Server - FAILED kill -0 23578 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23578 found at Fri Jan 8 07:54:48 EST 2016 selfserv_9591 with PID 23578 started at Fri Jan 8 07:54:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10529: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 23578 at Fri Jan 8 07:54:48 EST 2016 kill -USR1 23578 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23578 killed at Fri Jan 8 07:54:49 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:54:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:54:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:54:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10530: Waiting for Server - FAILED kill -0 23646 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23646 found at Fri Jan 8 07:54:55 EST 2016 selfserv_9591 with PID 23646 started at Fri Jan 8 07:54:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10531: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 23646 at Fri Jan 8 07:54:55 EST 2016 kill -USR1 23646 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23646 killed at Fri Jan 8 07:54:55 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:54:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:54:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:55:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10532: Waiting for Server - FAILED kill -0 23718 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23718 found at Fri Jan 8 07:55:01 EST 2016 selfserv_9591 with PID 23718 started at Fri Jan 8 07:55:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10533: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 23718 at Fri Jan 8 07:55:02 EST 2016 kill -USR1 23718 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23718 killed at Fri Jan 8 07:55:02 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:55:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:55:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:55:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10534: Waiting for Server - FAILED kill -0 23798 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23798 found at Fri Jan 8 07:55:08 EST 2016 selfserv_9591 with PID 23798 started at Fri Jan 8 07:55:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10535: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 23798 at Fri Jan 8 07:55:09 EST 2016 kill -USR1 23798 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23798 killed at Fri Jan 8 07:55:09 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:55:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:55:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:55:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10536: Waiting for Server - FAILED kill -0 23866 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23866 found at Fri Jan 8 07:55:15 EST 2016 selfserv_9591 with PID 23866 started at Fri Jan 8 07:55:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10537: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 23866 at Fri Jan 8 07:55:16 EST 2016 kill -USR1 23866 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23866 killed at Fri Jan 8 07:55:16 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:55:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:55:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:55:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10538: Waiting for Server - FAILED kill -0 23935 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23935 found at Fri Jan 8 07:55:22 EST 2016 selfserv_9591 with PID 23935 started at Fri Jan 8 07:55:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10539: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 23935 at Fri Jan 8 07:55:23 EST 2016 kill -USR1 23935 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23935 killed at Fri Jan 8 07:55:23 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:55:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:55:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:55:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10540: Waiting for Server - FAILED kill -0 24015 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24015 found at Fri Jan 8 07:55:29 EST 2016 selfserv_9591 with PID 24015 started at Fri Jan 8 07:55:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10541: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 24015 at Fri Jan 8 07:55:30 EST 2016 kill -USR1 24015 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24015 killed at Fri Jan 8 07:55:30 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:55:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:55:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:55:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10542: Waiting for Server - FAILED kill -0 24083 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24083 found at Fri Jan 8 07:55:36 EST 2016 selfserv_9591 with PID 24083 started at Fri Jan 8 07:55:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10543: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24083 at Fri Jan 8 07:55:37 EST 2016 kill -USR1 24083 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24083 killed at Fri Jan 8 07:55:37 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:55:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:55:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:55:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10544: Waiting for Server - FAILED kill -0 24152 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24152 found at Fri Jan 8 07:55:43 EST 2016 selfserv_9591 with PID 24152 started at Fri Jan 8 07:55:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10545: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 24152 at Fri Jan 8 07:55:43 EST 2016 kill -USR1 24152 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24152 killed at Fri Jan 8 07:55:44 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:55:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:55:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:55:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10546: Waiting for Server - FAILED kill -0 24232 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24232 found at Fri Jan 8 07:55:50 EST 2016 selfserv_9591 with PID 24232 started at Fri Jan 8 07:55:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10547: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24232 at Fri Jan 8 07:55:50 EST 2016 kill -USR1 24232 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24232 killed at Fri Jan 8 07:55:51 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:55:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:55:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:55:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10548: Waiting for Server - FAILED kill -0 24300 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24300 found at Fri Jan 8 07:55:57 EST 2016 selfserv_9591 with PID 24300 started at Fri Jan 8 07:55:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10549: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24300 at Fri Jan 8 07:55:57 EST 2016 kill -USR1 24300 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24300 killed at Fri Jan 8 07:55:58 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:55:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:55:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:56:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10550: Waiting for Server - FAILED kill -0 24369 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24369 found at Fri Jan 8 07:56:04 EST 2016 selfserv_9591 with PID 24369 started at Fri Jan 8 07:56:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10551: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24369 at Fri Jan 8 07:56:04 EST 2016 kill -USR1 24369 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24369 killed at Fri Jan 8 07:56:05 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:56:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:56:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:56:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10552: Waiting for Server - FAILED kill -0 24449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24449 found at Fri Jan 8 07:56:11 EST 2016 selfserv_9591 with PID 24449 started at Fri Jan 8 07:56:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10553: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24449 at Fri Jan 8 07:56:11 EST 2016 kill -USR1 24449 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24449 killed at Fri Jan 8 07:56:12 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:56:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:56:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:56:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10554: Waiting for Server - FAILED kill -0 24520 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24520 found at Fri Jan 8 07:56:18 EST 2016 selfserv_9591 with PID 24520 started at Fri Jan 8 07:56:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10555: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24520 at Fri Jan 8 07:56:18 EST 2016 kill -USR1 24520 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24520 killed at Fri Jan 8 07:56:18 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:56:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:56:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:56:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10556: Waiting for Server - FAILED kill -0 24589 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24589 found at Fri Jan 8 07:56:24 EST 2016 selfserv_9591 with PID 24589 started at Fri Jan 8 07:56:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10557: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24589 at Fri Jan 8 07:56:25 EST 2016 kill -USR1 24589 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24589 killed at Fri Jan 8 07:56:25 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:56:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:56:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:56:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10558: Waiting for Server - FAILED kill -0 24669 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24669 found at Fri Jan 8 07:56:31 EST 2016 selfserv_9591 with PID 24669 started at Fri Jan 8 07:56:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10559: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 24669 at Fri Jan 8 07:56:32 EST 2016 kill -USR1 24669 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24669 killed at Fri Jan 8 07:56:32 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:56:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:56:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:56:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10560: Waiting for Server - FAILED kill -0 24737 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24737 found at Fri Jan 8 07:56:38 EST 2016 selfserv_9591 with PID 24737 started at Fri Jan 8 07:56:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10561: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 24737 at Fri Jan 8 07:56:39 EST 2016 kill -USR1 24737 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24737 killed at Fri Jan 8 07:56:39 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:56:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:56:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:56:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10562: Waiting for Server - FAILED kill -0 24808 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24808 found at Fri Jan 8 07:56:45 EST 2016 selfserv_9591 with PID 24808 started at Fri Jan 8 07:56:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10563: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 24808 at Fri Jan 8 07:56:46 EST 2016 kill -USR1 24808 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24808 killed at Fri Jan 8 07:56:46 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:56:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:56:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:56:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10564: Waiting for Server - FAILED kill -0 24888 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24888 found at Fri Jan 8 07:56:52 EST 2016 selfserv_9591 with PID 24888 started at Fri Jan 8 07:56:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10565: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 24888 at Fri Jan 8 07:56:53 EST 2016 kill -USR1 24888 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24888 killed at Fri Jan 8 07:56:53 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:56:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:56:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:56:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10566: Waiting for Server - FAILED kill -0 24956 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24956 found at Fri Jan 8 07:56:59 EST 2016 selfserv_9591 with PID 24956 started at Fri Jan 8 07:56:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10567: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 24956 at Fri Jan 8 07:57:00 EST 2016 kill -USR1 24956 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24956 killed at Fri Jan 8 07:57:00 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:57:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:57:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:57:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10568: Waiting for Server - FAILED kill -0 25025 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25025 found at Fri Jan 8 07:57:06 EST 2016 selfserv_9591 with PID 25025 started at Fri Jan 8 07:57:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10569: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 25025 at Fri Jan 8 07:57:07 EST 2016 kill -USR1 25025 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25025 killed at Fri Jan 8 07:57:07 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:57:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:57:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:57:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10570: Waiting for Server - FAILED kill -0 25105 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25105 found at Fri Jan 8 07:57:13 EST 2016 selfserv_9591 with PID 25105 started at Fri Jan 8 07:57:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10571: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 25105 at Fri Jan 8 07:57:13 EST 2016 kill -USR1 25105 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25105 killed at Fri Jan 8 07:57:14 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:57:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:57:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:57:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10572: Waiting for Server - FAILED kill -0 25173 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25173 found at Fri Jan 8 07:57:20 EST 2016 selfserv_9591 with PID 25173 started at Fri Jan 8 07:57:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10573: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 25173 at Fri Jan 8 07:57:20 EST 2016 kill -USR1 25173 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25173 killed at Fri Jan 8 07:57:21 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:57:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:57:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:57:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10574: Waiting for Server - FAILED kill -0 25242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25242 found at Fri Jan 8 07:57:27 EST 2016 selfserv_9591 with PID 25242 started at Fri Jan 8 07:57:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10575: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 25242 at Fri Jan 8 07:57:27 EST 2016 kill -USR1 25242 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25242 killed at Fri Jan 8 07:57:28 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:57:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:57:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:57:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10576: Waiting for Server - FAILED kill -0 25322 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25322 found at Fri Jan 8 07:57:34 EST 2016 selfserv_9591 with PID 25322 started at Fri Jan 8 07:57:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10577: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 25322 at Fri Jan 8 07:57:34 EST 2016 kill -USR1 25322 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25322 killed at Fri Jan 8 07:57:35 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:57:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:57:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:57:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10578: Waiting for Server - FAILED kill -0 25390 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25390 found at Fri Jan 8 07:57:41 EST 2016 selfserv_9591 with PID 25390 started at Fri Jan 8 07:57:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10579: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25390 at Fri Jan 8 07:57:41 EST 2016 kill -USR1 25390 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25390 killed at Fri Jan 8 07:57:42 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:57:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:57:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:57:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10580: Waiting for Server - FAILED kill -0 25461 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25461 found at Fri Jan 8 07:57:48 EST 2016 selfserv_9591 with PID 25461 started at Fri Jan 8 07:57:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10581: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 25461 at Fri Jan 8 07:57:48 EST 2016 kill -USR1 25461 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25461 killed at Fri Jan 8 07:57:48 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:57:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:57:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:57:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10582: Waiting for Server - FAILED kill -0 25541 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25541 found at Fri Jan 8 07:57:54 EST 2016 selfserv_9591 with PID 25541 started at Fri Jan 8 07:57:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10583: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25541 at Fri Jan 8 07:57:55 EST 2016 kill -USR1 25541 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25541 killed at Fri Jan 8 07:57:55 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:57:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:57:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:58:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10584: Waiting for Server - FAILED kill -0 25609 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25609 found at Fri Jan 8 07:58:01 EST 2016 selfserv_9591 with PID 25609 started at Fri Jan 8 07:58:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10585: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25609 at Fri Jan 8 07:58:02 EST 2016 kill -USR1 25609 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25609 killed at Fri Jan 8 07:58:02 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:58:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:58:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:58:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10586: Waiting for Server - FAILED kill -0 25678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25678 found at Fri Jan 8 07:58:08 EST 2016 selfserv_9591 with PID 25678 started at Fri Jan 8 07:58:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10587: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25678 at Fri Jan 8 07:58:09 EST 2016 kill -USR1 25678 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25678 killed at Fri Jan 8 07:58:09 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:58:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:58:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:58:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10588: Waiting for Server - FAILED kill -0 25758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25758 found at Fri Jan 8 07:58:15 EST 2016 selfserv_9591 with PID 25758 started at Fri Jan 8 07:58:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10589: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25758 at Fri Jan 8 07:58:16 EST 2016 kill -USR1 25758 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25758 killed at Fri Jan 8 07:58:16 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:58:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:58:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:58:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10590: Waiting for Server - FAILED kill -0 25826 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25826 found at Fri Jan 8 07:58:22 EST 2016 selfserv_9591 with PID 25826 started at Fri Jan 8 07:58:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10591: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25826 at Fri Jan 8 07:58:23 EST 2016 kill -USR1 25826 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25826 killed at Fri Jan 8 07:58:23 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:58:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:58:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:58:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10592: Waiting for Server - FAILED kill -0 25895 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25895 found at Fri Jan 8 07:58:29 EST 2016 selfserv_9591 with PID 25895 started at Fri Jan 8 07:58:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10593: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 25895 at Fri Jan 8 07:58:30 EST 2016 kill -USR1 25895 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25895 killed at Fri Jan 8 07:58:30 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:58:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:58:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:58:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10594: Waiting for Server - FAILED kill -0 25975 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25975 found at Fri Jan 8 07:58:36 EST 2016 selfserv_9591 with PID 25975 started at Fri Jan 8 07:58:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10595: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 25975 at Fri Jan 8 07:58:36 EST 2016 kill -USR1 25975 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25975 killed at Fri Jan 8 07:58:37 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:58:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:58:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:58:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10596: Waiting for Server - FAILED kill -0 26043 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26043 found at Fri Jan 8 07:58:43 EST 2016 selfserv_9591 with PID 26043 started at Fri Jan 8 07:58:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10597: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26043 at Fri Jan 8 07:58:43 EST 2016 kill -USR1 26043 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26043 killed at Fri Jan 8 07:58:44 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:58:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:58:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:58:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10598: Waiting for Server - FAILED kill -0 26112 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26112 found at Fri Jan 8 07:58:50 EST 2016 selfserv_9591 with PID 26112 started at Fri Jan 8 07:58:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10599: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26112 at Fri Jan 8 07:58:50 EST 2016 kill -USR1 26112 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26112 killed at Fri Jan 8 07:58:51 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:58:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:58:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:58:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10600: Waiting for Server - FAILED kill -0 26192 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26192 found at Fri Jan 8 07:58:57 EST 2016 selfserv_9591 with PID 26192 started at Fri Jan 8 07:58:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10601: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26192 at Fri Jan 8 07:58:57 EST 2016 kill -USR1 26192 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26192 killed at Fri Jan 8 07:58:58 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:58:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:58:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:59:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10602: Waiting for Server - FAILED kill -0 26260 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26260 found at Fri Jan 8 07:59:04 EST 2016 selfserv_9591 with PID 26260 started at Fri Jan 8 07:59:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10603: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26260 at Fri Jan 8 07:59:04 EST 2016 kill -USR1 26260 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26260 killed at Fri Jan 8 07:59:05 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:59:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:59:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:59:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10604: Waiting for Server - FAILED kill -0 26329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26329 found at Fri Jan 8 07:59:11 EST 2016 selfserv_9591 with PID 26329 started at Fri Jan 8 07:59:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10605: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26329 at Fri Jan 8 07:59:11 EST 2016 kill -USR1 26329 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26329 killed at Fri Jan 8 07:59:11 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:59:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:59:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:59:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10606: Waiting for Server - FAILED kill -0 26409 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26409 found at Fri Jan 8 07:59:18 EST 2016 selfserv_9591 with PID 26409 started at Fri Jan 8 07:59:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10607: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26409 at Fri Jan 8 07:59:18 EST 2016 kill -USR1 26409 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26409 killed at Fri Jan 8 07:59:18 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:59:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:59:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:59:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10608: Waiting for Server - FAILED kill -0 26477 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26477 found at Fri Jan 8 07:59:24 EST 2016 selfserv_9591 with PID 26477 started at Fri Jan 8 07:59:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10609: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26477 at Fri Jan 8 07:59:25 EST 2016 kill -USR1 26477 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26477 killed at Fri Jan 8 07:59:25 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 07:59:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:59:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:59:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10610: Waiting for Server - FAILED kill -0 26546 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26546 found at Fri Jan 8 07:59:31 EST 2016 selfserv_9591 with PID 26546 started at Fri Jan 8 07:59:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10611: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26546 at Fri Jan 8 07:59:32 EST 2016 kill -USR1 26546 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26546 killed at Fri Jan 8 07:59:32 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:59:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:59:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:59:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10612: Waiting for Server - FAILED kill -0 26626 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26626 found at Fri Jan 8 07:59:38 EST 2016 selfserv_9591 with PID 26626 started at Fri Jan 8 07:59:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10613: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26626 at Fri Jan 8 07:59:39 EST 2016 kill -USR1 26626 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26626 killed at Fri Jan 8 07:59:39 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:59:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:59:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:59:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10614: Waiting for Server - FAILED kill -0 26694 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26694 found at Fri Jan 8 07:59:45 EST 2016 selfserv_9591 with PID 26694 started at Fri Jan 8 07:59:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10615: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26694 at Fri Jan 8 07:59:46 EST 2016 kill -USR1 26694 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26694 killed at Fri Jan 8 07:59:46 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 07:59:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:59:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:59:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10616: Waiting for Server - FAILED kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26763 found at Fri Jan 8 07:59:52 EST 2016 selfserv_9591 with PID 26763 started at Fri Jan 8 07:59:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10617: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26763 at Fri Jan 8 07:59:53 EST 2016 kill -USR1 26763 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26763 killed at Fri Jan 8 07:59:53 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 07:59:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 07:59:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 07:59:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10618: Waiting for Server - FAILED kill -0 26843 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26843 found at Fri Jan 8 07:59:59 EST 2016 selfserv_9591 with PID 26843 started at Fri Jan 8 07:59:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10619: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26843 at Fri Jan 8 08:00:00 EST 2016 kill -USR1 26843 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26843 killed at Fri Jan 8 08:00:00 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:00:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:00:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:00:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10620: Waiting for Server - FAILED kill -0 26911 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26911 found at Fri Jan 8 08:00:06 EST 2016 selfserv_9591 with PID 26911 started at Fri Jan 8 08:00:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10621: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26911 at Fri Jan 8 08:00:06 EST 2016 kill -USR1 26911 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26911 killed at Fri Jan 8 08:00:07 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:00:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:00:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:00:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10622: Waiting for Server - FAILED kill -0 26980 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26980 found at Fri Jan 8 08:00:13 EST 2016 selfserv_9591 with PID 26980 started at Fri Jan 8 08:00:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10623: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 26980 at Fri Jan 8 08:00:13 EST 2016 kill -USR1 26980 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26980 killed at Fri Jan 8 08:00:14 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:00:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:00:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:00:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10624: Waiting for Server - FAILED kill -0 27060 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27060 found at Fri Jan 8 08:00:20 EST 2016 selfserv_9591 with PID 27060 started at Fri Jan 8 08:00:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10625: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27060 at Fri Jan 8 08:00:20 EST 2016 kill -USR1 27060 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27060 killed at Fri Jan 8 08:00:21 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:00:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:00:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:00:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10626: Waiting for Server - FAILED kill -0 27129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27129 found at Fri Jan 8 08:00:27 EST 2016 selfserv_9591 with PID 27129 started at Fri Jan 8 08:00:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10627: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27129 at Fri Jan 8 08:00:27 EST 2016 kill -USR1 27129 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27129 killed at Fri Jan 8 08:00:28 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:00:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:00:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:00:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10628: Waiting for Server - FAILED kill -0 27198 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27198 found at Fri Jan 8 08:00:34 EST 2016 selfserv_9591 with PID 27198 started at Fri Jan 8 08:00:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10629: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27198 at Fri Jan 8 08:00:34 EST 2016 kill -USR1 27198 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27198 killed at Fri Jan 8 08:00:35 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:00:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:00:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:00:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10630: Waiting for Server - FAILED kill -0 27278 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27278 found at Fri Jan 8 08:00:41 EST 2016 selfserv_9591 with PID 27278 started at Fri Jan 8 08:00:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10631: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27278 at Fri Jan 8 08:00:41 EST 2016 kill -USR1 27278 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27278 killed at Fri Jan 8 08:00:42 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:00:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:00:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:00:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10632: Waiting for Server - FAILED kill -0 27346 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27346 found at Fri Jan 8 08:00:47 EST 2016 selfserv_9591 with PID 27346 started at Fri Jan 8 08:00:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10633: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 27346 at Fri Jan 8 08:00:48 EST 2016 kill -USR1 27346 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27346 killed at Fri Jan 8 08:00:48 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:00:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:00:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:00:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10634: Waiting for Server - FAILED kill -0 27415 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27415 found at Fri Jan 8 08:00:54 EST 2016 selfserv_9591 with PID 27415 started at Fri Jan 8 08:00:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10635: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27415 at Fri Jan 8 08:00:55 EST 2016 kill -USR1 27415 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27415 killed at Fri Jan 8 08:00:55 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:00:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:00:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:01:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10636: Waiting for Server - FAILED kill -0 27497 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27497 found at Fri Jan 8 08:01:01 EST 2016 selfserv_9591 with PID 27497 started at Fri Jan 8 08:01:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10637: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27497 at Fri Jan 8 08:01:02 EST 2016 kill -USR1 27497 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27497 killed at Fri Jan 8 08:01:02 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:01:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:01:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:01:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10638: Waiting for Server - FAILED kill -0 27584 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27584 found at Fri Jan 8 08:01:08 EST 2016 selfserv_9591 with PID 27584 started at Fri Jan 8 08:01:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10639: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27584 at Fri Jan 8 08:01:09 EST 2016 kill -USR1 27584 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27584 killed at Fri Jan 8 08:01:09 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:01:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:01:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:01:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10640: Waiting for Server - FAILED kill -0 27653 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27653 found at Fri Jan 8 08:01:15 EST 2016 selfserv_9591 with PID 27653 started at Fri Jan 8 08:01:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10641: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27653 at Fri Jan 8 08:01:16 EST 2016 kill -USR1 27653 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27653 killed at Fri Jan 8 08:01:16 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:01:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:01:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:01:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10642: Waiting for Server - FAILED kill -0 27733 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27733 found at Fri Jan 8 08:01:22 EST 2016 selfserv_9591 with PID 27733 started at Fri Jan 8 08:01:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10643: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27733 at Fri Jan 8 08:01:23 EST 2016 kill -USR1 27733 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27733 killed at Fri Jan 8 08:01:23 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:01:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:01:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:01:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10644: Waiting for Server - FAILED kill -0 27801 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27801 found at Fri Jan 8 08:01:29 EST 2016 selfserv_9591 with PID 27801 started at Fri Jan 8 08:01:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10645: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27801 at Fri Jan 8 08:01:30 EST 2016 kill -USR1 27801 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27801 killed at Fri Jan 8 08:01:30 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:01:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:01:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:01:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10646: Waiting for Server - FAILED kill -0 27870 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27870 found at Fri Jan 8 08:01:36 EST 2016 selfserv_9591 with PID 27870 started at Fri Jan 8 08:01:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10647: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27870 at Fri Jan 8 08:01:36 EST 2016 kill -USR1 27870 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27870 killed at Fri Jan 8 08:01:37 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:01:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:01:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:01:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10648: Waiting for Server - FAILED kill -0 27950 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27950 found at Fri Jan 8 08:01:43 EST 2016 selfserv_9591 with PID 27950 started at Fri Jan 8 08:01:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10649: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27950 at Fri Jan 8 08:01:43 EST 2016 kill -USR1 27950 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27950 killed at Fri Jan 8 08:01:44 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:01:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:01:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:01:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10650: Waiting for Server - FAILED kill -0 28018 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28018 found at Fri Jan 8 08:01:50 EST 2016 selfserv_9591 with PID 28018 started at Fri Jan 8 08:01:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10651: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28018 at Fri Jan 8 08:01:50 EST 2016 kill -USR1 28018 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28018 killed at Fri Jan 8 08:01:51 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:01:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:01:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:01:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10652: Waiting for Server - FAILED kill -0 28087 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28087 found at Fri Jan 8 08:01:57 EST 2016 selfserv_9591 with PID 28087 started at Fri Jan 8 08:01:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10653: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 28087 at Fri Jan 8 08:01:57 EST 2016 kill -USR1 28087 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28087 killed at Fri Jan 8 08:01:58 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:01:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:01:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:02:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10654: Waiting for Server - FAILED kill -0 28176 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28176 found at Fri Jan 8 08:02:04 EST 2016 selfserv_9591 with PID 28176 started at Fri Jan 8 08:02:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10655: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28176 at Fri Jan 8 08:02:04 EST 2016 kill -USR1 28176 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28176 killed at Fri Jan 8 08:02:05 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:02:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:02:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:02:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10656: Waiting for Server - FAILED kill -0 28244 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28244 found at Fri Jan 8 08:02:11 EST 2016 selfserv_9591 with PID 28244 started at Fri Jan 8 08:02:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10657: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28244 at Fri Jan 8 08:02:11 EST 2016 kill -USR1 28244 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28244 killed at Fri Jan 8 08:02:12 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:02:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:02:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:02:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10658: Waiting for Server - FAILED kill -0 28313 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28313 found at Fri Jan 8 08:02:18 EST 2016 selfserv_9591 with PID 28313 started at Fri Jan 8 08:02:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10659: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28313 at Fri Jan 8 08:02:18 EST 2016 kill -USR1 28313 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28313 killed at Fri Jan 8 08:02:18 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:02:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:02:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:02:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10660: Waiting for Server - FAILED kill -0 28393 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28393 found at Fri Jan 8 08:02:24 EST 2016 selfserv_9591 with PID 28393 started at Fri Jan 8 08:02:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10661: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28393 at Fri Jan 8 08:02:25 EST 2016 kill -USR1 28393 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28393 killed at Fri Jan 8 08:02:25 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:02:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:02:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:02:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10662: Waiting for Server - FAILED kill -0 28461 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28461 found at Fri Jan 8 08:02:31 EST 2016 selfserv_9591 with PID 28461 started at Fri Jan 8 08:02:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10663: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28461 at Fri Jan 8 08:02:32 EST 2016 kill -USR1 28461 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28461 killed at Fri Jan 8 08:02:32 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:02:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:02:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:02:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10664: Waiting for Server - FAILED kill -0 28530 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28530 found at Fri Jan 8 08:02:38 EST 2016 selfserv_9591 with PID 28530 started at Fri Jan 8 08:02:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10665: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28530 at Fri Jan 8 08:02:39 EST 2016 kill -USR1 28530 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28530 killed at Fri Jan 8 08:02:39 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:02:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:02:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:02:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10666: Waiting for Server - FAILED kill -0 28610 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28610 found at Fri Jan 8 08:02:45 EST 2016 selfserv_9591 with PID 28610 started at Fri Jan 8 08:02:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10667: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28610 at Fri Jan 8 08:02:46 EST 2016 kill -USR1 28610 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28610 killed at Fri Jan 8 08:02:46 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:02:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:02:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:02:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10668: Waiting for Server - FAILED kill -0 28678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28678 found at Fri Jan 8 08:02:52 EST 2016 selfserv_9591 with PID 28678 started at Fri Jan 8 08:02:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10669: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28678 at Fri Jan 8 08:02:53 EST 2016 kill -USR1 28678 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28678 killed at Fri Jan 8 08:02:53 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:02:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:02:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:02:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10670: Waiting for Server - FAILED kill -0 28747 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28747 found at Fri Jan 8 08:02:59 EST 2016 selfserv_9591 with PID 28747 started at Fri Jan 8 08:02:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10671: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28747 at Fri Jan 8 08:03:00 EST 2016 kill -USR1 28747 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28747 killed at Fri Jan 8 08:03:00 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:03:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:03:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:03:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10672: Waiting for Server - FAILED kill -0 28827 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28827 found at Fri Jan 8 08:03:06 EST 2016 selfserv_9591 with PID 28827 started at Fri Jan 8 08:03:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10673: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28827 at Fri Jan 8 08:03:07 EST 2016 kill -USR1 28827 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28827 killed at Fri Jan 8 08:03:07 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:03:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:03:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:03:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10674: Waiting for Server - FAILED kill -0 28895 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28895 found at Fri Jan 8 08:03:13 EST 2016 selfserv_9591 with PID 28895 started at Fri Jan 8 08:03:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10675: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 28895 at Fri Jan 8 08:03:13 EST 2016 kill -USR1 28895 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28895 killed at Fri Jan 8 08:03:14 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:03:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:03:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:03:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10676: Waiting for Server - FAILED kill -0 28964 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28964 found at Fri Jan 8 08:03:20 EST 2016 selfserv_9591 with PID 28964 started at Fri Jan 8 08:03:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10677: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 28964 at Fri Jan 8 08:03:20 EST 2016 kill -USR1 28964 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28964 killed at Fri Jan 8 08:03:21 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:03:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:03:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:03:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10678: Waiting for Server - FAILED kill -0 29044 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29044 found at Fri Jan 8 08:03:27 EST 2016 selfserv_9591 with PID 29044 started at Fri Jan 8 08:03:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10679: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29044 at Fri Jan 8 08:03:27 EST 2016 kill -USR1 29044 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29044 killed at Fri Jan 8 08:03:28 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:03:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:03:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:03:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10680: Waiting for Server - FAILED kill -0 29112 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29112 found at Fri Jan 8 08:03:34 EST 2016 selfserv_9591 with PID 29112 started at Fri Jan 8 08:03:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10681: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29112 at Fri Jan 8 08:03:34 EST 2016 kill -USR1 29112 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29112 killed at Fri Jan 8 08:03:35 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:03:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:03:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:03:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10682: Waiting for Server - FAILED kill -0 29181 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29181 found at Fri Jan 8 08:03:41 EST 2016 selfserv_9591 with PID 29181 started at Fri Jan 8 08:03:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10683: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29181 at Fri Jan 8 08:03:41 EST 2016 kill -USR1 29181 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29181 killed at Fri Jan 8 08:03:42 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:03:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:03:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:03:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10684: Waiting for Server - FAILED kill -0 29261 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29261 found at Fri Jan 8 08:03:48 EST 2016 selfserv_9591 with PID 29261 started at Fri Jan 8 08:03:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10685: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 29261 at Fri Jan 8 08:03:48 EST 2016 kill -USR1 29261 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29261 killed at Fri Jan 8 08:03:48 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:03:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:03:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:03:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10686: Waiting for Server - FAILED kill -0 29329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29329 found at Fri Jan 8 08:03:54 EST 2016 selfserv_9591 with PID 29329 started at Fri Jan 8 08:03:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10687: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29329 at Fri Jan 8 08:03:55 EST 2016 kill -USR1 29329 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29329 killed at Fri Jan 8 08:03:55 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:03:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:03:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:04:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10688: Waiting for Server - FAILED kill -0 29398 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29398 found at Fri Jan 8 08:04:01 EST 2016 selfserv_9591 with PID 29398 started at Fri Jan 8 08:04:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10689: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 29398 at Fri Jan 8 08:04:02 EST 2016 kill -USR1 29398 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29398 killed at Fri Jan 8 08:04:02 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:04:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:04:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:04:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10690: Waiting for Server - FAILED kill -0 29478 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29478 found at Fri Jan 8 08:04:08 EST 2016 selfserv_9591 with PID 29478 started at Fri Jan 8 08:04:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10691: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 29478 at Fri Jan 8 08:04:09 EST 2016 kill -USR1 29478 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29478 killed at Fri Jan 8 08:04:09 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:04:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:04:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:04:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10692: Waiting for Server - FAILED kill -0 29546 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29546 found at Fri Jan 8 08:04:15 EST 2016 selfserv_9591 with PID 29546 started at Fri Jan 8 08:04:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10693: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 29546 at Fri Jan 8 08:04:16 EST 2016 kill -USR1 29546 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29546 killed at Fri Jan 8 08:04:16 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:04:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:04:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:04:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10694: Waiting for Server - FAILED kill -0 29615 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29615 found at Fri Jan 8 08:04:22 EST 2016 selfserv_9591 with PID 29615 started at Fri Jan 8 08:04:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10695: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 29615 at Fri Jan 8 08:04:23 EST 2016 kill -USR1 29615 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29615 killed at Fri Jan 8 08:04:23 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:04:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:04:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:04:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10696: Waiting for Server - FAILED kill -0 29695 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29695 found at Fri Jan 8 08:04:29 EST 2016 selfserv_9591 with PID 29695 started at Fri Jan 8 08:04:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10697: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 29695 at Fri Jan 8 08:04:30 EST 2016 kill -USR1 29695 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29695 killed at Fri Jan 8 08:04:30 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:04:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:04:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:04:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10698: Waiting for Server - FAILED kill -0 29763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29763 found at Fri Jan 8 08:04:36 EST 2016 selfserv_9591 with PID 29763 started at Fri Jan 8 08:04:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10699: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29763 at Fri Jan 8 08:04:36 EST 2016 kill -USR1 29763 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29763 killed at Fri Jan 8 08:04:37 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:04:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:04:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:04:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10700: Waiting for Server - FAILED kill -0 29832 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29832 found at Fri Jan 8 08:04:43 EST 2016 selfserv_9591 with PID 29832 started at Fri Jan 8 08:04:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10701: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 29832 at Fri Jan 8 08:04:43 EST 2016 kill -USR1 29832 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29832 killed at Fri Jan 8 08:04:44 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:04:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:04:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:04:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10702: Waiting for Server - FAILED kill -0 29912 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29912 found at Fri Jan 8 08:04:50 EST 2016 selfserv_9591 with PID 29912 started at Fri Jan 8 08:04:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10703: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29912 at Fri Jan 8 08:04:50 EST 2016 kill -USR1 29912 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29912 killed at Fri Jan 8 08:04:51 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:04:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:04:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:04:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10704: Waiting for Server - FAILED kill -0 29980 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29980 found at Fri Jan 8 08:04:57 EST 2016 selfserv_9591 with PID 29980 started at Fri Jan 8 08:04:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10705: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 29980 at Fri Jan 8 08:04:57 EST 2016 kill -USR1 29980 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29980 killed at Fri Jan 8 08:04:58 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:04:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:04:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:05:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10706: Waiting for Server - FAILED kill -0 30049 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30049 found at Fri Jan 8 08:05:04 EST 2016 selfserv_9591 with PID 30049 started at Fri Jan 8 08:05:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10707: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30049 at Fri Jan 8 08:05:04 EST 2016 kill -USR1 30049 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30049 killed at Fri Jan 8 08:05:05 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:05:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:05:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:05:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10708: Waiting for Server - FAILED kill -0 30129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30129 found at Fri Jan 8 08:05:11 EST 2016 selfserv_9591 with PID 30129 started at Fri Jan 8 08:05:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10709: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30129 at Fri Jan 8 08:05:11 EST 2016 kill -USR1 30129 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30129 killed at Fri Jan 8 08:05:12 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:05:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:05:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:05:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10710: Waiting for Server - FAILED kill -0 30198 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30198 found at Fri Jan 8 08:05:18 EST 2016 selfserv_9591 with PID 30198 started at Fri Jan 8 08:05:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10711: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30198 at Fri Jan 8 08:05:18 EST 2016 kill -USR1 30198 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30198 killed at Fri Jan 8 08:05:19 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:05:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:05:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:05:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10712: Waiting for Server - FAILED kill -0 30266 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30266 found at Fri Jan 8 08:05:24 EST 2016 selfserv_9591 with PID 30266 started at Fri Jan 8 08:05:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10713: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30266 at Fri Jan 8 08:05:25 EST 2016 kill -USR1 30266 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30266 killed at Fri Jan 8 08:05:25 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:05:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:05:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:05:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10714: Waiting for Server - FAILED kill -0 30346 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30346 found at Fri Jan 8 08:05:31 EST 2016 selfserv_9591 with PID 30346 started at Fri Jan 8 08:05:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10715: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30346 at Fri Jan 8 08:05:32 EST 2016 kill -USR1 30346 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30346 killed at Fri Jan 8 08:05:32 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:05:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:05:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:05:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10716: Waiting for Server - FAILED kill -0 30415 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30415 found at Fri Jan 8 08:05:38 EST 2016 selfserv_9591 with PID 30415 started at Fri Jan 8 08:05:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10717: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30415 at Fri Jan 8 08:05:39 EST 2016 kill -USR1 30415 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30415 killed at Fri Jan 8 08:05:39 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:05:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:05:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:05:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10718: Waiting for Server - FAILED kill -0 30484 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30484 found at Fri Jan 8 08:05:45 EST 2016 selfserv_9591 with PID 30484 started at Fri Jan 8 08:05:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10719: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30484 at Fri Jan 8 08:05:46 EST 2016 kill -USR1 30484 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30484 killed at Fri Jan 8 08:05:46 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:05:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:05:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:05:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10720: Waiting for Server - FAILED kill -0 30564 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30564 found at Fri Jan 8 08:05:52 EST 2016 selfserv_9591 with PID 30564 started at Fri Jan 8 08:05:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10721: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30564 at Fri Jan 8 08:05:53 EST 2016 kill -USR1 30564 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30564 killed at Fri Jan 8 08:05:53 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:05:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:05:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:05:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10722: Waiting for Server - FAILED kill -0 30633 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30633 found at Fri Jan 8 08:05:59 EST 2016 selfserv_9591 with PID 30633 started at Fri Jan 8 08:05:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10723: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30633 at Fri Jan 8 08:06:00 EST 2016 kill -USR1 30633 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30633 killed at Fri Jan 8 08:06:00 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:06:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:06:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:06:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10724: Waiting for Server - FAILED kill -0 30701 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30701 found at Fri Jan 8 08:06:06 EST 2016 selfserv_9591 with PID 30701 started at Fri Jan 8 08:06:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10725: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30701 at Fri Jan 8 08:06:07 EST 2016 kill -USR1 30701 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30701 killed at Fri Jan 8 08:06:07 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:06:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:06:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:06:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10726: Waiting for Server - FAILED kill -0 30781 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30781 found at Fri Jan 8 08:06:13 EST 2016 selfserv_9591 with PID 30781 started at Fri Jan 8 08:06:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10727: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30781 at Fri Jan 8 08:06:13 EST 2016 kill -USR1 30781 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30781 killed at Fri Jan 8 08:06:14 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:06:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:06:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:06:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10728: Waiting for Server - FAILED kill -0 30850 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30850 found at Fri Jan 8 08:06:20 EST 2016 selfserv_9591 with PID 30850 started at Fri Jan 8 08:06:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10729: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30850 at Fri Jan 8 08:06:20 EST 2016 kill -USR1 30850 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30850 killed at Fri Jan 8 08:06:21 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:06:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:06:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:06:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10730: Waiting for Server - FAILED kill -0 30918 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30918 found at Fri Jan 8 08:06:27 EST 2016 selfserv_9591 with PID 30918 started at Fri Jan 8 08:06:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10731: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 30918 at Fri Jan 8 08:06:27 EST 2016 kill -USR1 30918 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30918 killed at Fri Jan 8 08:06:28 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:06:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:06:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:06:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10732: Waiting for Server - FAILED kill -0 30998 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30998 found at Fri Jan 8 08:06:34 EST 2016 selfserv_9591 with PID 30998 started at Fri Jan 8 08:06:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10733: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30998 at Fri Jan 8 08:06:34 EST 2016 kill -USR1 30998 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30998 killed at Fri Jan 8 08:06:35 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:06:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:06:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:06:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10734: Waiting for Server - FAILED kill -0 31068 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31068 found at Fri Jan 8 08:06:41 EST 2016 selfserv_9591 with PID 31068 started at Fri Jan 8 08:06:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10735: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31068 at Fri Jan 8 08:06:41 EST 2016 kill -USR1 31068 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31068 killed at Fri Jan 8 08:06:42 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:06:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:06:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:06:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10736: Waiting for Server - FAILED kill -0 31137 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31137 found at Fri Jan 8 08:06:48 EST 2016 selfserv_9591 with PID 31137 started at Fri Jan 8 08:06:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10737: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31137 at Fri Jan 8 08:06:48 EST 2016 kill -USR1 31137 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31137 killed at Fri Jan 8 08:06:49 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:06:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:06:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:06:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10738: Waiting for Server - FAILED kill -0 31217 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31217 found at Fri Jan 8 08:06:55 EST 2016 selfserv_9591 with PID 31217 started at Fri Jan 8 08:06:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10739: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31217 at Fri Jan 8 08:06:55 EST 2016 kill -USR1 31217 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31217 killed at Fri Jan 8 08:06:55 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:06:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:06:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:07:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10740: Waiting for Server - FAILED kill -0 31286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31286 found at Fri Jan 8 08:07:01 EST 2016 selfserv_9591 with PID 31286 started at Fri Jan 8 08:07:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10741: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31286 at Fri Jan 8 08:07:02 EST 2016 kill -USR1 31286 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31286 killed at Fri Jan 8 08:07:02 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:07:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:07:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:07:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10742: Waiting for Server - FAILED kill -0 31354 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31354 found at Fri Jan 8 08:07:08 EST 2016 selfserv_9591 with PID 31354 started at Fri Jan 8 08:07:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10743: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31354 at Fri Jan 8 08:07:09 EST 2016 kill -USR1 31354 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31354 killed at Fri Jan 8 08:07:09 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:07:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:07:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:07:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10744: Waiting for Server - FAILED kill -0 31434 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31434 found at Fri Jan 8 08:07:15 EST 2016 selfserv_9591 with PID 31434 started at Fri Jan 8 08:07:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10745: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31434 at Fri Jan 8 08:07:16 EST 2016 kill -USR1 31434 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31434 killed at Fri Jan 8 08:07:16 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:07:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:07:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:07:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10746: Waiting for Server - FAILED kill -0 31503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31503 found at Fri Jan 8 08:07:22 EST 2016 selfserv_9591 with PID 31503 started at Fri Jan 8 08:07:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10747: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31503 at Fri Jan 8 08:07:23 EST 2016 kill -USR1 31503 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31503 killed at Fri Jan 8 08:07:23 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:07:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:07:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:07:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10748: Waiting for Server - FAILED kill -0 31571 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31571 found at Fri Jan 8 08:07:29 EST 2016 selfserv_9591 with PID 31571 started at Fri Jan 8 08:07:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10749: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31571 at Fri Jan 8 08:07:30 EST 2016 kill -USR1 31571 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31571 killed at Fri Jan 8 08:07:30 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:07:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:07:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:07:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10750: Waiting for Server - FAILED kill -0 31651 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31651 found at Fri Jan 8 08:07:36 EST 2016 selfserv_9591 with PID 31651 started at Fri Jan 8 08:07:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10751: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31651 at Fri Jan 8 08:07:37 EST 2016 kill -USR1 31651 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31651 killed at Fri Jan 8 08:07:37 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:07:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:07:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:07:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10752: Waiting for Server - FAILED kill -0 31723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31723 found at Fri Jan 8 08:07:43 EST 2016 selfserv_9591 with PID 31723 started at Fri Jan 8 08:07:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10753: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31723 at Fri Jan 8 08:07:44 EST 2016 kill -USR1 31723 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31723 killed at Fri Jan 8 08:07:44 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:07:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:07:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:07:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10754: Waiting for Server - FAILED kill -0 31791 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31791 found at Fri Jan 8 08:07:50 EST 2016 selfserv_9591 with PID 31791 started at Fri Jan 8 08:07:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10755: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31791 at Fri Jan 8 08:07:50 EST 2016 kill -USR1 31791 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31791 killed at Fri Jan 8 08:07:51 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:07:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:07:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:07:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10756: Waiting for Server - FAILED kill -0 31871 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31871 found at Fri Jan 8 08:07:57 EST 2016 selfserv_9591 with PID 31871 started at Fri Jan 8 08:07:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10757: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 31871 at Fri Jan 8 08:07:57 EST 2016 kill -USR1 31871 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31871 killed at Fri Jan 8 08:07:58 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:07:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:07:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:08:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10758: Waiting for Server - FAILED kill -0 31940 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 31940 found at Fri Jan 8 08:08:04 EST 2016 selfserv_9591 with PID 31940 started at Fri Jan 8 08:08:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10759: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 31940 at Fri Jan 8 08:08:04 EST 2016 kill -USR1 31940 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 31940 killed at Fri Jan 8 08:08:05 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:08:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:08:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:08:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10760: Waiting for Server - FAILED kill -0 32011 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32011 found at Fri Jan 8 08:08:11 EST 2016 selfserv_9591 with PID 32011 started at Fri Jan 8 08:08:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10761: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32011 at Fri Jan 8 08:08:11 EST 2016 kill -USR1 32011 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32011 killed at Fri Jan 8 08:08:12 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:08:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:08:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:08:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10762: Waiting for Server - FAILED kill -0 32091 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32091 found at Fri Jan 8 08:08:18 EST 2016 selfserv_9591 with PID 32091 started at Fri Jan 8 08:08:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10763: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32091 at Fri Jan 8 08:08:18 EST 2016 kill -USR1 32091 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32091 killed at Fri Jan 8 08:08:19 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:08:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:08:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:08:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10764: Waiting for Server - FAILED kill -0 32161 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32161 found at Fri Jan 8 08:08:25 EST 2016 selfserv_9591 with PID 32161 started at Fri Jan 8 08:08:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10765: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32161 at Fri Jan 8 08:08:25 EST 2016 kill -USR1 32161 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32161 killed at Fri Jan 8 08:08:25 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:08:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:08:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:08:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10766: Waiting for Server - FAILED kill -0 32229 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32229 found at Fri Jan 8 08:08:31 EST 2016 selfserv_9591 with PID 32229 started at Fri Jan 8 08:08:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10767: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32229 at Fri Jan 8 08:08:32 EST 2016 kill -USR1 32229 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32229 killed at Fri Jan 8 08:08:32 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:08:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:08:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:08:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10768: Waiting for Server - FAILED kill -0 32309 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32309 found at Fri Jan 8 08:08:38 EST 2016 selfserv_9591 with PID 32309 started at Fri Jan 8 08:08:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10769: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32309 at Fri Jan 8 08:08:39 EST 2016 kill -USR1 32309 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32309 killed at Fri Jan 8 08:08:39 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:08:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:08:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:08:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10770: Waiting for Server - FAILED kill -0 32378 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32378 found at Fri Jan 8 08:08:45 EST 2016 selfserv_9591 with PID 32378 started at Fri Jan 8 08:08:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10771: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 32378 at Fri Jan 8 08:08:46 EST 2016 kill -USR1 32378 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32378 killed at Fri Jan 8 08:08:46 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:08:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:08:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:08:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10772: Waiting for Server - FAILED kill -0 32448 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32448 found at Fri Jan 8 08:08:52 EST 2016 selfserv_9591 with PID 32448 started at Fri Jan 8 08:08:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10773: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32448 at Fri Jan 8 08:08:53 EST 2016 kill -USR1 32448 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32448 killed at Fri Jan 8 08:08:53 EST 2016 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/authin.tl.tmp 0 selfserv_9591 starting at Fri Jan 8 08:08:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:08:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:08:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10774: Waiting for Server - FAILED kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:08:59 EST 2016 selfserv_9591 with PID 32527 started at Fri Jan 8 08:08:59 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:00 EST 2016 ssl.sh: #10775: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:00 EST 2016 ssl.sh: #10776: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:01 EST 2016 ssl.sh: #10777: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:01 EST 2016 ssl.sh: #10778: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:02 EST 2016 ssl.sh: #10779: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:02 EST 2016 ssl.sh: #10780: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:03 EST 2016 ssl.sh: #10781: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:04 EST 2016 ssl.sh: #10782: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:04 EST 2016 ssl.sh: #10783: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:05 EST 2016 ssl.sh: #10784: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:05 EST 2016 ssl.sh: #10785: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:06 EST 2016 ssl.sh: #10786: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:06 EST 2016 ssl.sh: #10787: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:07 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10788: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:08 EST 2016 ssl.sh: #10789: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:08 EST 2016 ssl.sh: #10790: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:09 EST 2016 ssl.sh: #10791: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:09 EST 2016 ssl.sh: #10792: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:10 EST 2016 ssl.sh: #10793: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:10 EST 2016 ssl.sh: #10794: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:11 EST 2016 ssl.sh: #10795: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:11 EST 2016 ssl.sh: #10796: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:12 EST 2016 ssl.sh: #10797: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:13 EST 2016 ssl.sh: #10798: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:13 EST 2016 ssl.sh: #10799: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:14 EST 2016 ssl.sh: #10800: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:14 EST 2016 ssl.sh: #10801: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:15 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10802: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:15 EST 2016 ssl.sh: #10803: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:16 EST 2016 ssl.sh: #10804: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:16 EST 2016 ssl.sh: #10805: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:17 EST 2016 ssl.sh: #10806: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:18 EST 2016 ssl.sh: #10807: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:18 EST 2016 ssl.sh: #10808: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:19 EST 2016 ssl.sh: #10809: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:19 EST 2016 ssl.sh: #10810: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:20 EST 2016 ssl.sh: #10811: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:20 EST 2016 ssl.sh: #10812: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:21 EST 2016 ssl.sh: #10813: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:22 EST 2016 ssl.sh: #10814: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32527 found at Fri Jan 8 08:09:22 EST 2016 ssl.sh: #10815: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 32527 at Fri Jan 8 08:09:22 EST 2016 kill -USR1 32527 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32527 killed at Fri Jan 8 08:09:23 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:09:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:09:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:09:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10816: Waiting for Server - FAILED kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:29 EST 2016 selfserv_9591 with PID 1542 started at Fri Jan 8 08:09:29 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:29 EST 2016 ssl.sh: #10817: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:30 EST 2016 ssl.sh: #10818: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:30 EST 2016 ssl.sh: #10819: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:31 EST 2016 ssl.sh: #10820: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:31 EST 2016 ssl.sh: #10821: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:32 EST 2016 ssl.sh: #10822: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:32 EST 2016 ssl.sh: #10823: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:33 EST 2016 ssl.sh: #10824: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:34 EST 2016 ssl.sh: #10825: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:34 EST 2016 ssl.sh: #10826: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:35 EST 2016 ssl.sh: #10827: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:35 EST 2016 ssl.sh: #10828: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:36 EST 2016 ssl.sh: #10829: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:36 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10830: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:37 EST 2016 ssl.sh: #10831: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:38 EST 2016 ssl.sh: #10832: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:38 EST 2016 ssl.sh: #10833: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:39 EST 2016 ssl.sh: #10834: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:39 EST 2016 ssl.sh: #10835: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:40 EST 2016 ssl.sh: #10836: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:40 EST 2016 ssl.sh: #10837: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:41 EST 2016 ssl.sh: #10838: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:41 EST 2016 ssl.sh: #10839: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:42 EST 2016 ssl.sh: #10840: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:43 EST 2016 ssl.sh: #10841: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:43 EST 2016 ssl.sh: #10842: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:44 EST 2016 ssl.sh: #10843: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:44 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10844: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:45 EST 2016 ssl.sh: #10845: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:45 EST 2016 ssl.sh: #10846: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:46 EST 2016 ssl.sh: #10847: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:46 EST 2016 ssl.sh: #10848: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:47 EST 2016 ssl.sh: #10849: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:48 EST 2016 ssl.sh: #10850: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:48 EST 2016 ssl.sh: #10851: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:49 EST 2016 ssl.sh: #10852: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:49 EST 2016 ssl.sh: #10853: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:50 EST 2016 ssl.sh: #10854: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:50 EST 2016 ssl.sh: #10855: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:51 EST 2016 ssl.sh: #10856: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1542 found at Fri Jan 8 08:09:52 EST 2016 ssl.sh: #10857: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 1542 at Fri Jan 8 08:09:52 EST 2016 kill -USR1 1542 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1542 killed at Fri Jan 8 08:09:52 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:09:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:09:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:09:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10858: Waiting for Server - FAILED kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:09:58 EST 2016 selfserv_9591 with PID 3000 started at Fri Jan 8 08:09:58 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:09:59 EST 2016 ssl.sh: #10859: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:09:59 EST 2016 ssl.sh: #10860: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:00 EST 2016 ssl.sh: #10861: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:00 EST 2016 ssl.sh: #10862: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:01 EST 2016 ssl.sh: #10863: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:01 EST 2016 ssl.sh: #10864: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:02 EST 2016 ssl.sh: #10865: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:03 EST 2016 ssl.sh: #10866: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:03 EST 2016 ssl.sh: #10867: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:04 EST 2016 ssl.sh: #10868: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:04 EST 2016 ssl.sh: #10869: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:05 EST 2016 ssl.sh: #10870: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:05 EST 2016 ssl.sh: #10871: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:06 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10872: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:07 EST 2016 ssl.sh: #10873: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:07 EST 2016 ssl.sh: #10874: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:08 EST 2016 ssl.sh: #10875: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:08 EST 2016 ssl.sh: #10876: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:09 EST 2016 ssl.sh: #10877: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:09 EST 2016 ssl.sh: #10878: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:10 EST 2016 ssl.sh: #10879: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:10 EST 2016 ssl.sh: #10880: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:11 EST 2016 ssl.sh: #10881: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:12 EST 2016 ssl.sh: #10882: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:12 EST 2016 ssl.sh: #10883: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:13 EST 2016 ssl.sh: #10884: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:13 EST 2016 ssl.sh: #10885: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:14 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10886: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:14 EST 2016 ssl.sh: #10887: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:15 EST 2016 ssl.sh: #10888: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:15 EST 2016 ssl.sh: #10889: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:16 EST 2016 ssl.sh: #10890: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:17 EST 2016 ssl.sh: #10891: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:17 EST 2016 ssl.sh: #10892: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:18 EST 2016 ssl.sh: #10893: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:18 EST 2016 ssl.sh: #10894: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:19 EST 2016 ssl.sh: #10895: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:19 EST 2016 ssl.sh: #10896: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:20 EST 2016 ssl.sh: #10897: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:21 EST 2016 ssl.sh: #10898: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 3000 found at Fri Jan 8 08:10:21 EST 2016 ssl.sh: #10899: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 3000 at Fri Jan 8 08:10:21 EST 2016 kill -USR1 3000 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 3000 killed at Fri Jan 8 08:10:22 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:10:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:10:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:10:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10900: Waiting for Server - FAILED kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:28 EST 2016 selfserv_9591 with PID 4449 started at Fri Jan 8 08:10:28 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:28 EST 2016 ssl.sh: #10901: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:29 EST 2016 ssl.sh: #10902: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:29 EST 2016 ssl.sh: #10903: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:30 EST 2016 ssl.sh: #10904: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:30 EST 2016 ssl.sh: #10905: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:31 EST 2016 ssl.sh: #10906: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:31 EST 2016 ssl.sh: #10907: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:32 EST 2016 ssl.sh: #10908: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:33 EST 2016 ssl.sh: #10909: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:33 EST 2016 ssl.sh: #10910: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:34 EST 2016 ssl.sh: #10911: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:34 EST 2016 ssl.sh: #10912: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:35 EST 2016 ssl.sh: #10913: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:35 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10914: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:36 EST 2016 ssl.sh: #10915: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:37 EST 2016 ssl.sh: #10916: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:37 EST 2016 ssl.sh: #10917: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:38 EST 2016 ssl.sh: #10918: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:38 EST 2016 ssl.sh: #10919: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:39 EST 2016 ssl.sh: #10920: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:39 EST 2016 ssl.sh: #10921: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:40 EST 2016 ssl.sh: #10922: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:40 EST 2016 ssl.sh: #10923: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:41 EST 2016 ssl.sh: #10924: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:42 EST 2016 ssl.sh: #10925: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:42 EST 2016 ssl.sh: #10926: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:43 EST 2016 ssl.sh: #10927: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:43 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10928: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:44 EST 2016 ssl.sh: #10929: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:44 EST 2016 ssl.sh: #10930: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:45 EST 2016 ssl.sh: #10931: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:46 EST 2016 ssl.sh: #10932: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:46 EST 2016 ssl.sh: #10933: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:47 EST 2016 ssl.sh: #10934: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:47 EST 2016 ssl.sh: #10935: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:48 EST 2016 ssl.sh: #10936: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:48 EST 2016 ssl.sh: #10937: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:49 EST 2016 ssl.sh: #10938: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:49 EST 2016 ssl.sh: #10939: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:50 EST 2016 ssl.sh: #10940: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4449 found at Fri Jan 8 08:10:51 EST 2016 ssl.sh: #10941: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 4449 at Fri Jan 8 08:10:51 EST 2016 kill -USR1 4449 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4449 killed at Fri Jan 8 08:10:51 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:10:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:10:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:10:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10942: Waiting for Server - FAILED kill -0 5892 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5892 found at Fri Jan 8 08:10:57 EST 2016 selfserv_9591 with PID 5892 started at Fri Jan 8 08:10:57 EST 2016 trying to kill selfserv_9591 with PID 5892 at Fri Jan 8 08:10:57 EST 2016 kill -USR1 5892 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5892 killed at Fri Jan 8 08:10:58 EST 2016 selfserv_9591 starting at Fri Jan 8 08:10:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:10:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:11:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10943: Waiting for Server - FAILED kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:04 EST 2016 selfserv_9591 with PID 5946 started at Fri Jan 8 08:11:04 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:04 EST 2016 ssl.sh: #10944: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:05 EST 2016 ssl.sh: #10945: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:05 EST 2016 ssl.sh: #10946: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:06 EST 2016 ssl.sh: #10947: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:06 EST 2016 ssl.sh: #10948: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:07 EST 2016 ssl.sh: #10949: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:07 EST 2016 ssl.sh: #10950: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:08 EST 2016 ssl.sh: #10951: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:08 EST 2016 ssl.sh: #10952: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:09 EST 2016 ssl.sh: #10953: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:10 EST 2016 ssl.sh: #10954: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:10 EST 2016 ssl.sh: #10955: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:11 EST 2016 ssl.sh: #10956: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:11 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10957: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:12 EST 2016 ssl.sh: #10958: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:12 EST 2016 ssl.sh: #10959: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:13 EST 2016 ssl.sh: #10960: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:13 EST 2016 ssl.sh: #10961: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:14 EST 2016 ssl.sh: #10962: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:15 EST 2016 ssl.sh: #10963: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:15 EST 2016 ssl.sh: #10964: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:16 EST 2016 ssl.sh: #10965: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:16 EST 2016 ssl.sh: #10966: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:17 EST 2016 ssl.sh: #10967: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:17 EST 2016 ssl.sh: #10968: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:18 EST 2016 ssl.sh: #10969: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:19 EST 2016 ssl.sh: #10970: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:19 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10971: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:20 EST 2016 ssl.sh: #10972: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:20 EST 2016 ssl.sh: #10973: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:21 EST 2016 ssl.sh: #10974: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:21 EST 2016 ssl.sh: #10975: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:22 EST 2016 ssl.sh: #10976: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:22 EST 2016 ssl.sh: #10977: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:23 EST 2016 ssl.sh: #10978: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:24 EST 2016 ssl.sh: #10979: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:24 EST 2016 ssl.sh: #10980: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:25 EST 2016 ssl.sh: #10981: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:25 EST 2016 ssl.sh: #10982: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:26 EST 2016 ssl.sh: #10983: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5946 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5946 found at Fri Jan 8 08:11:27 EST 2016 ssl.sh: #10984: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5946 at Fri Jan 8 08:11:27 EST 2016 kill -USR1 5946 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5946 killed at Fri Jan 8 08:11:27 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:11:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:11:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:11:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10985: Waiting for Server - FAILED kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:33 EST 2016 selfserv_9591 with PID 7382 started at Fri Jan 8 08:11:33 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:34 EST 2016 ssl.sh: #10986: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:34 EST 2016 ssl.sh: #10987: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:35 EST 2016 ssl.sh: #10988: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:35 EST 2016 ssl.sh: #10989: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:36 EST 2016 ssl.sh: #10990: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:36 EST 2016 ssl.sh: #10991: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:37 EST 2016 ssl.sh: #10992: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:37 EST 2016 ssl.sh: #10993: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:38 EST 2016 ssl.sh: #10994: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:39 EST 2016 ssl.sh: #10995: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:39 EST 2016 ssl.sh: #10996: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:40 EST 2016 ssl.sh: #10997: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:40 EST 2016 ssl.sh: #10998: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:41 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10999: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:41 EST 2016 ssl.sh: #11000: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:42 EST 2016 ssl.sh: #11001: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:42 EST 2016 ssl.sh: #11002: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:43 EST 2016 ssl.sh: #11003: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:44 EST 2016 ssl.sh: #11004: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:44 EST 2016 ssl.sh: #11005: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:45 EST 2016 ssl.sh: #11006: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:45 EST 2016 ssl.sh: #11007: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:46 EST 2016 ssl.sh: #11008: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:46 EST 2016 ssl.sh: #11009: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:47 EST 2016 ssl.sh: #11010: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:48 EST 2016 ssl.sh: #11011: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:48 EST 2016 ssl.sh: #11012: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:49 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11013: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:49 EST 2016 ssl.sh: #11014: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:50 EST 2016 ssl.sh: #11015: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:50 EST 2016 ssl.sh: #11016: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:51 EST 2016 ssl.sh: #11017: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:51 EST 2016 ssl.sh: #11018: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:52 EST 2016 ssl.sh: #11019: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:53 EST 2016 ssl.sh: #11020: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:53 EST 2016 ssl.sh: #11021: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:54 EST 2016 ssl.sh: #11022: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:54 EST 2016 ssl.sh: #11023: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:55 EST 2016 ssl.sh: #11024: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:55 EST 2016 ssl.sh: #11025: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7382 found at Fri Jan 8 08:11:56 EST 2016 ssl.sh: #11026: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 7382 at Fri Jan 8 08:11:56 EST 2016 kill -USR1 7382 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7382 killed at Fri Jan 8 08:11:56 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:11:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:11:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:12:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11027: Waiting for Server - FAILED kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:02 EST 2016 selfserv_9591 with PID 8819 started at Fri Jan 8 08:12:02 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:03 EST 2016 ssl.sh: #11028: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:04 EST 2016 ssl.sh: #11029: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:04 EST 2016 ssl.sh: #11030: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:05 EST 2016 ssl.sh: #11031: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:05 EST 2016 ssl.sh: #11032: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:06 EST 2016 ssl.sh: #11033: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:06 EST 2016 ssl.sh: #11034: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:07 EST 2016 ssl.sh: #11035: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:07 EST 2016 ssl.sh: #11036: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:08 EST 2016 ssl.sh: #11037: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:09 EST 2016 ssl.sh: #11038: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:09 EST 2016 ssl.sh: #11039: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:10 EST 2016 ssl.sh: #11040: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:10 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11041: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:11 EST 2016 ssl.sh: #11042: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:11 EST 2016 ssl.sh: #11043: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:12 EST 2016 ssl.sh: #11044: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:12 EST 2016 ssl.sh: #11045: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:13 EST 2016 ssl.sh: #11046: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:14 EST 2016 ssl.sh: #11047: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:14 EST 2016 ssl.sh: #11048: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:15 EST 2016 ssl.sh: #11049: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:15 EST 2016 ssl.sh: #11050: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:16 EST 2016 ssl.sh: #11051: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:16 EST 2016 ssl.sh: #11052: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:17 EST 2016 ssl.sh: #11053: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:18 EST 2016 ssl.sh: #11054: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:18 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11055: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:19 EST 2016 ssl.sh: #11056: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:19 EST 2016 ssl.sh: #11057: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:20 EST 2016 ssl.sh: #11058: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:20 EST 2016 ssl.sh: #11059: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:21 EST 2016 ssl.sh: #11060: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:21 EST 2016 ssl.sh: #11061: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:22 EST 2016 ssl.sh: #11062: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:23 EST 2016 ssl.sh: #11063: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:23 EST 2016 ssl.sh: #11064: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:24 EST 2016 ssl.sh: #11065: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:24 EST 2016 ssl.sh: #11066: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:25 EST 2016 ssl.sh: #11067: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8819 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8819 found at Fri Jan 8 08:12:25 EST 2016 ssl.sh: #11068: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 8819 at Fri Jan 8 08:12:26 EST 2016 kill -USR1 8819 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8819 killed at Fri Jan 8 08:12:26 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:12:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:12:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:12:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11069: Waiting for Server - FAILED kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:32 EST 2016 selfserv_9591 with PID 10255 started at Fri Jan 8 08:12:32 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:32 EST 2016 ssl.sh: #11070: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:33 EST 2016 ssl.sh: #11071: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:34 EST 2016 ssl.sh: #11072: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:34 EST 2016 ssl.sh: #11073: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:35 EST 2016 ssl.sh: #11074: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:35 EST 2016 ssl.sh: #11075: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:36 EST 2016 ssl.sh: #11076: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:36 EST 2016 ssl.sh: #11077: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:37 EST 2016 ssl.sh: #11078: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:38 EST 2016 ssl.sh: #11079: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:38 EST 2016 ssl.sh: #11080: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:39 EST 2016 ssl.sh: #11081: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:39 EST 2016 ssl.sh: #11082: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:40 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11083: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:40 EST 2016 ssl.sh: #11084: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:41 EST 2016 ssl.sh: #11085: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:41 EST 2016 ssl.sh: #11086: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:42 EST 2016 ssl.sh: #11087: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:43 EST 2016 ssl.sh: #11088: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:43 EST 2016 ssl.sh: #11089: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:44 EST 2016 ssl.sh: #11090: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:44 EST 2016 ssl.sh: #11091: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:45 EST 2016 ssl.sh: #11092: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:45 EST 2016 ssl.sh: #11093: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:46 EST 2016 ssl.sh: #11094: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:47 EST 2016 ssl.sh: #11095: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:47 EST 2016 ssl.sh: #11096: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:48 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11097: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:48 EST 2016 ssl.sh: #11098: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:49 EST 2016 ssl.sh: #11099: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:49 EST 2016 ssl.sh: #11100: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:50 EST 2016 ssl.sh: #11101: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:50 EST 2016 ssl.sh: #11102: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:51 EST 2016 ssl.sh: #11103: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:51 EST 2016 ssl.sh: #11104: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:52 EST 2016 ssl.sh: #11105: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:53 EST 2016 ssl.sh: #11106: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:53 EST 2016 ssl.sh: #11107: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:54 EST 2016 ssl.sh: #11108: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:54 EST 2016 ssl.sh: #11109: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10255 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10255 found at Fri Jan 8 08:12:55 EST 2016 ssl.sh: #11110: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 10255 at Fri Jan 8 08:12:55 EST 2016 kill -USR1 10255 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10255 killed at Fri Jan 8 08:12:55 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:12:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:12:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:13:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11111: Waiting for Server - FAILED kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:01 EST 2016 selfserv_9591 with PID 11692 started at Fri Jan 8 08:13:01 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:02 EST 2016 ssl.sh: #11112: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:03 EST 2016 ssl.sh: #11113: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:03 EST 2016 ssl.sh: #11114: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:04 EST 2016 ssl.sh: #11115: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:04 EST 2016 ssl.sh: #11116: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:05 EST 2016 ssl.sh: #11117: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:05 EST 2016 ssl.sh: #11118: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:06 EST 2016 ssl.sh: #11119: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:06 EST 2016 ssl.sh: #11120: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:07 EST 2016 ssl.sh: #11121: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:08 EST 2016 ssl.sh: #11122: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:08 EST 2016 ssl.sh: #11123: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:09 EST 2016 ssl.sh: #11124: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:09 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11125: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:10 EST 2016 ssl.sh: #11126: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:10 EST 2016 ssl.sh: #11127: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:11 EST 2016 ssl.sh: #11128: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:11 EST 2016 ssl.sh: #11129: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:12 EST 2016 ssl.sh: #11130: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:13 EST 2016 ssl.sh: #11131: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:13 EST 2016 ssl.sh: #11132: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:14 EST 2016 ssl.sh: #11133: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:14 EST 2016 ssl.sh: #11134: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:15 EST 2016 ssl.sh: #11135: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:15 EST 2016 ssl.sh: #11136: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:16 EST 2016 ssl.sh: #11137: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:17 EST 2016 ssl.sh: #11138: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:17 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11139: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:18 EST 2016 ssl.sh: #11140: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:18 EST 2016 ssl.sh: #11141: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:19 EST 2016 ssl.sh: #11142: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:19 EST 2016 ssl.sh: #11143: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:20 EST 2016 ssl.sh: #11144: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:20 EST 2016 ssl.sh: #11145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:21 EST 2016 ssl.sh: #11146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:22 EST 2016 ssl.sh: #11147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:22 EST 2016 ssl.sh: #11148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:23 EST 2016 ssl.sh: #11149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:23 EST 2016 ssl.sh: #11150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:24 EST 2016 ssl.sh: #11151: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11692 found at Fri Jan 8 08:13:24 EST 2016 ssl.sh: #11152: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 11692 at Fri Jan 8 08:13:25 EST 2016 kill -USR1 11692 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11692 killed at Fri Jan 8 08:13:25 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:13:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:13:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:13:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11153: Waiting for Server - FAILED kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:31 EST 2016 selfserv_9591 with PID 13129 started at Fri Jan 8 08:13:31 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:31 EST 2016 ssl.sh: #11154: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:32 EST 2016 ssl.sh: #11155: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:33 EST 2016 ssl.sh: #11156: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:33 EST 2016 ssl.sh: #11157: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:34 EST 2016 ssl.sh: #11158: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:34 EST 2016 ssl.sh: #11159: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:35 EST 2016 ssl.sh: #11160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:35 EST 2016 ssl.sh: #11161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:36 EST 2016 ssl.sh: #11162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:36 EST 2016 ssl.sh: #11163: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:37 EST 2016 ssl.sh: #11164: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:38 EST 2016 ssl.sh: #11165: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:38 EST 2016 ssl.sh: #11166: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:39 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11167: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:39 EST 2016 ssl.sh: #11168: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:40 EST 2016 ssl.sh: #11169: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:40 EST 2016 ssl.sh: #11170: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:41 EST 2016 ssl.sh: #11171: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:42 EST 2016 ssl.sh: #11172: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:42 EST 2016 ssl.sh: #11173: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:43 EST 2016 ssl.sh: #11174: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:43 EST 2016 ssl.sh: #11175: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:44 EST 2016 ssl.sh: #11176: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:44 EST 2016 ssl.sh: #11177: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:45 EST 2016 ssl.sh: #11178: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:46 EST 2016 ssl.sh: #11179: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:46 EST 2016 ssl.sh: #11180: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:47 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11181: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:47 EST 2016 ssl.sh: #11182: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:48 EST 2016 ssl.sh: #11183: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:48 EST 2016 ssl.sh: #11184: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:49 EST 2016 ssl.sh: #11185: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:49 EST 2016 ssl.sh: #11186: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:50 EST 2016 ssl.sh: #11187: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:51 EST 2016 ssl.sh: #11188: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:51 EST 2016 ssl.sh: #11189: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:52 EST 2016 ssl.sh: #11190: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:52 EST 2016 ssl.sh: #11191: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:53 EST 2016 ssl.sh: #11192: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:53 EST 2016 ssl.sh: #11193: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13129 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13129 found at Fri Jan 8 08:13:54 EST 2016 ssl.sh: #11194: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13129 at Fri Jan 8 08:13:54 EST 2016 kill -USR1 13129 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13129 killed at Fri Jan 8 08:13:55 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:13:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:13:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:14:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11195: Waiting for Server - FAILED kill -0 14565 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14565 found at Fri Jan 8 08:14:00 EST 2016 selfserv_9591 with PID 14565 started at Fri Jan 8 08:14:01 EST 2016 trying to kill selfserv_9591 with PID 14565 at Fri Jan 8 08:14:01 EST 2016 kill -USR1 14565 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14565 killed at Fri Jan 8 08:14:01 EST 2016 selfserv_9591 starting at Fri Jan 8 08:14:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:14:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:14:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11196: Waiting for Server - FAILED kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:07 EST 2016 selfserv_9591 with PID 14619 started at Fri Jan 8 08:14:07 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:07 EST 2016 ssl.sh: #11197: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:08 EST 2016 ssl.sh: #11198: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:09 EST 2016 ssl.sh: #11199: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:09 EST 2016 ssl.sh: #11200: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:10 EST 2016 ssl.sh: #11201: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:10 EST 2016 ssl.sh: #11202: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:11 EST 2016 ssl.sh: #11203: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:11 EST 2016 ssl.sh: #11204: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:12 EST 2016 ssl.sh: #11205: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:12 EST 2016 ssl.sh: #11206: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:13 EST 2016 ssl.sh: #11207: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:14 EST 2016 ssl.sh: #11208: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:14 EST 2016 ssl.sh: #11209: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:15 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11210: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:15 EST 2016 ssl.sh: #11211: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:16 EST 2016 ssl.sh: #11212: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:16 EST 2016 ssl.sh: #11213: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:17 EST 2016 ssl.sh: #11214: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:17 EST 2016 ssl.sh: #11215: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:18 EST 2016 ssl.sh: #11216: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:19 EST 2016 ssl.sh: #11217: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:19 EST 2016 ssl.sh: #11218: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:20 EST 2016 ssl.sh: #11219: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:20 EST 2016 ssl.sh: #11220: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:21 EST 2016 ssl.sh: #11221: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:22 EST 2016 ssl.sh: #11222: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:22 EST 2016 ssl.sh: #11223: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:23 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11224: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:23 EST 2016 ssl.sh: #11225: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:24 EST 2016 ssl.sh: #11226: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:24 EST 2016 ssl.sh: #11227: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:25 EST 2016 ssl.sh: #11228: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:25 EST 2016 ssl.sh: #11229: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:26 EST 2016 ssl.sh: #11230: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:27 EST 2016 ssl.sh: #11231: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:27 EST 2016 ssl.sh: #11232: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:28 EST 2016 ssl.sh: #11233: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:28 EST 2016 ssl.sh: #11234: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:29 EST 2016 ssl.sh: #11235: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:29 EST 2016 ssl.sh: #11236: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14619 found at Fri Jan 8 08:14:30 EST 2016 ssl.sh: #11237: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14619 at Fri Jan 8 08:14:30 EST 2016 kill -USR1 14619 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14619 killed at Fri Jan 8 08:14:31 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:14:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:14:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:14:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11238: Waiting for Server - FAILED kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:36 EST 2016 selfserv_9591 with PID 16058 started at Fri Jan 8 08:14:36 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:37 EST 2016 ssl.sh: #11239: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:38 EST 2016 ssl.sh: #11240: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:38 EST 2016 ssl.sh: #11241: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:39 EST 2016 ssl.sh: #11242: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:39 EST 2016 ssl.sh: #11243: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:40 EST 2016 ssl.sh: #11244: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:40 EST 2016 ssl.sh: #11245: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:41 EST 2016 ssl.sh: #11246: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:41 EST 2016 ssl.sh: #11247: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:42 EST 2016 ssl.sh: #11248: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:43 EST 2016 ssl.sh: #11249: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:43 EST 2016 ssl.sh: #11250: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:44 EST 2016 ssl.sh: #11251: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:44 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11252: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:45 EST 2016 ssl.sh: #11253: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:45 EST 2016 ssl.sh: #11254: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:46 EST 2016 ssl.sh: #11255: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:47 EST 2016 ssl.sh: #11256: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:47 EST 2016 ssl.sh: #11257: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:48 EST 2016 ssl.sh: #11258: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:48 EST 2016 ssl.sh: #11259: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:49 EST 2016 ssl.sh: #11260: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:49 EST 2016 ssl.sh: #11261: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:50 EST 2016 ssl.sh: #11262: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:51 EST 2016 ssl.sh: #11263: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:51 EST 2016 ssl.sh: #11264: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:52 EST 2016 ssl.sh: #11265: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:52 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11266: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:53 EST 2016 ssl.sh: #11267: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:53 EST 2016 ssl.sh: #11268: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:54 EST 2016 ssl.sh: #11269: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:54 EST 2016 ssl.sh: #11270: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:55 EST 2016 ssl.sh: #11271: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:56 EST 2016 ssl.sh: #11272: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:56 EST 2016 ssl.sh: #11273: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:57 EST 2016 ssl.sh: #11274: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:57 EST 2016 ssl.sh: #11275: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:58 EST 2016 ssl.sh: #11276: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:58 EST 2016 ssl.sh: #11277: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:14:59 EST 2016 ssl.sh: #11278: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16058 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16058 found at Fri Jan 8 08:15:00 EST 2016 ssl.sh: #11279: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 16058 at Fri Jan 8 08:15:00 EST 2016 kill -USR1 16058 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16058 killed at Fri Jan 8 08:15:00 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:15:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:15:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:15:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11280: Waiting for Server - FAILED kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:06 EST 2016 selfserv_9591 with PID 17493 started at Fri Jan 8 08:15:06 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:07 EST 2016 ssl.sh: #11281: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:07 EST 2016 ssl.sh: #11282: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:08 EST 2016 ssl.sh: #11283: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:08 EST 2016 ssl.sh: #11284: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:09 EST 2016 ssl.sh: #11285: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:09 EST 2016 ssl.sh: #11286: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:10 EST 2016 ssl.sh: #11287: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:11 EST 2016 ssl.sh: #11288: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:11 EST 2016 ssl.sh: #11289: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:12 EST 2016 ssl.sh: #11290: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:12 EST 2016 ssl.sh: #11291: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:13 EST 2016 ssl.sh: #11292: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:13 EST 2016 ssl.sh: #11293: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:14 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11294: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:14 EST 2016 ssl.sh: #11295: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:15 EST 2016 ssl.sh: #11296: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:16 EST 2016 ssl.sh: #11297: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:16 EST 2016 ssl.sh: #11298: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:17 EST 2016 ssl.sh: #11299: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:17 EST 2016 ssl.sh: #11300: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:18 EST 2016 ssl.sh: #11301: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:18 EST 2016 ssl.sh: #11302: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:19 EST 2016 ssl.sh: #11303: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:20 EST 2016 ssl.sh: #11304: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:20 EST 2016 ssl.sh: #11305: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:21 EST 2016 ssl.sh: #11306: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:21 EST 2016 ssl.sh: #11307: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:22 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11308: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:22 EST 2016 ssl.sh: #11309: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:23 EST 2016 ssl.sh: #11310: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:23 EST 2016 ssl.sh: #11311: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:24 EST 2016 ssl.sh: #11312: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:25 EST 2016 ssl.sh: #11313: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:25 EST 2016 ssl.sh: #11314: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:26 EST 2016 ssl.sh: #11315: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:26 EST 2016 ssl.sh: #11316: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:27 EST 2016 ssl.sh: #11317: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:27 EST 2016 ssl.sh: #11318: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:28 EST 2016 ssl.sh: #11319: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:29 EST 2016 ssl.sh: #11320: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17493 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17493 found at Fri Jan 8 08:15:29 EST 2016 ssl.sh: #11321: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17493 at Fri Jan 8 08:15:29 EST 2016 kill -USR1 17493 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17493 killed at Fri Jan 8 08:15:30 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:15:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:15:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:15:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11322: Waiting for Server - FAILED kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:36 EST 2016 selfserv_9591 with PID 18933 started at Fri Jan 8 08:15:36 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:36 EST 2016 ssl.sh: #11323: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:37 EST 2016 ssl.sh: #11324: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:37 EST 2016 ssl.sh: #11325: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:38 EST 2016 ssl.sh: #11326: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:38 EST 2016 ssl.sh: #11327: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:39 EST 2016 ssl.sh: #11328: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:40 EST 2016 ssl.sh: #11329: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:40 EST 2016 ssl.sh: #11330: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:41 EST 2016 ssl.sh: #11331: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:41 EST 2016 ssl.sh: #11332: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:42 EST 2016 ssl.sh: #11333: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:42 EST 2016 ssl.sh: #11334: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:43 EST 2016 ssl.sh: #11335: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:44 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11336: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:44 EST 2016 ssl.sh: #11337: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:45 EST 2016 ssl.sh: #11338: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:45 EST 2016 ssl.sh: #11339: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:46 EST 2016 ssl.sh: #11340: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:46 EST 2016 ssl.sh: #11341: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:47 EST 2016 ssl.sh: #11342: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:47 EST 2016 ssl.sh: #11343: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:48 EST 2016 ssl.sh: #11344: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:49 EST 2016 ssl.sh: #11345: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:49 EST 2016 ssl.sh: #11346: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:50 EST 2016 ssl.sh: #11347: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:50 EST 2016 ssl.sh: #11348: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:51 EST 2016 ssl.sh: #11349: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:51 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11350: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:52 EST 2016 ssl.sh: #11351: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:52 EST 2016 ssl.sh: #11352: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:53 EST 2016 ssl.sh: #11353: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:54 EST 2016 ssl.sh: #11354: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:54 EST 2016 ssl.sh: #11355: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:55 EST 2016 ssl.sh: #11356: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:55 EST 2016 ssl.sh: #11357: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:56 EST 2016 ssl.sh: #11358: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:56 EST 2016 ssl.sh: #11359: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:57 EST 2016 ssl.sh: #11360: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:58 EST 2016 ssl.sh: #11361: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:58 EST 2016 ssl.sh: #11362: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18933 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18933 found at Fri Jan 8 08:15:59 EST 2016 ssl.sh: #11363: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 18933 at Fri Jan 8 08:15:59 EST 2016 kill -USR1 18933 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18933 killed at Fri Jan 8 08:15:59 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:15:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:15:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:16:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11364: Waiting for Server - FAILED kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:05 EST 2016 selfserv_9591 with PID 20370 started at Fri Jan 8 08:16:05 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:06 EST 2016 ssl.sh: #11365: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:06 EST 2016 ssl.sh: #11366: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:07 EST 2016 ssl.sh: #11367: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:07 EST 2016 ssl.sh: #11368: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:08 EST 2016 ssl.sh: #11369: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:09 EST 2016 ssl.sh: #11370: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:09 EST 2016 ssl.sh: #11371: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:10 EST 2016 ssl.sh: #11372: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:10 EST 2016 ssl.sh: #11373: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:11 EST 2016 ssl.sh: #11374: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:11 EST 2016 ssl.sh: #11375: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:12 EST 2016 ssl.sh: #11376: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:13 EST 2016 ssl.sh: #11377: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:13 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11378: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:14 EST 2016 ssl.sh: #11379: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:14 EST 2016 ssl.sh: #11380: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:15 EST 2016 ssl.sh: #11381: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:15 EST 2016 ssl.sh: #11382: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:16 EST 2016 ssl.sh: #11383: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:16 EST 2016 ssl.sh: #11384: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:17 EST 2016 ssl.sh: #11385: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:18 EST 2016 ssl.sh: #11386: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:18 EST 2016 ssl.sh: #11387: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:19 EST 2016 ssl.sh: #11388: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:19 EST 2016 ssl.sh: #11389: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:20 EST 2016 ssl.sh: #11390: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:20 EST 2016 ssl.sh: #11391: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:21 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11392: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:22 EST 2016 ssl.sh: #11393: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:22 EST 2016 ssl.sh: #11394: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:23 EST 2016 ssl.sh: #11395: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:23 EST 2016 ssl.sh: #11396: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:24 EST 2016 ssl.sh: #11397: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:24 EST 2016 ssl.sh: #11398: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:25 EST 2016 ssl.sh: #11399: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:25 EST 2016 ssl.sh: #11400: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:26 EST 2016 ssl.sh: #11401: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:27 EST 2016 ssl.sh: #11402: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:27 EST 2016 ssl.sh: #11403: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:28 EST 2016 ssl.sh: #11404: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20370 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20370 found at Fri Jan 8 08:16:28 EST 2016 ssl.sh: #11405: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 20370 at Fri Jan 8 08:16:28 EST 2016 kill -USR1 20370 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20370 killed at Fri Jan 8 08:16:29 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:16:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:16:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:16:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11406: Waiting for Server - FAILED kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:35 EST 2016 selfserv_9591 with PID 21807 started at Fri Jan 8 08:16:35 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:35 EST 2016 ssl.sh: #11407: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:36 EST 2016 ssl.sh: #11408: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:36 EST 2016 ssl.sh: #11409: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:37 EST 2016 ssl.sh: #11410: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:38 EST 2016 ssl.sh: #11411: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:38 EST 2016 ssl.sh: #11412: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:39 EST 2016 ssl.sh: #11413: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:39 EST 2016 ssl.sh: #11414: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:40 EST 2016 ssl.sh: #11415: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:40 EST 2016 ssl.sh: #11416: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:41 EST 2016 ssl.sh: #11417: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:42 EST 2016 ssl.sh: #11418: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:42 EST 2016 ssl.sh: #11419: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:43 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11420: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:43 EST 2016 ssl.sh: #11421: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:44 EST 2016 ssl.sh: #11422: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:44 EST 2016 ssl.sh: #11423: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:45 EST 2016 ssl.sh: #11424: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:45 EST 2016 ssl.sh: #11425: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:46 EST 2016 ssl.sh: #11426: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:47 EST 2016 ssl.sh: #11427: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:47 EST 2016 ssl.sh: #11428: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:48 EST 2016 ssl.sh: #11429: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:48 EST 2016 ssl.sh: #11430: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:49 EST 2016 ssl.sh: #11431: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:49 EST 2016 ssl.sh: #11432: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:50 EST 2016 ssl.sh: #11433: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:51 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11434: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:51 EST 2016 ssl.sh: #11435: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:52 EST 2016 ssl.sh: #11436: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:52 EST 2016 ssl.sh: #11437: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:53 EST 2016 ssl.sh: #11438: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:53 EST 2016 ssl.sh: #11439: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:54 EST 2016 ssl.sh: #11440: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:54 EST 2016 ssl.sh: #11441: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:55 EST 2016 ssl.sh: #11442: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:56 EST 2016 ssl.sh: #11443: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:56 EST 2016 ssl.sh: #11444: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:57 EST 2016 ssl.sh: #11445: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:57 EST 2016 ssl.sh: #11446: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 21807 found at Fri Jan 8 08:16:58 EST 2016 ssl.sh: #11447: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 21807 at Fri Jan 8 08:16:58 EST 2016 kill -USR1 21807 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 21807 killed at Fri Jan 8 08:16:58 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:16:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:16:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:17:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11448: Waiting for Server - FAILED kill -0 23243 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23243 found at Fri Jan 8 08:17:04 EST 2016 selfserv_9591 with PID 23243 started at Fri Jan 8 08:17:04 EST 2016 trying to kill selfserv_9591 with PID 23243 at Fri Jan 8 08:17:04 EST 2016 kill -USR1 23243 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23243 killed at Fri Jan 8 08:17:05 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server bypass/client bypass - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9591 starting at Fri Jan 8 08:17:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:17:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:17:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11449: Waiting for Server - FAILED kill -0 23303 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23303 found at Fri Jan 8 08:17:11 EST 2016 selfserv_9591 with PID 23303 started at Fri Jan 8 08:17:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11450: OCSP stapling, signed response, good status produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 23303 at Fri Jan 8 08:17:11 EST 2016 kill -USR1 23303 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23303 killed at Fri Jan 8 08:17:12 EST 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9591 starting at Fri Jan 8 08:17:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:17:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:17:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11451: Waiting for Server - FAILED kill -0 23365 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23365 found at Fri Jan 8 08:17:18 EST 2016 selfserv_9591 with PID 23365 started at Fri Jan 8 08:17:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11452: OCSP stapling, signed response, revoked status produced a returncode of 1, expected is 3 - FAILED trying to kill selfserv_9591 with PID 23365 at Fri Jan 8 08:17:18 EST 2016 kill -USR1 23365 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23365 killed at Fri Jan 8 08:17:19 EST 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9591 starting at Fri Jan 8 08:17:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:17:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:17:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11453: Waiting for Server - FAILED kill -0 23426 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23426 found at Fri Jan 8 08:17:25 EST 2016 selfserv_9591 with PID 23426 started at Fri Jan 8 08:17:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11454: OCSP stapling, signed response, unknown status produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 23426 at Fri Jan 8 08:17:25 EST 2016 kill -USR1 23426 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23426 killed at Fri Jan 8 08:17:26 EST 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9591 starting at Fri Jan 8 08:17:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:17:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:17:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11455: Waiting for Server - FAILED kill -0 23487 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23487 found at Fri Jan 8 08:17:32 EST 2016 selfserv_9591 with PID 23487 started at Fri Jan 8 08:17:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11456: OCSP stapling, unsigned failure response produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 23487 at Fri Jan 8 08:17:32 EST 2016 kill -USR1 23487 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23487 killed at Fri Jan 8 08:17:32 EST 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9591 starting at Fri Jan 8 08:17:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:17:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:17:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11457: Waiting for Server - FAILED kill -0 23549 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23549 found at Fri Jan 8 08:17:38 EST 2016 selfserv_9591 with PID 23549 started at Fri Jan 8 08:17:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11458: OCSP stapling, good status, bad signature produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 23549 at Fri Jan 8 08:17:39 EST 2016 kill -USR1 23549 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23549 killed at Fri Jan 8 08:17:39 EST 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9591 starting at Fri Jan 8 08:17:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:17:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:17:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11459: Waiting for Server - FAILED kill -0 23610 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23610 found at Fri Jan 8 08:17:45 EST 2016 selfserv_9591 with PID 23610 started at Fri Jan 8 08:17:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11460: OCSP stapling, invalid cert status data produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 23610 at Fri Jan 8 08:17:46 EST 2016 kill -USR1 23610 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23610 killed at Fri Jan 8 08:17:46 EST 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9591 starting at Fri Jan 8 08:17:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:17:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:17:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11461: Waiting for Server - FAILED kill -0 23674 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23674 found at Fri Jan 8 08:17:52 EST 2016 selfserv_9591 with PID 23674 started at Fri Jan 8 08:17:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11462: Valid cert, Server doesn't staple produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 23674 at Fri Jan 8 08:17:53 EST 2016 kill -USR1 23674 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23674 killed at Fri Jan 8 08:17:53 EST 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9591 starting at Fri Jan 8 08:17:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:17:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:17:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11463: Waiting for Server - FAILED kill -0 23736 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23736 found at Fri Jan 8 08:17:59 EST 2016 selfserv_9591 with PID 23736 started at Fri Jan 8 08:17:59 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Fri Jan 8 08:17:59 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:18:00 EST 2016 ssl.sh: #11464: Stress OCSP stapling, server uses random status produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 23736 at Fri Jan 8 08:18:00 EST 2016 kill -USR1 23736 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23736 killed at Fri Jan 8 08:18:00 EST 2016 ssl.sh: SSL Stress Test - server bypass/client bypass - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 08:18:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:18:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:18:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11465: Waiting for Server - FAILED kill -0 23888 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23888 found at Fri Jan 8 08:18:06 EST 2016 selfserv_9591 with PID 23888 started at Fri Jan 8 08:18:06 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 08:18:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:18:07 EST 2016 ssl.sh: #11466: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 23888 at Fri Jan 8 08:18:07 EST 2016 kill -USR1 23888 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23888 killed at Fri Jan 8 08:18:08 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 08:18:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:18:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:18:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11467: Waiting for Server - FAILED kill -0 23967 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23967 found at Fri Jan 8 08:18:14 EST 2016 selfserv_9591 with PID 23967 started at Fri Jan 8 08:18:14 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 08:18:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:18:14 EST 2016 ssl.sh: #11468: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 23967 at Fri Jan 8 08:18:14 EST 2016 kill -USR1 23967 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23967 killed at Fri Jan 8 08:18:15 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9591 starting at Fri Jan 8 08:18:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:18:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:18:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11469: Waiting for Server - FAILED kill -0 24047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24047 found at Fri Jan 8 08:18:21 EST 2016 selfserv_9591 with PID 24047 started at Fri Jan 8 08:18:21 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 08:18:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:18:21 EST 2016 ssl.sh: #11470: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 24047 at Fri Jan 8 08:18:21 EST 2016 kill -USR1 24047 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24047 killed at Fri Jan 8 08:18:22 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9591 starting at Fri Jan 8 08:18:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:18:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:18:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11471: Waiting for Server - FAILED kill -0 24126 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24126 found at Fri Jan 8 08:18:28 EST 2016 selfserv_9591 with PID 24126 started at Fri Jan 8 08:18:28 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 08:18:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:18:28 EST 2016 ssl.sh: #11472: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 24126 at Fri Jan 8 08:18:28 EST 2016 kill -USR1 24126 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24126 killed at Fri Jan 8 08:18:29 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9591 starting at Fri Jan 8 08:18:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:18:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:18:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11473: Waiting for Server - FAILED kill -0 24205 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24205 found at Fri Jan 8 08:18:35 EST 2016 selfserv_9591 with PID 24205 started at Fri Jan 8 08:18:35 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 08:18:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:18:35 EST 2016 ssl.sh: #11474: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 24205 at Fri Jan 8 08:18:35 EST 2016 kill -USR1 24205 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24205 killed at Fri Jan 8 08:18:36 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9591 starting at Fri Jan 8 08:18:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:18:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:18:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11475: Waiting for Server - FAILED kill -0 24285 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24285 found at Fri Jan 8 08:18:42 EST 2016 selfserv_9591 with PID 24285 started at Fri Jan 8 08:18:42 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 08:18:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:18:42 EST 2016 ssl.sh: #11476: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 24285 at Fri Jan 8 08:18:43 EST 2016 kill -USR1 24285 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24285 killed at Fri Jan 8 08:18:43 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9591 starting at Fri Jan 8 08:18:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:18:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:18:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11477: Waiting for Server - FAILED kill -0 24364 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24364 found at Fri Jan 8 08:18:49 EST 2016 selfserv_9591 with PID 24364 started at Fri Jan 8 08:18:49 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 08:18:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:18:50 EST 2016 ssl.sh: #11478: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 24364 at Fri Jan 8 08:18:50 EST 2016 kill -USR1 24364 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24364 killed at Fri Jan 8 08:18:50 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9591 starting at Fri Jan 8 08:18:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:18:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:18:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11479: Waiting for Server - FAILED kill -0 24449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24449 found at Fri Jan 8 08:18:56 EST 2016 selfserv_9591 with PID 24449 started at Fri Jan 8 08:18:56 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 08:18:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:18:57 EST 2016 ssl.sh: #11480: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 24449 at Fri Jan 8 08:18:57 EST 2016 kill -USR1 24449 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24449 killed at Fri Jan 8 08:18:57 EST 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:18:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:18:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:19:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11481: Waiting for Server - FAILED kill -0 24560 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24560 found at Fri Jan 8 08:19:03 EST 2016 selfserv_9591 with PID 24560 started at Fri Jan 8 08:19:03 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 08:19:03 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:19:04 EST 2016 ssl.sh: #11482: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 24560 at Fri Jan 8 08:19:04 EST 2016 kill -USR1 24560 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24560 killed at Fri Jan 8 08:19:04 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:19:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:19:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:19:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11483: Waiting for Server - FAILED kill -0 24639 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24639 found at Fri Jan 8 08:19:10 EST 2016 selfserv_9591 with PID 24639 started at Fri Jan 8 08:19:10 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 08:19:10 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:19:11 EST 2016 ssl.sh: #11484: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 24639 at Fri Jan 8 08:19:11 EST 2016 kill -USR1 24639 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24639 killed at Fri Jan 8 08:19:12 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:19:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:19:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:19:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11485: Waiting for Server - FAILED kill -0 24718 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24718 found at Fri Jan 8 08:19:18 EST 2016 selfserv_9591 with PID 24718 started at Fri Jan 8 08:19:18 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 08:19:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:19:18 EST 2016 ssl.sh: #11486: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 24718 at Fri Jan 8 08:19:18 EST 2016 kill -USR1 24718 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24718 killed at Fri Jan 8 08:19:19 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:19:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:19:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:19:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11487: Waiting for Server - FAILED kill -0 24798 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24798 found at Fri Jan 8 08:19:25 EST 2016 selfserv_9591 with PID 24798 started at Fri Jan 8 08:19:25 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 08:19:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:19:25 EST 2016 ssl.sh: #11488: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 24798 at Fri Jan 8 08:19:25 EST 2016 kill -USR1 24798 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24798 killed at Fri Jan 8 08:19:26 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 08:19:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:19:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:19:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11489: Waiting for Server - FAILED kill -0 24877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24877 found at Fri Jan 8 08:19:32 EST 2016 selfserv_9591 with PID 24877 started at Fri Jan 8 08:19:32 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 08:19:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:19:32 EST 2016 ssl.sh: #11490: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 24877 at Fri Jan 8 08:19:32 EST 2016 kill -USR1 24877 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24877 killed at Fri Jan 8 08:19:33 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:19:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:19:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:19:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11491: Waiting for Server - FAILED kill -0 24956 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 24956 found at Fri Jan 8 08:19:39 EST 2016 selfserv_9591 with PID 24956 started at Fri Jan 8 08:19:39 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 08:19:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:19:39 EST 2016 ssl.sh: #11492: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 24956 at Fri Jan 8 08:19:40 EST 2016 kill -USR1 24956 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 24956 killed at Fri Jan 8 08:19:40 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 08:19:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:19:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:19:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11493: Waiting for Server - FAILED kill -0 25036 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25036 found at Fri Jan 8 08:19:46 EST 2016 selfserv_9591 with PID 25036 started at Fri Jan 8 08:19:46 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 08:19:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:19:47 EST 2016 ssl.sh: #11494: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 25036 at Fri Jan 8 08:19:47 EST 2016 kill -USR1 25036 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25036 killed at Fri Jan 8 08:19:47 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9591 starting at Fri Jan 8 08:19:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:19:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:19:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11495: Waiting for Server - FAILED kill -0 25121 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25121 found at Fri Jan 8 08:19:53 EST 2016 selfserv_9591 with PID 25121 started at Fri Jan 8 08:19:53 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 08:19:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:19:54 EST 2016 ssl.sh: #11496: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 25121 at Fri Jan 8 08:19:54 EST 2016 kill -USR1 25121 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25121 killed at Fri Jan 8 08:19:54 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9591 starting at Fri Jan 8 08:19:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:19:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:20:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11497: Waiting for Server - FAILED kill -0 25206 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25206 found at Fri Jan 8 08:20:00 EST 2016 selfserv_9591 with PID 25206 started at Fri Jan 8 08:20:00 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Fri Jan 8 08:20:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:20:01 EST 2016 ssl.sh: #11498: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 25206 at Fri Jan 8 08:20:01 EST 2016 kill -USR1 25206 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25206 killed at Fri Jan 8 08:20:01 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:20:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:20:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:20:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11499: Waiting for Server - FAILED kill -0 25307 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25307 found at Fri Jan 8 08:20:07 EST 2016 selfserv_9591 with PID 25307 started at Fri Jan 8 08:20:07 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:20:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:20:08 EST 2016 ssl.sh: #11500: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 25307 at Fri Jan 8 08:20:08 EST 2016 kill -USR1 25307 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25307 killed at Fri Jan 8 08:20:08 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:20:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:20:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:20:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11501: Waiting for Server - FAILED kill -0 25386 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25386 found at Fri Jan 8 08:20:15 EST 2016 selfserv_9591 with PID 25386 started at Fri Jan 8 08:20:15 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:20:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:20:15 EST 2016 ssl.sh: #11502: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 25386 at Fri Jan 8 08:20:15 EST 2016 kill -USR1 25386 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25386 killed at Fri Jan 8 08:20:16 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:20:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:20:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:20:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11503: Waiting for Server - FAILED kill -0 25468 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25468 found at Fri Jan 8 08:20:22 EST 2016 selfserv_9591 with PID 25468 started at Fri Jan 8 08:20:22 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:20:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:20:22 EST 2016 ssl.sh: #11504: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 25468 at Fri Jan 8 08:20:22 EST 2016 kill -USR1 25468 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25468 killed at Fri Jan 8 08:20:23 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:20:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:20:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:20:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11505: Waiting for Server - FAILED kill -0 25547 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25547 found at Fri Jan 8 08:20:29 EST 2016 selfserv_9591 with PID 25547 started at Fri Jan 8 08:20:29 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:20:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:20:29 EST 2016 ssl.sh: #11506: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 25547 at Fri Jan 8 08:20:29 EST 2016 kill -USR1 25547 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25547 killed at Fri Jan 8 08:20:30 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:20:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:20:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:20:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11507: Waiting for Server - FAILED kill -0 25626 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25626 found at Fri Jan 8 08:20:36 EST 2016 selfserv_9591 with PID 25626 started at Fri Jan 8 08:20:36 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:20:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:20:36 EST 2016 ssl.sh: #11508: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 25626 at Fri Jan 8 08:20:36 EST 2016 kill -USR1 25626 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25626 killed at Fri Jan 8 08:20:37 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9591 starting at Fri Jan 8 08:20:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:20:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:20:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11509: Waiting for Server - FAILED kill -0 25706 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25706 found at Fri Jan 8 08:20:43 EST 2016 selfserv_9591 with PID 25706 started at Fri Jan 8 08:20:43 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 08:20:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:20:43 EST 2016 ssl.sh: #11510: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 25706 at Fri Jan 8 08:20:44 EST 2016 kill -USR1 25706 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25706 killed at Fri Jan 8 08:20:44 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9591 starting at Fri Jan 8 08:20:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:20:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:20:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11511: Waiting for Server - FAILED kill -0 25785 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25785 found at Fri Jan 8 08:20:50 EST 2016 selfserv_9591 with PID 25785 started at Fri Jan 8 08:20:50 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 08:20:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:20:51 EST 2016 ssl.sh: #11512: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 25785 at Fri Jan 8 08:20:51 EST 2016 kill -USR1 25785 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25785 killed at Fri Jan 8 08:20:51 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9591 starting at Fri Jan 8 08:20:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:20:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:20:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11513: Waiting for Server - FAILED kill -0 25864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25864 found at Fri Jan 8 08:20:57 EST 2016 selfserv_9591 with PID 25864 started at Fri Jan 8 08:20:57 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 08:20:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:20:58 EST 2016 ssl.sh: #11514: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 25864 at Fri Jan 8 08:20:58 EST 2016 kill -USR1 25864 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25864 killed at Fri Jan 8 08:20:58 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 08:20:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:20:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:21:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11515: Waiting for Server - FAILED kill -0 25944 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25944 found at Fri Jan 8 08:21:04 EST 2016 selfserv_9591 with PID 25944 started at Fri Jan 8 08:21:04 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 08:21:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:21:05 EST 2016 ssl.sh: #11516: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 25944 at Fri Jan 8 08:21:05 EST 2016 kill -USR1 25944 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25944 killed at Fri Jan 8 08:21:05 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 08:21:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:21:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:21:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11517: Waiting for Server - FAILED kill -0 26023 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26023 found at Fri Jan 8 08:21:11 EST 2016 selfserv_9591 with PID 26023 started at Fri Jan 8 08:21:11 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 08:21:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:21:12 EST 2016 ssl.sh: #11518: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 26023 at Fri Jan 8 08:21:12 EST 2016 kill -USR1 26023 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26023 killed at Fri Jan 8 08:21:12 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:21:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:21:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:21:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11519: Waiting for Server - FAILED kill -0 26123 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26123 found at Fri Jan 8 08:21:18 EST 2016 selfserv_9591 with PID 26123 started at Fri Jan 8 08:21:18 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 08:21:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:21:19 EST 2016 ssl.sh: #11520: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 26123 at Fri Jan 8 08:21:19 EST 2016 kill -USR1 26123 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26123 killed at Fri Jan 8 08:21:20 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:21:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:21:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:21:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11521: Waiting for Server - FAILED kill -0 26203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26203 found at Fri Jan 8 08:21:26 EST 2016 selfserv_9591 with PID 26203 started at Fri Jan 8 08:21:26 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 08:21:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:21:26 EST 2016 ssl.sh: #11522: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 26203 at Fri Jan 8 08:21:26 EST 2016 kill -USR1 26203 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26203 killed at Fri Jan 8 08:21:27 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:21:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:21:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:21:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11523: Waiting for Server - FAILED kill -0 26282 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26282 found at Fri Jan 8 08:21:33 EST 2016 selfserv_9591 with PID 26282 started at Fri Jan 8 08:21:33 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 08:21:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:21:33 EST 2016 ssl.sh: #11524: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 26282 at Fri Jan 8 08:21:33 EST 2016 kill -USR1 26282 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26282 killed at Fri Jan 8 08:21:34 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:21:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:21:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:21:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11525: Waiting for Server - FAILED kill -0 26361 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26361 found at Fri Jan 8 08:21:40 EST 2016 selfserv_9591 with PID 26361 started at Fri Jan 8 08:21:40 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 08:21:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:21:40 EST 2016 ssl.sh: #11526: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 26361 at Fri Jan 8 08:21:40 EST 2016 kill -USR1 26361 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26361 killed at Fri Jan 8 08:21:41 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9591 starting at Fri Jan 8 08:21:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:21:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:21:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11527: Waiting for Server - FAILED kill -0 26441 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26441 found at Fri Jan 8 08:21:47 EST 2016 selfserv_9591 with PID 26441 started at Fri Jan 8 08:21:47 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 08:21:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:21:47 EST 2016 ssl.sh: #11528: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 26441 at Fri Jan 8 08:21:48 EST 2016 kill -USR1 26441 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26441 killed at Fri Jan 8 08:21:48 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:21:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:21:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:21:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11529: Waiting for Server - FAILED kill -0 26520 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26520 found at Fri Jan 8 08:21:54 EST 2016 selfserv_9591 with PID 26520 started at Fri Jan 8 08:21:54 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 08:21:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:21:55 EST 2016 ssl.sh: #11530: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 26520 at Fri Jan 8 08:21:55 EST 2016 kill -USR1 26520 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26520 killed at Fri Jan 8 08:21:55 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:21:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:21:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:22:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11531: Waiting for Server - FAILED kill -0 26620 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26620 found at Fri Jan 8 08:22:01 EST 2016 selfserv_9591 with PID 26620 started at Fri Jan 8 08:22:01 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:22:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:22:02 EST 2016 ssl.sh: #11532: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 26620 at Fri Jan 8 08:22:02 EST 2016 kill -USR1 26620 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26620 killed at Fri Jan 8 08:22:02 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9591 starting at Fri Jan 8 08:22:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:22:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:22:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11533: Waiting for Server - FAILED kill -0 26700 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26700 found at Fri Jan 8 08:22:08 EST 2016 selfserv_9591 with PID 26700 started at Fri Jan 8 08:22:08 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 08:22:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:22:09 EST 2016 ssl.sh: #11534: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 26700 at Fri Jan 8 08:22:09 EST 2016 kill -USR1 26700 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26700 killed at Fri Jan 8 08:22:09 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:22:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:22:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:22:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11535: Waiting for Server - FAILED kill -0 26779 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26779 found at Fri Jan 8 08:22:15 EST 2016 selfserv_9591 with PID 26779 started at Fri Jan 8 08:22:15 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:22:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:22:16 EST 2016 ssl.sh: #11536: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 26779 at Fri Jan 8 08:22:16 EST 2016 kill -USR1 26779 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26779 killed at Fri Jan 8 08:22:16 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:22:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:22:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:22:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11537: Waiting for Server - FAILED kill -0 26858 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26858 found at Fri Jan 8 08:22:22 EST 2016 selfserv_9591 with PID 26858 started at Fri Jan 8 08:22:22 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:22:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:22:23 EST 2016 ssl.sh: #11538: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 26858 at Fri Jan 8 08:22:23 EST 2016 kill -USR1 26858 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26858 killed at Fri Jan 8 08:22:23 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:22:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:22:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:22:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11539: Waiting for Server - FAILED kill -0 26952 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26952 found at Fri Jan 8 08:22:30 EST 2016 selfserv_9591 with PID 26952 started at Fri Jan 8 08:22:30 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:22:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:22:30 EST 2016 ssl.sh: #11540: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 26952 at Fri Jan 8 08:22:30 EST 2016 kill -USR1 26952 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26952 killed at Fri Jan 8 08:22:31 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9591 starting at Fri Jan 8 08:22:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:22:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:22:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11541: Waiting for Server - FAILED kill -0 27045 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27045 found at Fri Jan 8 08:22:37 EST 2016 selfserv_9591 with PID 27045 started at Fri Jan 8 08:22:37 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:22:37 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:22:37 EST 2016 ssl.sh: #11542: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 27045 at Fri Jan 8 08:22:37 EST 2016 kill -USR1 27045 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27045 killed at Fri Jan 8 08:22:38 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:22:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:22:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:22:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11543: Waiting for Server - FAILED kill -0 27125 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27125 found at Fri Jan 8 08:22:44 EST 2016 selfserv_9591 with PID 27125 started at Fri Jan 8 08:22:44 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:22:44 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:22:44 EST 2016 ssl.sh: #11544: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 27125 at Fri Jan 8 08:22:44 EST 2016 kill -USR1 27125 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27125 killed at Fri Jan 8 08:22:45 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:22:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:22:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:22:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11545: Waiting for Server - FAILED kill -0 27205 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27205 found at Fri Jan 8 08:22:51 EST 2016 selfserv_9591 with PID 27205 started at Fri Jan 8 08:22:51 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:22:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:22:51 EST 2016 ssl.sh: #11546: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 27205 at Fri Jan 8 08:22:51 EST 2016 kill -USR1 27205 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27205 killed at Fri Jan 8 08:22:52 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:22:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:22:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:22:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11547: Waiting for Server - FAILED kill -0 27305 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27305 found at Fri Jan 8 08:22:58 EST 2016 selfserv_9591 with PID 27305 started at Fri Jan 8 08:22:58 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 08:22:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:22:59 EST 2016 ssl.sh: #11548: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 27305 at Fri Jan 8 08:22:59 EST 2016 kill -USR1 27305 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27305 killed at Fri Jan 8 08:22:59 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:22:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:22:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:23:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11549: Waiting for Server - FAILED kill -0 27385 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27385 found at Fri Jan 8 08:23:05 EST 2016 selfserv_9591 with PID 27385 started at Fri Jan 8 08:23:05 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 08:23:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:23:06 EST 2016 ssl.sh: #11550: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 27385 at Fri Jan 8 08:23:06 EST 2016 kill -USR1 27385 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27385 killed at Fri Jan 8 08:23:06 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:23:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:23:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:23:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11551: Waiting for Server - FAILED kill -0 27478 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27478 found at Fri Jan 8 08:23:12 EST 2016 selfserv_9591 with PID 27478 started at Fri Jan 8 08:23:12 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 08:23:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:23:13 EST 2016 ssl.sh: #11552: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 27478 at Fri Jan 8 08:23:13 EST 2016 kill -USR1 27478 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27478 killed at Fri Jan 8 08:23:13 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 08:23:14 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:23:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:23:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11553: Waiting for Server - FAILED kill -0 27636 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27636 found at Fri Jan 8 08:23:20 EST 2016 selfserv_9591 with PID 27636 started at Fri Jan 8 08:23:20 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 08:23:20 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:23:20 EST 2016 ssl.sh: #11554: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 27636 at Fri Jan 8 08:23:20 EST 2016 kill -USR1 27636 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27636 killed at Fri Jan 8 08:23:21 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 08:23:21 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:23:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:23:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11555: Waiting for Server - FAILED kill -0 27716 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27716 found at Fri Jan 8 08:23:27 EST 2016 selfserv_9591 with PID 27716 started at Fri Jan 8 08:23:27 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 08:23:27 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:23:27 EST 2016 ssl.sh: #11556: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 27716 at Fri Jan 8 08:23:27 EST 2016 kill -USR1 27716 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27716 killed at Fri Jan 8 08:23:28 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9591 starting at Fri Jan 8 08:23:28 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:23:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:23:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11557: Waiting for Server - FAILED kill -0 27795 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27795 found at Fri Jan 8 08:23:34 EST 2016 selfserv_9591 with PID 27795 started at Fri Jan 8 08:23:34 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 08:23:34 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:23:34 EST 2016 ssl.sh: #11558: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 27795 at Fri Jan 8 08:23:35 EST 2016 kill -USR1 27795 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27795 killed at Fri Jan 8 08:23:35 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9591 starting at Fri Jan 8 08:23:35 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:23:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:23:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11559: Waiting for Server - FAILED kill -0 27874 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27874 found at Fri Jan 8 08:23:41 EST 2016 selfserv_9591 with PID 27874 started at Fri Jan 8 08:23:41 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 08:23:41 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:23:42 EST 2016 ssl.sh: #11560: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 27874 at Fri Jan 8 08:23:42 EST 2016 kill -USR1 27874 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27874 killed at Fri Jan 8 08:23:42 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9591 starting at Fri Jan 8 08:23:42 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:23:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:23:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11561: Waiting for Server - FAILED kill -0 27954 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27954 found at Fri Jan 8 08:23:48 EST 2016 selfserv_9591 with PID 27954 started at Fri Jan 8 08:23:48 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 08:23:48 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:23:49 EST 2016 ssl.sh: #11562: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 27954 at Fri Jan 8 08:23:49 EST 2016 kill -USR1 27954 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27954 killed at Fri Jan 8 08:23:49 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9591 starting at Fri Jan 8 08:23:49 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:23:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:23:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11563: Waiting for Server - FAILED kill -0 28033 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28033 found at Fri Jan 8 08:23:55 EST 2016 selfserv_9591 with PID 28033 started at Fri Jan 8 08:23:55 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 08:23:55 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:23:56 EST 2016 ssl.sh: #11564: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 28033 at Fri Jan 8 08:23:56 EST 2016 kill -USR1 28033 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28033 killed at Fri Jan 8 08:23:56 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9591 starting at Fri Jan 8 08:23:56 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:23:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:24:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11565: Waiting for Server - FAILED kill -0 28112 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28112 found at Fri Jan 8 08:24:02 EST 2016 selfserv_9591 with PID 28112 started at Fri Jan 8 08:24:02 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 08:24:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:24:03 EST 2016 ssl.sh: #11566: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 28112 at Fri Jan 8 08:24:03 EST 2016 kill -USR1 28112 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28112 killed at Fri Jan 8 08:24:03 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:24:04 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:24:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:24:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11567: Waiting for Server - FAILED kill -0 28221 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28221 found at Fri Jan 8 08:24:09 EST 2016 selfserv_9591 with PID 28221 started at Fri Jan 8 08:24:09 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 08:24:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:24:10 EST 2016 ssl.sh: #11568: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 28221 at Fri Jan 8 08:24:10 EST 2016 kill -USR1 28221 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28221 killed at Fri Jan 8 08:24:11 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:24:11 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:24:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:24:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11569: Waiting for Server - FAILED kill -0 28300 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28300 found at Fri Jan 8 08:24:17 EST 2016 selfserv_9591 with PID 28300 started at Fri Jan 8 08:24:17 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 08:24:17 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:24:17 EST 2016 ssl.sh: #11570: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 28300 at Fri Jan 8 08:24:17 EST 2016 kill -USR1 28300 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28300 killed at Fri Jan 8 08:24:18 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:24:18 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:24:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:24:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11571: Waiting for Server - FAILED kill -0 28379 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28379 found at Fri Jan 8 08:24:24 EST 2016 selfserv_9591 with PID 28379 started at Fri Jan 8 08:24:24 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 08:24:24 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:24:24 EST 2016 ssl.sh: #11572: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 28379 at Fri Jan 8 08:24:24 EST 2016 kill -USR1 28379 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28379 killed at Fri Jan 8 08:24:25 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:24:25 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:24:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:24:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11573: Waiting for Server - FAILED kill -0 28459 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28459 found at Fri Jan 8 08:24:31 EST 2016 selfserv_9591 with PID 28459 started at Fri Jan 8 08:24:31 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 08:24:31 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:24:31 EST 2016 ssl.sh: #11574: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 28459 at Fri Jan 8 08:24:31 EST 2016 kill -USR1 28459 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28459 killed at Fri Jan 8 08:24:32 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 08:24:32 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:24:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:24:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11575: Waiting for Server - FAILED kill -0 28538 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28538 found at Fri Jan 8 08:24:38 EST 2016 selfserv_9591 with PID 28538 started at Fri Jan 8 08:24:38 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 08:24:38 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:24:38 EST 2016 ssl.sh: #11576: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 28538 at Fri Jan 8 08:24:39 EST 2016 kill -USR1 28538 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28538 killed at Fri Jan 8 08:24:39 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:24:39 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:24:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:24:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11577: Waiting for Server - FAILED kill -0 28617 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28617 found at Fri Jan 8 08:24:45 EST 2016 selfserv_9591 with PID 28617 started at Fri Jan 8 08:24:45 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 08:24:45 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:24:46 EST 2016 ssl.sh: #11578: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 28617 at Fri Jan 8 08:24:46 EST 2016 kill -USR1 28617 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28617 killed at Fri Jan 8 08:24:46 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 08:24:46 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:24:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:24:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11579: Waiting for Server - FAILED kill -0 28697 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28697 found at Fri Jan 8 08:24:52 EST 2016 selfserv_9591 with PID 28697 started at Fri Jan 8 08:24:52 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 08:24:52 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:24:53 EST 2016 ssl.sh: #11580: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 28697 at Fri Jan 8 08:24:53 EST 2016 kill -USR1 28697 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28697 killed at Fri Jan 8 08:24:53 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:24:53 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:24:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:24:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11581: Waiting for Server - FAILED kill -0 28805 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28805 found at Fri Jan 8 08:24:59 EST 2016 selfserv_9591 with PID 28805 started at Fri Jan 8 08:24:59 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:24:59 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:25:00 EST 2016 ssl.sh: #11582: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 28805 at Fri Jan 8 08:25:00 EST 2016 kill -USR1 28805 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28805 killed at Fri Jan 8 08:25:00 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:25:00 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:25:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:25:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11583: Waiting for Server - FAILED kill -0 28884 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28884 found at Fri Jan 8 08:25:06 EST 2016 selfserv_9591 with PID 28884 started at Fri Jan 8 08:25:06 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:25:06 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:25:07 EST 2016 ssl.sh: #11584: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 28884 at Fri Jan 8 08:25:07 EST 2016 kill -USR1 28884 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28884 killed at Fri Jan 8 08:25:07 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:25:08 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:25:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:25:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11585: Waiting for Server - FAILED kill -0 28964 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 28964 found at Fri Jan 8 08:25:13 EST 2016 selfserv_9591 with PID 28964 started at Fri Jan 8 08:25:14 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:25:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:25:14 EST 2016 ssl.sh: #11586: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 28964 at Fri Jan 8 08:25:14 EST 2016 kill -USR1 28964 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 28964 killed at Fri Jan 8 08:25:15 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:25:15 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:25:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:25:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11587: Waiting for Server - FAILED kill -0 29043 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29043 found at Fri Jan 8 08:25:21 EST 2016 selfserv_9591 with PID 29043 started at Fri Jan 8 08:25:21 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:25:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:25:21 EST 2016 ssl.sh: #11588: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 29043 at Fri Jan 8 08:25:21 EST 2016 kill -USR1 29043 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29043 killed at Fri Jan 8 08:25:22 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:25:22 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:25:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:25:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11589: Waiting for Server - FAILED kill -0 29122 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29122 found at Fri Jan 8 08:25:28 EST 2016 selfserv_9591 with PID 29122 started at Fri Jan 8 08:25:28 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:25:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:25:28 EST 2016 ssl.sh: #11590: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 29122 at Fri Jan 8 08:25:28 EST 2016 kill -USR1 29122 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29122 killed at Fri Jan 8 08:25:29 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9591 starting at Fri Jan 8 08:25:29 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:25:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:25:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11591: Waiting for Server - FAILED kill -0 29202 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29202 found at Fri Jan 8 08:25:35 EST 2016 selfserv_9591 with PID 29202 started at Fri Jan 8 08:25:35 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 08:25:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:25:35 EST 2016 ssl.sh: #11592: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 29202 at Fri Jan 8 08:25:35 EST 2016 kill -USR1 29202 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29202 killed at Fri Jan 8 08:25:36 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9591 starting at Fri Jan 8 08:25:36 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:25:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:25:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11593: Waiting for Server - FAILED kill -0 29281 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29281 found at Fri Jan 8 08:25:42 EST 2016 selfserv_9591 with PID 29281 started at Fri Jan 8 08:25:42 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 08:25:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:25:42 EST 2016 ssl.sh: #11594: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 29281 at Fri Jan 8 08:25:42 EST 2016 kill -USR1 29281 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29281 killed at Fri Jan 8 08:25:43 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9591 starting at Fri Jan 8 08:25:43 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:25:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:25:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11595: Waiting for Server - FAILED kill -0 29360 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29360 found at Fri Jan 8 08:25:49 EST 2016 selfserv_9591 with PID 29360 started at Fri Jan 8 08:25:49 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 08:25:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:25:49 EST 2016 ssl.sh: #11596: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 29360 at Fri Jan 8 08:25:50 EST 2016 kill -USR1 29360 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29360 killed at Fri Jan 8 08:25:50 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 08:25:50 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:25:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:25:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11597: Waiting for Server - FAILED kill -0 29440 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29440 found at Fri Jan 8 08:25:56 EST 2016 selfserv_9591 with PID 29440 started at Fri Jan 8 08:25:56 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 08:25:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:25:57 EST 2016 ssl.sh: #11598: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 29440 at Fri Jan 8 08:25:57 EST 2016 kill -USR1 29440 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29440 killed at Fri Jan 8 08:25:57 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 08:25:57 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:25:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:26:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11599: Waiting for Server - FAILED kill -0 29519 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29519 found at Fri Jan 8 08:26:03 EST 2016 selfserv_9591 with PID 29519 started at Fri Jan 8 08:26:03 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 08:26:03 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:26:04 EST 2016 ssl.sh: #11600: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 29519 at Fri Jan 8 08:26:04 EST 2016 kill -USR1 29519 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29519 killed at Fri Jan 8 08:26:04 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:26:04 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:26:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:26:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11601: Waiting for Server - FAILED kill -0 29620 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29620 found at Fri Jan 8 08:26:10 EST 2016 selfserv_9591 with PID 29620 started at Fri Jan 8 08:26:10 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 08:26:10 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:26:11 EST 2016 ssl.sh: #11602: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 29620 at Fri Jan 8 08:26:11 EST 2016 kill -USR1 29620 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29620 killed at Fri Jan 8 08:26:11 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:26:11 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:26:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:26:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11603: Waiting for Server - FAILED kill -0 29699 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29699 found at Fri Jan 8 08:26:17 EST 2016 selfserv_9591 with PID 29699 started at Fri Jan 8 08:26:17 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 08:26:17 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:26:18 EST 2016 ssl.sh: #11604: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 29699 at Fri Jan 8 08:26:18 EST 2016 kill -USR1 29699 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29699 killed at Fri Jan 8 08:26:18 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:26:19 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:26:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:26:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11605: Waiting for Server - FAILED kill -0 29778 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29778 found at Fri Jan 8 08:26:24 EST 2016 selfserv_9591 with PID 29778 started at Fri Jan 8 08:26:24 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 08:26:24 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:26:25 EST 2016 ssl.sh: #11606: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 29778 at Fri Jan 8 08:26:25 EST 2016 kill -USR1 29778 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29778 killed at Fri Jan 8 08:26:26 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:26:26 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:26:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:26:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11607: Waiting for Server - FAILED kill -0 29858 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29858 found at Fri Jan 8 08:26:32 EST 2016 selfserv_9591 with PID 29858 started at Fri Jan 8 08:26:32 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 08:26:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:26:32 EST 2016 ssl.sh: #11608: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 29858 at Fri Jan 8 08:26:32 EST 2016 kill -USR1 29858 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29858 killed at Fri Jan 8 08:26:33 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9591 starting at Fri Jan 8 08:26:33 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:26:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:26:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11609: Waiting for Server - FAILED kill -0 29937 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29937 found at Fri Jan 8 08:26:39 EST 2016 selfserv_9591 with PID 29937 started at Fri Jan 8 08:26:39 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 08:26:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:26:39 EST 2016 ssl.sh: #11610: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 29937 at Fri Jan 8 08:26:39 EST 2016 kill -USR1 29937 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29937 killed at Fri Jan 8 08:26:40 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:26:40 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:26:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:26:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11611: Waiting for Server - FAILED kill -0 30016 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30016 found at Fri Jan 8 08:26:46 EST 2016 selfserv_9591 with PID 30016 started at Fri Jan 8 08:26:46 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 08:26:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:26:46 EST 2016 ssl.sh: #11612: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30016 at Fri Jan 8 08:26:46 EST 2016 kill -USR1 30016 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30016 killed at Fri Jan 8 08:26:47 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:26:47 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:26:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:26:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11613: Waiting for Server - FAILED kill -0 30117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30117 found at Fri Jan 8 08:26:53 EST 2016 selfserv_9591 with PID 30117 started at Fri Jan 8 08:26:53 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:26:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:26:54 EST 2016 ssl.sh: #11614: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30117 at Fri Jan 8 08:26:54 EST 2016 kill -USR1 30117 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30117 killed at Fri Jan 8 08:26:54 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9591 starting at Fri Jan 8 08:26:54 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:26:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:27:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11615: Waiting for Server - FAILED kill -0 30196 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30196 found at Fri Jan 8 08:27:00 EST 2016 selfserv_9591 with PID 30196 started at Fri Jan 8 08:27:00 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 08:27:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:27:01 EST 2016 ssl.sh: #11616: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 30196 at Fri Jan 8 08:27:01 EST 2016 kill -USR1 30196 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30196 killed at Fri Jan 8 08:27:01 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:27:01 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:27:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:27:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11617: Waiting for Server - FAILED kill -0 30275 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30275 found at Fri Jan 8 08:27:07 EST 2016 selfserv_9591 with PID 30275 started at Fri Jan 8 08:27:07 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:27:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:27:08 EST 2016 ssl.sh: #11618: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30275 at Fri Jan 8 08:27:08 EST 2016 kill -USR1 30275 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30275 killed at Fri Jan 8 08:27:08 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:27:08 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:27:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:27:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11619: Waiting for Server - FAILED kill -0 30355 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30355 found at Fri Jan 8 08:27:14 EST 2016 selfserv_9591 with PID 30355 started at Fri Jan 8 08:27:14 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:27:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:27:15 EST 2016 ssl.sh: #11620: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30355 at Fri Jan 8 08:27:15 EST 2016 kill -USR1 30355 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30355 killed at Fri Jan 8 08:27:15 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:27:15 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:27:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:27:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11621: Waiting for Server - FAILED kill -0 30449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30449 found at Fri Jan 8 08:27:21 EST 2016 selfserv_9591 with PID 30449 started at Fri Jan 8 08:27:21 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:27:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:27:22 EST 2016 ssl.sh: #11622: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30449 at Fri Jan 8 08:27:22 EST 2016 kill -USR1 30449 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30449 killed at Fri Jan 8 08:27:22 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9591 starting at Fri Jan 8 08:27:23 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:27:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:27:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11623: Waiting for Server - FAILED kill -0 30542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30542 found at Fri Jan 8 08:27:29 EST 2016 selfserv_9591 with PID 30542 started at Fri Jan 8 08:27:29 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:27:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:27:29 EST 2016 ssl.sh: #11624: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30542 at Fri Jan 8 08:27:29 EST 2016 kill -USR1 30542 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30542 killed at Fri Jan 8 08:27:30 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:27:30 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:27:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:27:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11625: Waiting for Server - FAILED kill -0 30622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30622 found at Fri Jan 8 08:27:36 EST 2016 selfserv_9591 with PID 30622 started at Fri Jan 8 08:27:36 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:27:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:27:36 EST 2016 ssl.sh: #11626: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30622 at Fri Jan 8 08:27:36 EST 2016 kill -USR1 30622 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30622 killed at Fri Jan 8 08:27:37 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 08:27:37 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:27:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:27:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11627: Waiting for Server - FAILED kill -0 30701 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30701 found at Fri Jan 8 08:27:43 EST 2016 selfserv_9591 with PID 30701 started at Fri Jan 8 08:27:43 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 08:27:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:27:43 EST 2016 ssl.sh: #11628: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30701 at Fri Jan 8 08:27:43 EST 2016 kill -USR1 30701 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30701 killed at Fri Jan 8 08:27:44 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:27:44 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:27:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:27:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11629: Waiting for Server - FAILED kill -0 30801 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30801 found at Fri Jan 8 08:27:50 EST 2016 selfserv_9591 with PID 30801 started at Fri Jan 8 08:27:50 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 08:27:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:27:50 EST 2016 ssl.sh: #11630: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30801 at Fri Jan 8 08:27:51 EST 2016 kill -USR1 30801 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30801 killed at Fri Jan 8 08:27:51 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:27:51 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:27:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:27:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11631: Waiting for Server - FAILED kill -0 30881 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30881 found at Fri Jan 8 08:27:57 EST 2016 selfserv_9591 with PID 30881 started at Fri Jan 8 08:27:57 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 08:27:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:27:58 EST 2016 ssl.sh: #11632: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 30881 at Fri Jan 8 08:27:58 EST 2016 kill -USR1 30881 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30881 killed at Fri Jan 8 08:27:58 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 08:27:58 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:27:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:28:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11633: Waiting for Server - FAILED kill -0 30974 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30974 found at Fri Jan 8 08:28:04 EST 2016 selfserv_9591 with PID 30974 started at Fri Jan 8 08:28:04 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 08:28:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 08:28:05 EST 2016 ssl.sh: #11634: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 30974 at Fri Jan 8 08:28:05 EST 2016 kill -USR1 30974 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30974 killed at Fri Jan 8 08:28:05 EST 2016 TIMESTAMP ssl END: Fri Jan 8 08:28:05 EST 2016 Running tests for merge TIMESTAMP merge BEGIN: Fri Jan 8 08:28:05 EST 2016 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/tests.v3.18586 -t Test2 -f ../tests.pw merge.sh: #11635: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11636: Merging Dave - PASSED merge.sh: Merging in new user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11637: Merging server - PASSED merge.sh: Merging in new chain certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11638: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11639: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11640: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:25:41 2016 Not After : Fri Jan 08 07:25:41 2021 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:68:e1:a2:0f:a6:e0:57:83:cb:ca:7b:1e:1e:07:02: 10:60:3d:6e:9b:c2:d2:20:0a:60:c8:65:9e:d9:04:38: 2f:ab:09:2a:54:d8:8e:61:c3:bd:8a:04:79:3e:a5:25: ee:8b:73:d1:f6:b1:16:f9:41:bf:ad:87:01:86:b0:f4: f6:eb:8b:b6:b4:26:5e:9b:36:e4:bb:c4:ed:59:28:32: e8:42:06:5b:c7:64:9b:80:97:dc:f6:2f:15:a2:5a:64: 48:9e:a6:9b:de:71:8b:14:aa:1b:0d:ce:4c:18:89:f8: 0e:28:4a:91:e7:c5:ab:e0:30:d9:fc:a2:59:9d:de:5d: d9:d3:80:05:49:d0:53:08:98:3b:13:25:41:1b:2b:17: 05:78:f6:51:bc:20:74:f1:5f:f6:77:7a:6b:57:b9:cf: 9c:8f:17:a1:57:36:ea:c8:34:86:64:d6:ad:81:f7:30: b0:e4:ac:52:b2:b9:68:c0:fe:2c:ff:86:ea:12:45:23: 92:7c:4f:c7:8b:41:da:62:04:87:e2:38:5b:3c:08:72: af:e8:ae:f1:f0:c5:45:44:4c:7d:3d:d5:3c:3a:ad:78: c4:c8:68:7d:96:d2:c0:00:0f:a4:b8:32:ca:e0:4c:20: 3e:a4:35:e5:bd:bc:ee:09:73:57:58:56:d7:28:fb:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:df:74:d5:5c:f3:5f:d7:56:56:e1:0d:88:f6:38:32: e7:06:03:aa:b5:db:28:ae:91:99:13:e6:19:d4:7b:91: 26:7f:29:48:73:01:db:90:6c:a5:5e:83:47:8c:eb:8b: b7:de:c1:62:e7:0e:95:c5:12:e5:c5:08:15:4a:14:1e: 9c:36:bc:c4:ca:ff:e7:3e:7c:9e:fe:a9:f5:a4:3a:6b: 76:8d:01:72:22:07:f2:62:09:36:08:47:12:92:71:11: 29:8f:92:e0:d7:71:da:1c:95:0b:cc:3b:d2:00:ae:a4: a7:ac:3c:cc:ed:20:75:ec:6d:ab:6d:3e:74:89:ab:22: 30:a1:38:7a:c4:10:9b:18:46:b1:27:37:b0:75:65:ae: 30:a0:11:a3:06:0c:e4:68:b7:c0:d5:19:ed:ba:6e:5b: f5:03:6d:91:b6:22:7c:19:88:35:27:99:51:2c:7e:db: 3f:39:0c:53:19:64:8c:32:79:46:00:e0:df:9c:06:ed: 55:8f:ea:06:7a:92:58:d7:6b:4a:7c:93:a4:42:a0:45: 2a:f2:0b:d2:ec:37:8b:6c:05:de:04:c9:7a:78:fc:c7: e4:e9:35:e3:94:11:be:ea:c2:86:ea:d2:08:6b:1f:d4: e7:bd:23:88:ac:33:42:15:aa:46:40:56:49:4e:89:4f Fingerprint (SHA-256): AD:2A:2A:73:3F:70:6C:76:E1:43:1F:B3:FD:40:73:F4:63:DC:95:C7:13:03:99:3B:BA:D7:9A:B5:4A:70:F7:7F Fingerprint (SHA1): F9:AB:84:C6:A1:E3:A6:13:60:CE:34:42:D1:4F:60:7A:A0:8F:D3:3A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #11641: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 07:26:04 2016 Not After : Fri Jan 08 07:26:04 2021 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e7:aa:dd:e9:e2:9b:0c:6c:45:d5:ee:2e:b5:0b:d3: 75:ab:29:01:91:49:ba:13:bf:d9:13:9b:b1:ec:33:ac: 84:7e:da:27:8f:3f:74:ca:a8:56:2f:52:57:49:09:90: f6:ba:f5:c3:6f:51:52:53:84:cc:e6:00:27:2e:55:60: 82:3f:58:c3:d2:38:46:a9:86:0f:89:1c:32:61:7d:2e: 6e:e8:1f:c5:af:54:18:8b:bc:65:26:35:7c:aa:d7:a9: d1:7c:7b:d8:77:47:ca:73:65:46:8a:99:86:51:f3:14: de:02:1b:40:39:8e:9b:97:9e:7d:06:bb:4f:83:2a:4f: ee:3a:e8:93:5c:2b:6f:20:77:ed:ea:d3:0a:22:41:ac: 85:ef:59:e4:4d:c9:21:76:45:2a:6f:a5:b7:ba:4a:55: 1e:00:67:9d:eb:0a:f9:3c:2b:48:13:ef:b1:a5:ee:bb: 77:6f:a2:8e:9c:ee:8d:87:a4:25:97:7e:01:19:e2:66: b0:20:aa:8d:f2:79:ee:03:2f:1a:28:ca:39:54:1c:76: 3f:db:d2:02:3d:94:e9:49:a6:a1:80:fe:77:26:b3:32: de:9c:b5:ae:dc:08:b8:8e:67:55:e5:e4:d3:fb:cb:2e: 8f:2c:1c:58:34:97:1f:77:e9:d2:5b:b4:51:ef:f0:41 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:72:81:11:ff:70:8b:af:26:00:20:55:b6:b0:d6:69: c3:7b:6a:b9:c5:6c:d3:6c:03:f3:85:4e:b0:4c:7e:9a: 34:7e:f0:85:a2:b4:c4:cf:09:5a:06:36:ef:7c:bc:02: ef:3f:b5:df:72:4a:66:0a:54:23:da:f1:1c:90:6b:23: 8f:dc:cf:9a:b4:57:5e:4d:62:98:91:e2:3d:f3:40:c9: 7b:b6:fc:7c:db:22:7b:db:5e:e5:0b:21:e0:05:86:dc: 90:0a:4a:50:bf:93:0f:59:12:6a:6d:9c:eb:33:e8:1e: 08:8b:8e:74:21:7b:a2:79:6d:17:4e:4b:45:03:79:2e: a7:84:99:21:93:c5:24:94:bd:42:30:f0:97:ab:0c:cf: f1:5c:c0:a9:69:92:d8:80:68:71:c8:d6:07:0e:5d:9a: f2:32:45:56:91:18:04:1a:b3:79:06:af:74:af:f8:9f: 8f:57:33:c4:0b:68:e9:0c:4c:56:7f:29:00:a4:c8:2d: c1:b7:c6:0f:a5:f2:4a:d0:8e:ec:7d:62:5b:eb:25:32: 5e:58:6b:2c:d0:2f:32:86:d1:2b:c2:d6:b3:76:6b:f9: 6e:86:46:6f:53:0f:00:a3:08:90:4e:fd:03:57:42:4c: 48:4c:34:94:d0:30:72:85:31:95:0b:47:d0:4b:c7:0a Fingerprint (SHA-256): 67:7D:05:60:5A:6D:97:4F:70:5B:DC:6A:D6:DA:1F:67:08:FF:72:5E:9D:49:72:69:3C:CB:62:49:34:78:80:CC Fingerprint (SHA1): E4:80:06:49:74:69:15:EB:D2:15:24:B0:B5:E7:7E:E1:5F:12:28:CE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #11642: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11643: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, Dave-ec u,u,u TestCA CT,C,C TestCA-ec CT,C,C Alice-dsa u,u,u Alice-ecmixed u,u,u Dave-dsamixed u,u,u Dave-dsa u,u,u Dave-ecmixed u,u,u localhost.localdomain u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-ecmixed u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-ecmixed u,u,u chain-1-clientCA-dsa ,, clientCA T,C,C chain-2-clientCA-ec ,, chain-2-clientCA ,, clientCA-ec T,C,C ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C chain-2-clientCA-dsa ,, clientCA-dsa T,C,C chain-1-clientCA ,, chain-1-clientCA-ec ,, Alice #1 ,, Alice #2 ,, Alice #99 ,, Alice #3 ,, Alice #100 ,, Alice #4 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/tests.v3.18586 -t Test2 -f ../tests.pw merge.sh: #11644: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/tests.v1.18586 -t Test1 -f ../tests.pw merge.sh: #11645: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #11646: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #11647: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #11648: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Fri Jan 08 07:28:26 2016 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 07:13:13 2016 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Fri Jan 08 07:28:19 2016 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #11649: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Fri Jan 8 08:28:23 EST 2016 merge.sh: Testing with shared library =============================== Running tests for cert TIMESTAMP cert BEGIN: Fri Jan 8 08:28:23 EST 2016 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #11650: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -f ../tests.pw cert.sh: #11651: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11652: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11653: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #11654: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -f ../tests.pw cert.sh: #11655: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11656: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11657: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #11658: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11659: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #11660: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11661: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #11662: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -f ../tests.pw cert.sh: #11663: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11664: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11665: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #11666: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11667: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #11668: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11669: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #11670: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11671: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #11672: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11673: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #11674: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11675: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #11676: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11677: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #11678: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11679: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #11680: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11681: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #11682: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11683: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #11684: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11685: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #11686: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11687: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #11688: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11689: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #11690: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11691: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #11692: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11693: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #11694: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11695: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #11696: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11697: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #11698: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw cert.sh: #11699: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11700: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11701: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #11702: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11703: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #11704: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11705: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #11706: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11707: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #11708: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11709: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #11710: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11711: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11712: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #11713: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11714: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #11715: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11716: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #11717: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11718: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #11719: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #11720: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11721: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11722: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #11723: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11724: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11725: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11726: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11727: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw cert.sh: #11728: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11729: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11730: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #11731: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11732: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #11733: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11734: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #11735: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11736: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #11737: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11738: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #11739: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11740: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11741: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #11742: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11743: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #11744: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11745: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #11746: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11747: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11748: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #11749: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11750: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #11751: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11752: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11753: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11754: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11755: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #11756: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw cert.sh: #11757: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11758: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA.ca.cert cert.sh: #11759: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #11760: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-ec.ca.cert cert.sh: #11761: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11762: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #11763: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11764: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11765: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #11766: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11767: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11768: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #11769: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11770: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11771: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #11772: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11773: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11774: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #11775: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11776: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #11777: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11778: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA.ca.cert cert.sh: #11779: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #11780: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-ec.ca.cert cert.sh: #11781: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11782: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #11783: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11784: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11785: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #11786: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11787: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11788: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #11789: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11790: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11791: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #11792: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11793: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11794: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #11795: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11796: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11797: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #11798: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11799: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11800: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #11801: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11802: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11803: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #11804: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11805: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11806: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #11807: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11808: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11809: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #11810: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11811: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #11812: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #11813: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #11814: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating ssl_gtest DB dir cert.sh: Creating database for ssl_gtests cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ssl_gtests --empty-password cert.sh: #11815: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Creating server certs for ssl_gtests cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -S -z ../tests_noise -g 2048 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ssl_gtests -n server -s CN=server -t C,C,C -x -m 1 -w -2 -v 120 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? cert.sh: #11816: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -S -z ../tests_noise -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ssl_gtests -n ecdsa -s CN=ecdsa -t C,C,C -x -m 1 -w -2 -v 120 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? cert.sh: #11817: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw cert.sh: #11818: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11819: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA.ca.cert cert.sh: #11820: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #11821: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #11822: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11823: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #11824: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11825: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11826: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #11827: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11828: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11829: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #11830: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11831: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11832: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #11833: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11834: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11835: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #11836: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11837: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw cert.sh: #11838: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11839: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA.ca.cert cert.sh: #11840: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #11841: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #11842: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11843: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #11844: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11845: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11846: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #11847: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11848: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11849: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #11850: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11851: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11852: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #11853: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11854: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11855: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #11856: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11857: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw cert.sh: #11858: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11859: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA.ca.cert cert.sh: #11860: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #11861: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #11862: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11863: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #11864: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11865: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11866: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #11867: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11868: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11869: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #11870: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11871: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11872: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #11873: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11874: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11875: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #11876: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11877: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw cert.sh: #11878: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11879: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA.ca.cert cert.sh: #11880: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #11881: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #11882: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11883: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #11884: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11885: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11886: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #11887: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11888: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11889: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #11890: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11891: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11892: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #11893: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11894: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11895: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #11896: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11897: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #11898: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #11899: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #11900: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #11901: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #11902: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #11903: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #11904: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #11905: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw cert.sh: #11906: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11907: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #11908: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11909: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw cert.sh: #11910: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11911: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #11912: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11913: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #11914: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11915: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11916: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #11917: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11918: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11919: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #11920: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11921: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw cert.sh: #11922: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11923: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #11924: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #11925: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #11926: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11927: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #11928: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11929: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11930: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #11931: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11932: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11933: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #11934: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11935: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11936: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #11937: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11938: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11939: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #11940: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11941: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:54:fd Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 13:35:32 2016 Not After : Fri Apr 08 13:35:32 2016 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:4b:a0:c4:67:14:92:d7:79:6d:a0:e6:28:ba:8d:e7: cb:72:0b:e1:46:cf:fe:90:f0:78:c9:9e:c2:5c:ad:79: ac:80:d1:ca:70:97:01:1d:c6:c5:c7:22:d3:f6:02:59: 36:68:6a:fe:81:d3:b1:72:da:46:e0:d0:ce:73:49:d5: ce:36:d6:fe:ba:c4:a2:25:51:3c:06:3e:7e:5e:54:de: 89:bf:6e:c3:8b:28:c4:79:7e:59:f1:f5:ea:fd:f4:e4: b5:c3:b6:0e:ce:cb:55:b1:5a:af:da:1c:4e:2e:54:ea: 86:3d:c8:21:39:ce:81:f1:06:3a:c1:5e:17:45:4c:61: 33:52:f9:66:79:d8:81:52:c1:e9:17:89:77:21:b5:10: 79:06:7a:fa:a9:a7:e4:99:aa:ac:33:fa:26:71:81:e3: 28:b6:86:67:59:1b:9a:4a:0b:44:8b:f0:7d:17:72:82: 0d:80:30:72:c8:3d:d9:54:af:ea:77:3b:19:2f:9b:32: f4:29:0f:d9:f0:1b:0c:05:2e:4d:f9:8f:93:1f:3b:65: 08:9f:a3:22:91:b8:6a:0c:39:fb:60:af:db:72:ad:54: c3:48:dc:89:ac:e1:cf:98:5a:b4:91:72:46:50:70:83: 36:8b:f2:ae:c7:ef:53:e1:d2:8a:52:e2:8a:66:2f:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:1b:34:fe:76:76:78:38:96:67:09:2d:93:3d:3a:55: 66:7b:66:ed:8e:c9:ca:ab:87:49:85:5a:ae:05:8e:d3: 37:14:73:17:7d:52:10:4d:10:7b:bc:56:fa:90:d2:79: 9b:6c:e0:e0:cc:73:15:71:b6:de:18:ca:26:1d:41:8b: f4:d7:67:83:57:57:14:b7:54:15:8d:0b:9e:70:0a:dc: c1:96:39:66:cc:c3:53:e0:73:86:e1:43:30:26:04:f3: 1b:62:a4:5a:7c:f7:72:1c:c9:68:a5:6d:66:44:63:ea: f3:a4:56:3b:78:d9:8c:78:fb:27:9d:d0:78:6e:1a:98: 2e:39:c4:ab:79:4e:04:3f:75:7b:31:c0:20:50:e0:08: 1d:ac:b5:43:e8:00:2b:2a:8c:32:09:35:c4:4c:cc:3c: bc:49:bd:5e:a0:48:e5:5b:af:53:bd:93:9a:c2:43:b9: be:4a:b5:3f:e8:ae:a3:a9:72:d5:75:0a:fb:86:f5:4e: dd:b1:40:b7:1e:5b:33:5d:eb:0a:78:40:8d:20:8b:78: c7:84:af:43:d8:6d:c5:4d:50:75:69:cf:78:ec:51:4f: d4:ca:86:33:bc:3d:24:6c:63:0c:34:3f:e9:bb:58:6a: 84:aa:17:81:99:13:42:e0:48:e2:2f:fc:f4:30:1c:c9 Fingerprint (SHA-256): B7:BA:B6:8C:C9:28:A6:B3:AF:3D:F4:87:79:CF:3A:CA:1C:0C:17:DA:22:74:D5:FF:A3:27:F4:7D:66:2B:88:D8 Fingerprint (SHA1): D5:21:EB:20:49:71:65:A4:CC:9A:38:7C:EE:CB:7C:48:D8:B1:FF:BF Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11942: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:55:2c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 13:35:36 2016 Not After : Fri Apr 08 13:35:36 2016 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:31:5f:21:36:68:a1:b0:f6:93:70:b9:cb:c6:bd:a1: 5d:0d:84:c6:58:99:65:69:14:cf:13:89:e4:95:96:38: 8b:11:32:0e:52:5b:30:a3:57:44:eb:c5:1f:4b:35:ce: 68:28:32:3a:55:ee:12:6d:1a:7b:be:74:ee:b6:f1:11: 8a:b5:d5:0d:ba:8c:d1:bb:ab:05:e6:49:2d:47:ed:28: 29:dd:21:64:49:e2:6a:f9:b4:8a:8e:6c:9b:b1:dc:81: f2:76:8c:e8:92:aa:6b:37:d0:f8:ad:5e:a4:51:1e:2d: 85:9c:d4:05:4f:e4:13:6d:a0:ed:d5:51:f0:4f:5a:a8: f0:0a:f5:7e:c8:78:88:db:af:55:0d:89:ed:12:9a:fb: 03:94:c3:d1:e2:d5:3b:6c:a4:1b:d2:9e:da:fa:30:c7: 13:e2:f4:66:9c:d1:e4:ee:dc:58:81:be:d6:c5:c2:bc: e0:c1:9b:96:c6:62:7e:f3:a0:55:c5:d0:82:3f:6c:18: f7:52:ad:c7:38:45:58:18:82:d2:56:93:be:c7:a6:32: 7f:19:a5:76:34:93:66:70:ae:eb:72:db:54:52:1b:1d: e8:57:e9:39:9b:b6:c6:bd:e1:63:45:1d:29:a0:c0:55: dd:20:7e:da:dc:06:92:6c:d4:ff:d6:b3:c7:68:78:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:90:c2:af:9d:d5:d8:cd:aa:97:57:21:db:f1:9d:89: 5d:da:8c:04:2f:38:49:0b:8b:e0:a3:92:6c:1d:16:79: ab:17:35:47:f3:a4:0a:07:14:2b:e1:b4:0f:9b:9d:83: ed:5e:33:c8:a5:d1:19:21:42:90:43:5c:bf:9c:82:b5: 14:71:43:d1:73:9f:92:ed:52:c1:9d:cf:8c:96:ee:67: c5:4b:14:db:da:2f:cc:87:c6:5e:0d:d4:3a:6a:95:37: 9a:6a:94:d8:2c:cf:74:5f:3d:d5:ee:5e:fd:a8:af:35: a9:66:5c:26:73:81:da:99:bd:44:4c:3b:dd:c9:4c:39: ca:c6:99:88:d3:f8:d9:9b:64:a7:04:29:4f:8b:ee:12: d2:74:58:fc:1e:80:23:0e:17:dd:17:9d:1a:5d:4e:d0: 29:e2:fd:f4:a0:e1:6f:48:81:48:80:df:86:16:44:90: c7:3d:b7:05:b5:42:21:fa:a9:ad:43:cc:42:ae:7c:14: 57:73:3b:3d:73:e9:20:3b:8a:79:33:15:be:89:60:cd: 4e:49:a7:ac:8a:a6:31:cd:6a:05:46:7a:ae:9a:54:37: bc:32:af:f1:a9:08:7c:db:2d:c7:ec:9f:a1:5f:66:fe: fa:28:6e:48:30:3e:f7:b5:9d:68:f5:87:6b:68:d7:18 Fingerprint (SHA-256): A6:1F:77:04:35:5C:D9:AE:A0:69:EF:59:10:70:F0:A4:68:13:E9:03:42:22:F2:CF:47:14:55:6C:E1:A9:BA:65 Fingerprint (SHA1): 8F:C9:58:D1:06:F6:BE:C0:2A:32:4C:5B:83:D7:F5:DB:F4:ED:D4:9D Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11943: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:55:34 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 13:35:45 2016 Not After : Fri Apr 08 13:35:45 2016 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:2b:0d:14:96:64:fc:10:32:48:c3:b7:bc:f6:ba:6d: 51:0e:22:4e:14:a7:e5:bf:67:c7:04:da:07:e2:32:b4: 15:ae:3c:99:f6:9c:e7:b0:96:aa:71:1c:a2:5e:9b:51: d6:25:e2:17:90:d4:b2:3a:a0:ae:e1:c2:0c:74:f6:a1: e1:0e:23:92:ad:0e:37:ad:98:68:d3:3d:02:bf:2c:58: 91:fe:c2:b4:e7:0c:9a:e6:66:4c:c0:6d:65:cb:f6:71: 02:6a:97:5d:e3:13:35:21:5e:ac:89:fc:93:5d:eb:63: 37:84:94:b3:7e:85:fe:90:97:83:9f:5b:d0:a5:9e:ed: a2:a5:43:45:6d:ef:0b:dc:d7:a0:f9:66:5c:9a:09:2a: 8a:cb:69:a4:ee:c6:a6:01:b2:18:68:90:8f:bb:76:07: b3:a5:a3:1b:f2:64:3d:5d:42:34:53:f1:b6:3c:77:13: d6:e0:45:9b:08:8b:2f:4e:ad:db:f6:43:c8:96:73:5d: bb:40:c4:c2:8b:99:15:2d:5b:e0:61:10:17:5a:ae:71: 5b:80:3d:5b:09:4e:d6:24:95:62:20:12:65:98:ed:98: 09:0c:7f:17:98:c6:a8:d4:d0:e9:44:f8:dd:d9:4e:de: ff:95:b7:54:06:c4:42:82:e7:24:b1:93:0a:8d:7a:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:3a:4c:dd:4b:fc:da:54:86:3d:34:fc:75:16:9f:43: 82:72:62:c2:70:06:52:a7:95:6d:fd:2e:d8:55:3a:22: 5d:8d:6f:ba:a1:0c:94:a5:70:dd:88:2f:7f:2e:1b:14: 4f:f5:7c:04:f7:b6:0c:76:97:ec:73:0e:c1:5d:62:bc: b1:4e:f5:6c:83:39:57:88:92:d5:37:30:05:2f:e4:30: e1:1e:70:a5:0e:fa:cf:46:a0:7d:96:22:9a:9b:0a:f9: d2:7f:0c:cd:20:72:a7:e0:4e:7c:97:f2:9e:d4:19:03: 23:04:05:80:e2:0e:89:b6:60:ed:39:f1:6c:40:d5:67: a6:c4:49:ce:b1:07:00:70:bf:35:4b:20:ca:ec:73:d8: eb:1d:a9:79:b0:96:3c:cf:03:81:0f:ed:9c:9f:7b:43: 90:b7:5c:87:de:3a:e2:f5:17:67:72:94:f0:71:d8:45: 23:2e:b4:79:fd:10:0c:bf:01:e6:11:dc:73:09:31:55: ed:9a:94:c3:11:ff:87:67:94:99:69:31:91:27:d9:e3: 4f:25:09:a3:2e:ab:70:49:8f:65:09:47:13:ee:08:7f: 1e:04:57:df:b9:eb:c5:62:99:e4:e0:0b:12:fd:6b:9f: b7:ca:f5:91:28:d6:86:75:06:70:68:45:c7:08:8d:f3 Fingerprint (SHA-256): 93:E2:19:FE:92:00:72:51:A4:7E:9D:D5:39:95:98:F6:49:86:F2:D9:A1:7D:DA:4C:52:E5:5F:C7:10:80:5D:F1 Fingerprint (SHA1): A8:FB:0C:EA:7C:76:70:39:D6:2A:DD:10:89:3B:3E:44:D2:87:A6:40 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11944: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:55:45 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 13:36:03 2016 Not After : Fri Apr 08 13:36:03 2016 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:03:10:16:43:ac:c4:9a:ec:47:8c:5a:29:a8:26:3f: 06:54:16:81:f8:50:c8:9e:97:09:b3:84:29:c4:81:71: c1:27:0d:c6:f1:0d:6c:39:bc:13:20:57:c7:86:f6:24: 6f:e8:2b:da:c5:d2:30:08:73:92:1f:1f:7c:be:c0:bc: 7c:e0:e6:d7:78:89:2c:1a:26:a6:6e:21:68:48:21:9f: 1f:8d:1c:d3:1c:34:94:7b:1b:d9:94:91:06:0f:6e:a2: 40:dd:83:bd:59:19:7a:1f:65:db:50:16:05:e0:f9:ea: c1:82:9a:8c:ea:98:87:d9:05:61:f4:97:39:cd:0c:ea: ca:37:04:ad:a9:c3:a2:e3:5f:c6:77:99:a6:1a:35:81: a9:32:e7:7a:94:ec:af:67:a9:db:a8:95:ba:06:69:52: b1:d3:78:9b:17:b4:a1:10:67:97:36:5b:19:68:62:9e: f3:c7:f5:e8:2f:a0:9c:ea:6e:6d:ba:19:2f:c9:ba:35: 27:0a:83:70:32:37:54:d6:77:da:c6:3e:60:a4:18:a2: bb:79:42:ef:7f:b4:dc:5d:c9:0c:4c:7a:7d:ac:de:a9: eb:2a:bd:1f:6c:8f:aa:85:4d:78:ad:d1:2d:d2:73:62: ce:37:f1:b9:bf:67:44:d8:88:e3:c9:57:18:25:45:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:d9:4f:49:3b:97:27:a4:d9:86:7d:4c:6c:64:9e:ae: 95:d4:fb:a2:33:17:1e:45:ca:60:cf:bc:bb:5e:3d:b6: ad:72:00:c3:0d:19:15:d6:33:ad:b9:fb:b4:83:f3:4a: 54:b7:91:7d:c8:5a:fc:36:41:ce:03:ed:f2:e4:fe:e7: 0b:a4:bd:96:a7:b6:1d:42:3e:b4:f3:28:4a:ad:3a:52: 26:5f:70:1c:d4:03:e9:ff:53:c4:70:0c:26:fc:e8:b4: af:7c:c1:e8:d5:0e:28:4e:ae:32:6b:c6:3d:52:14:70: b8:45:06:42:d0:c3:c2:6b:e2:9c:e3:62:68:06:90:60: b3:de:85:f4:64:bf:6e:09:ea:c4:52:3b:d8:7b:3f:94: 71:c2:60:1b:09:bc:48:d5:71:00:eb:59:51:55:9b:04: 66:52:0b:05:bc:92:f0:51:29:26:d8:05:c4:a7:b9:08: 20:17:cb:36:e3:cf:d3:74:b5:cb:e2:c1:66:d2:a4:6c: 4e:fb:e7:88:c2:a8:8d:16:4c:51:be:3d:57:45:c5:cb: c7:89:79:5b:de:78:6d:24:c4:67:5e:98:b5:fc:a0:10: f8:63:42:c9:91:03:47:ea:56:92:ae:79:99:ba:cc:27: f9:f5:a2:ef:ba:0b:93:d2:b6:77:c3:2d:fa:08:6b:25 Fingerprint (SHA-256): C1:19:60:F0:2F:2F:11:A2:26:21:B2:BB:66:E8:F9:2F:45:B8:F8:8E:26:C5:13:1C:1E:53:CF:C6:B1:2D:07:A5 Fingerprint (SHA1): B1:C0:3F:1F:C5:60:69:D5:8D:27:D1:F8:4D:61:A5:78:40:BC:A4:3A Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11945: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:55:68 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 13:36:16 2016 Not After : Fri Apr 08 13:36:16 2016 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:3d:a3:c2:4e:04:a9:78:df:ec:d1:50:57:41:8e:d8: 5c:59:c8:5c:6f:19:8f:77:9f:ca:3b:42:79:73:67:46: 7e:2a:64:d1:54:2e:bb:3b:78:b0:a9:df:8d:54:d9:0c: e8:32:7a:9d:2b:87:7c:04:43:18:4f:3d:96:94:35:92: df:37:d3:50:13:39:bc:ee:c4:2e:19:2b:bf:98:64:db: 89:37:d0:5b:0f:06:5d:dc:1a:20:f4:17:31:19:12:c3: 7e:41:6e:77:4c:11:64:a3:7f:f2:b8:6e:d9:d3:b3:34: 7d:50:aa:4a:99:32:ff:29:11:cf:c5:be:04:a0:ef:65: 3b:a9:30:ae:fc:ef:06:82:1f:64:20:1b:ad:47:7e:76: 97:68:b2:86:d9:b0:5e:93:27:d4:ec:51:46:43:1f:43: 2c:64:83:b5:69:97:2c:b1:c5:5a:8a:a4:d0:e8:f4:3f: 12:38:59:63:36:55:e5:1f:ac:e7:a1:dc:76:e7:0a:04: 60:18:e2:eb:77:a2:7e:c8:71:65:b6:a1:b0:8f:ff:ab: 48:80:e0:13:29:2e:ad:ad:20:a1:9d:93:4d:97:09:a8: 68:aa:0d:b1:58:40:ab:55:29:1e:53:57:4b:0b:48:17: c0:81:f8:5b:66:9d:c7:4d:57:3e:68:20:52:69:8a:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:d0:7a:16:c7:b8:3a:8e:19:af:ee:9e:4d:cb:d2:f2: 5b:a9:fb:ce:bf:a6:64:d3:e0:d5:09:3c:17:c7:66:8b: 92:5a:84:4c:5c:5c:6c:30:c1:f5:0c:f2:e5:b4:52:38: 13:ea:21:fe:67:a5:45:77:bb:4d:3f:59:69:d1:ba:aa: 8c:d1:c2:c3:53:cc:4e:2f:9f:12:22:95:47:99:e1:38: 2b:7c:82:0a:f5:69:f8:26:0c:56:f8:32:31:3b:6b:e2: 6c:1f:61:08:97:04:53:20:20:b0:c8:54:f0:2a:ff:58: cf:b4:46:4b:29:1e:aa:00:3b:38:16:d6:8a:14:12:de: db:b4:1c:9f:d2:f5:99:07:f7:e0:7f:8d:80:3c:e9:48: 16:ea:e7:ae:2e:71:e3:73:ed:15:c1:9c:84:38:b2:68: 30:f5:92:ee:fc:86:5b:05:51:98:54:b8:84:ce:36:b7: 24:1c:fb:00:43:25:8c:c6:45:16:6f:2f:58:49:c2:05: 2c:7f:c3:91:c6:9d:67:84:96:34:57:d9:d0:51:5d:03: 86:36:24:09:0d:d7:ce:b3:89:cf:77:f8:7b:a6:e1:2d: a8:99:30:39:f3:3a:17:9b:39:47:60:ea:bf:3d:e5:df: 39:d3:81:35:ba:9c:2b:c2:8e:fe:61:05:79:9a:f2:a5 Fingerprint (SHA-256): 81:0C:81:A8:D0:7C:DB:78:81:42:BB:C6:35:CF:05:06:A3:BD:74:1A:5A:17:E1:08:61:B0:62:4D:2C:04:C4:4F Fingerprint (SHA1): 46:71:D6:69:85:06:E9:9C:FC:6C:50:5D:C1:7A:AF:1F:69:F2:A0:26 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11946: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:55:80 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 13:36:20 2016 Not After : Fri Apr 08 13:36:20 2016 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:ea:c7:a6:3f:82:07:47:0f:9d:62:12:33:1d:19:1e: 4b:bc:d8:3c:48:52:52:f3:50:43:7f:7f:db:78:b2:1e: c9:cf:6a:05:a4:1c:e6:8b:79:6d:23:c1:38:28:9a:af: b6:ed:d7:8e:fb:4b:f7:af:1d:32:4b:6e:db:49:72:3b: dd:c7:79:fb:49:25:f5:cd:c8:0c:68:1d:2e:81:c6:6d: f0:ed:03:13:5a:81:fe:9e:91:35:22:60:5e:ee:c1:2b: 70:a6:7c:6c:f1:4d:15:01:7b:51:72:47:97:37:f3:9d: 5c:f2:fa:a8:e1:16:ab:56:f5:1c:31:5b:5e:06:f8:6b: 02:84:4a:b8:09:01:e6:a5:4a:e2:00:4b:b9:33:8c:ce: 19:b4:f0:90:bb:03:ab:d6:50:2d:e6:7c:e3:2d:fd:36: ed:38:4b:ba:77:c8:f9:1d:e8:6f:1d:08:b9:17:b4:c3: 52:35:ce:97:e0:19:a7:57:e5:9c:85:cd:0b:fb:b6:ef: a6:59:6a:66:05:87:d8:75:55:7d:42:35:1c:20:85:2e: 40:6a:19:9d:bf:25:86:ec:db:bf:37:10:f5:cc:61:fc: b2:06:b3:b3:a7:ed:ef:ce:73:93:24:ad:78:a5:c1:68: cc:da:23:04:45:d2:4b:3a:39:c6:3e:c7:08:5d:48:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:f2:f7:15:b1:ff:4c:f0:5d:a7:64:bf:99:45:6d:d6: b5:0f:83:82:0c:41:73:e3:e6:c3:1b:cf:00:55:fd:e7: 3d:f0:1a:71:4e:ed:ee:98:73:34:4d:79:ff:a3:bf:d3: b2:31:ee:88:4b:60:56:dc:21:7a:6e:97:7b:a9:cb:c0: f5:a5:e8:81:8e:d0:ad:d3:be:a1:da:2b:09:19:1f:48: 59:5f:df:08:bc:06:e4:bf:98:35:f5:df:aa:a1:c7:ab: 39:11:f8:bc:98:32:40:57:9c:4f:c1:6d:49:14:e7:b0: 2d:25:ef:b8:0a:04:5e:7c:8c:6a:e3:04:ec:79:70:de: f3:62:ac:b0:90:b0:a8:5a:fb:ab:67:fd:9e:79:96:0f: 0d:46:64:cd:50:eb:c9:0c:fa:e0:60:28:e4:9c:d5:a8: 4f:c1:d3:e9:27:99:93:83:f4:02:61:2d:1a:fa:a4:e1: f7:2c:58:98:71:ee:6f:56:c3:1e:70:e8:4b:9f:1c:54: af:bf:ec:e4:f2:b6:fc:6d:57:48:65:8a:b9:bf:82:6a: 26:28:a1:10:b7:af:73:c8:d8:6b:c7:a3:89:9a:c2:3e: 6b:0a:06:12:31:37:f6:2f:79:93:cd:b4:34:9a:1c:e5: 3b:22:ed:0f:e0:21:43:26:e5:c0:53:84:88:d4:72:23 Fingerprint (SHA-256): 30:56:F3:59:00:1E:69:E5:27:8F:4E:78:92:66:38:D4:22:AF:23:96:89:E3:90:AB:DA:CF:55:5C:94:01:55:45 Fingerprint (SHA1): 1C:04:08:7F:B4:1A:82:59:75:51:FD:65:54:D2:3C:1B:4A:BE:00:C8 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11947: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:55:88 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 13:36:34 2016 Not After : Fri Apr 08 13:36:34 2016 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:e9:69:ac:eb:0d:69:f0:80:43:06:a0:12:75:06:5e: 25:2a:e6:d6:a4:09:75:35:78:9e:e7:94:e7:8a:f7:fe: 3b:dc:31:53:52:d0:71:0e:ad:b2:e7:a0:25:41:76:8c: 85:c7:12:8d:e1:51:58:a8:6b:bd:06:5b:cf:c6:41:22: da:00:b7:c2:55:d8:d0:13:e8:d2:7a:1d:7d:77:d2:03: ee:c5:35:59:03:5c:df:84:a2:00:78:4c:83:49:7d:b9: 8f:39:b3:d8:e9:90:20:d3:1e:7b:ee:f8:56:b0:6a:1c: f4:91:23:78:bf:b2:9c:e6:48:01:fe:0f:b9:39:9c:4d: b4:5d:32:fe:ee:75:53:62:6c:b8:06:38:17:bc:df:ff: be:ed:a6:bc:d7:87:21:fa:d1:dd:57:67:a4:c1:e7:41: cf:57:c9:aa:6a:ea:77:82:1d:50:d5:82:ec:c7:ee:28: 51:7d:2b:f5:69:f0:0f:e5:f8:90:29:17:5c:42:e1:7c: e0:42:44:7a:4e:64:de:2e:e5:08:b1:3b:19:6b:13:6a: bb:e6:46:31:66:3c:6f:20:d6:d2:8a:bc:0b:e0:bd:07: a8:16:c7:10:f0:b8:ca:25:5f:aa:23:62:1f:17:73:4a: fa:3e:20:87:2b:e7:f3:f3:14:34:f1:0f:00:4e:c0:29 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:14:2a:f6:72:4c:34:37:8a:25:d4:1c:43:0d:48:eb: 51:f3:72:6a:24:7e:ec:ca:7d:b9:59:19:94:3a:ab:9c: cb:e6:d4:33:83:f0:7d:30:73:9e:2b:d8:73:f5:ab:26: d6:63:a0:9e:41:c0:14:6d:e2:e0:42:af:9a:58:79:c8: 72:ed:c8:8b:3a:8b:92:3a:54:bf:ba:6c:0c:b4:35:21: fd:eb:e9:c5:9a:61:ee:e0:be:cb:32:98:7f:04:17:bf: 94:15:db:d1:a3:32:e8:27:48:c6:de:af:b8:08:a1:b1: d0:68:5c:de:b8:17:57:57:f5:a4:66:2c:53:78:1c:48: db:b8:64:a8:b5:68:04:18:df:1b:a2:6e:24:26:4b:7d: 7a:c1:f8:32:e4:a9:c3:18:3d:95:82:cf:a2:f1:39:ec: 0c:e8:f9:ae:d3:35:56:b3:4d:9b:28:0d:0a:30:6f:4d: 35:ce:db:30:cf:ee:24:6b:d2:7d:df:a7:1f:2b:0a:88: a2:ae:1f:5e:8b:a9:35:3b:64:40:c2:9d:af:0a:7a:8c: 2a:3a:ba:32:33:38:d3:ad:13:e1:f1:e8:71:6d:64:b5: 6d:ce:0c:65:f1:90:6a:de:c4:df:93:58:e4:77:8b:90: 3a:7d:d7:77:6c:55:0a:b7:31:bd:32:ef:a9:27:fa:f5 Fingerprint (SHA-256): 99:12:11:65:0F:8D:1A:9A:9E:A9:D8:EF:EF:93:AC:A6:6D:33:E8:25:64:25:A3:D3:98:4A:81:43:65:71:1E:38 Fingerprint (SHA1): B4:4C:0F:12:90:CF:53:FC:5E:B7:F1:97:3D:C2:5A:BE:ED:82:B4:2A Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11948: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:55:a3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 13:36:40 2016 Not After : Fri Apr 08 13:36:40 2016 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:99:1f:db:02:43:32:ba:2c:99:0e:cf:78:e5:67:b8: 29:39:c5:a4:49:53:73:9e:df:89:d7:66:9d:cc:f2:83: 71:f0:33:0d:04:9b:f6:c2:cf:e6:8e:2b:cb:4f:c6:78: 79:4c:25:a4:42:ab:b9:09:9f:7c:38:49:ab:21:ab:ab: 63:59:8c:c6:00:b2:ad:78:37:8e:53:51:e6:69:a3:04: 86:9a:8a:55:4b:69:56:cb:c1:5d:6c:a0:1f:ae:4c:de: fb:e9:65:35:60:b0:b0:89:28:3c:02:70:63:d7:ff:96: a4:93:b0:98:19:83:2e:08:6c:cf:18:74:69:26:9e:be: f5:bf:96:87:92:5e:12:e5:07:85:de:b4:85:19:bc:a9: 68:b1:65:f5:af:1e:d0:32:26:1e:43:96:c3:85:c1:4e: 5c:00:97:37:47:f3:a2:37:b3:b3:d1:35:93:82:74:df: 5d:9c:1b:15:f2:61:31:ae:de:2a:c4:af:57:01:5d:5b: 7d:48:72:7f:75:34:ae:bf:f3:36:38:5b:10:b4:c4:9d: 5b:06:22:c3:a2:6a:b6:ca:77:05:72:52:6b:36:b7:a7: 93:44:52:d5:92:62:d8:86:7b:4c:70:ac:43:74:ab:a9: 03:e9:04:8c:24:ab:0a:3c:b7:4c:22:ba:22:4c:03:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:44:b2:73:79:54:38:c6:d8:a9:69:1e:e0:18:a7:60: 21:29:65:48:64:f4:e5:b1:73:a6:9a:5f:2b:72:ea:b2: 45:82:4e:62:00:4c:6b:ca:b3:e1:96:14:b8:32:2b:c1: d6:6e:f4:97:61:db:b8:e9:3a:b4:8f:1f:56:ca:02:20: 60:00:ba:dd:3e:34:29:5f:17:36:ed:b3:0b:44:33:a4: 76:e5:dd:dd:cc:02:53:cc:e9:87:e4:ad:3d:d1:f9:2d: 99:3b:f1:74:12:b9:61:12:ba:0a:9e:f7:cc:47:7e:8c: 62:3b:81:37:02:3d:9d:18:d5:13:08:83:b9:9a:3d:5d: 57:57:dc:db:71:d1:e2:e9:66:95:93:e7:8a:dd:f4:cc: f0:99:15:8d:46:ea:99:4a:8d:7b:ca:00:1f:ee:38:00: fd:2c:cd:e6:43:10:ac:ed:01:a9:bb:08:ab:f9:f0:b7: 16:61:90:4a:5d:f2:33:95:5d:95:8d:d4:a5:d3:8d:f0: b1:ff:a3:bb:5e:3d:f1:f7:0c:64:7e:f0:79:24:2d:11: e9:98:1e:7c:ac:63:b0:69:6f:7b:6a:9b:61:87:39:f9: 46:1f:e8:bc:72:81:7a:be:81:2b:2e:7b:d3:1b:21:5d: 67:06:2d:80:ba:e6:3f:11:df:30:dd:10:41:60:ff:a9 Fingerprint (SHA-256): 1C:E8:39:7E:16:07:7F:F0:81:A1:DE:89:EB:CF:85:5A:84:C5:49:A4:62:6F:92:B8:B8:B1:10:22:7B:13:94:01 Fingerprint (SHA1): 33:C4:5E:D1:4C:92:8A:B7:14:CA:57:8C:2B:D5:93:FE:6D:68:77:21 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11949: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:55:af Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 13:36:56 2016 Not After : Fri Apr 08 13:36:56 2016 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:68:61:39:a8:75:56:63:bf:c1:92:0a:81:f0:cd:c4: 95:fc:45:f8:44:23:22:17:d0:97:56:69:27:ed:84:fd: 1a:81:01:e0:27:cd:ff:bc:68:22:19:fc:e4:4d:25:bf: 77:d2:88:4d:57:ca:63:a5:c6:23:2a:8f:ca:a9:5e:80: a5:ab:f2:85:4f:38:12:47:9d:40:a2:b4:21:85:a7:c2: 1b:82:aa:82:ca:9b:e8:83:7f:b8:ce:77:10:2b:21:5c: c2:c3:38:c5:64:23:eb:ee:04:7e:e5:cd:6f:6a:d6:dd: 9f:2b:25:d0:a6:2b:d2:41:06:9c:35:be:10:6f:99:de: 01:f6:00:c9:7b:f2:3a:52:e1:8c:a3:36:17:1c:22:a7: e6:eb:2f:8a:40:24:dc:39:b7:49:c4:c0:1d:71:7e:d5: 04:46:e5:c7:b6:fc:08:17:8b:ae:95:ad:9b:04:69:d7: d2:75:7a:eb:b9:0f:a4:0b:94:79:45:c1:41:6c:df:bd: 3f:70:07:72:c6:4c:bf:e7:d1:17:43:07:b1:a8:a1:1c: ba:10:ae:e1:80:0b:c1:2d:fa:4e:e6:7d:47:3a:f9:7c: a9:7b:a7:bd:a2:cc:ae:6a:2d:71:ef:a7:f5:89:73:9d: 5b:37:45:9b:6b:82:47:71:f9:7e:4b:c4:97:0b:ed:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:e4:74:07:70:90:b9:4a:d1:59:93:74:f9:23:53:26: 05:3f:ab:3c:d0:67:66:d2:5e:79:60:33:90:eb:5d:d0: be:84:10:7f:a6:35:66:44:a5:6c:77:7e:83:d6:fb:b4: 97:3f:65:64:c6:84:4d:72:2b:ca:44:c5:7d:43:09:34: f3:d0:cd:7d:9d:9e:11:96:7d:65:ec:65:0d:0d:82:c0: 59:70:60:ad:1b:f8:1a:12:c1:01:77:23:07:b8:38:e3: c5:9e:67:da:fa:3f:ca:db:2a:1c:0b:79:3a:ae:d0:df: 70:2e:68:d7:af:0f:2c:85:b8:00:f2:1a:1e:85:cc:d7: 32:c3:05:fe:a7:55:ca:b3:90:67:79:be:c8:d9:ae:e1: 54:cf:02:80:94:cb:1a:91:5a:8a:62:90:86:80:cd:ff: a1:26:99:4f:fa:f7:2c:ae:2e:af:0f:f7:28:78:f1:65: 0c:a9:f1:87:81:02:93:d6:3c:7c:98:de:d6:e2:26:a6: 0f:67:3a:0e:c7:13:cf:70:e0:a5:18:8a:e0:9a:78:37: 7d:26:91:86:cd:e6:7c:bc:57:cf:d6:9d:b8:45:c2:5b: 1a:f6:1d:b6:f2:97:7a:9c:6a:b8:ab:18:20:fb:be:60: fb:0b:d4:26:bd:49:f5:60:28:f2:ac:5f:2d:e7:e3:7a Fingerprint (SHA-256): FC:EE:F6:4E:3D:DA:8B:1F:06:03:46:D0:E4:11:F6:71:D7:0B:B8:6B:F6:47:D5:E0:8D:1B:4C:08:82:E0:C6:F3 Fingerprint (SHA1): F6:1D:E8:71:EE:72:9C:4B:6C:58:41:CC:C3:F4:C2:00:DF:79:27:A9 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11950: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:55:cd Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Jan 08 13:37:05 2016 Not After : Fri Apr 08 13:37:05 2016 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:2f:8d:fe:fe:38:f4:8a:58:46:61:7d:2f:f0:1c:c9: 2a:ed:82:7e:af:e5:6d:11:c4:4e:40:2d:6d:24:39:27: 3d:e4:46:e1:40:d8:17:b5:c8:24:a8:9e:d0:5a:f7:c9: 4a:0b:18:f1:95:b4:74:c6:39:b3:fd:eb:1c:4a:26:a1: 84:5a:7f:c8:bc:32:fb:a2:07:69:f6:73:42:02:0f:8f: 0c:87:0c:65:95:47:5f:46:f8:19:e7:91:fd:7a:25:0b: d8:12:da:27:e3:d9:8f:e9:f2:02:38:97:4d:bc:55:98: 54:24:67:b5:a7:52:58:11:21:3a:ac:98:b6:d0:9d:21: 6f:7f:38:87:dc:40:82:82:00:00:d9:be:bc:79:63:31: b8:d3:e5:15:2f:b4:9e:f3:ff:5d:27:bc:e7:11:c2:0c: f1:24:67:41:f3:b2:f8:3f:1b:c5:70:df:69:ba:16:64: 27:c7:8a:17:1e:b5:0c:06:cf:a5:86:6e:5a:3f:e1:2f: 3f:bb:b9:03:c9:58:82:67:cc:e6:e3:8f:96:89:9c:4f: ae:7b:4a:0c:b7:27:28:f7:bb:76:bf:7e:0d:cd:9d:67: 06:94:ea:3d:a4:0a:d9:2f:5f:31:4b:d5:15:32:25:3a: c5:af:14:77:82:b8:17:7a:d1:51:ef:bc:4b:43:3f:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:7c:02:ec:83:cc:f2:04:17:77:1c:c9:ae:5e:a0:b0: ef:a1:01:da:e6:6a:24:48:8f:cb:3a:e9:0b:f7:36:ff: 24:a7:f8:d0:89:60:18:a9:2a:f8:7f:f5:03:15:82:9d: aa:e9:1a:55:12:86:e8:3d:f8:44:04:73:19:d6:89:c0: 78:50:13:b2:f8:4a:f0:d7:18:da:5b:e5:e3:79:6e:dc: a3:4d:c3:71:06:9e:b0:83:7f:2b:08:b4:13:b9:11:29: 16:96:d8:ec:29:c4:92:ea:fa:07:f3:d0:89:16:82:6e: e2:07:39:f1:62:44:29:0d:4d:24:30:dd:2e:f9:dc:63: a8:22:ee:45:8c:d9:ce:2a:b8:3b:1b:a9:f3:16:35:9e: f5:02:00:de:40:1d:7c:27:e7:1e:9f:f2:d0:59:f0:f5: f1:f7:19:78:55:2b:b7:b8:c6:ed:6b:78:ff:fc:97:58: 75:d0:bb:71:da:03:bf:ae:bc:6d:99:43:49:6d:ce:c8: 62:27:da:39:97:df:91:60:39:15:d0:14:f0:95:03:ee: 75:34:15:f4:07:3b:cc:65:f7:67:1c:2e:49:3d:1b:4c: c9:18:58:61:bb:7b:ed:83:36:32:8b:96:fa:52:ba:4d: 02:bc:9d:66:c2:24:b6:ad:69:6e:3e:dc:8a:05:27:b1 Fingerprint (SHA-256): 58:0C:EA:F4:72:EA:F9:CC:66:25:F5:25:C0:30:EB:F9:D0:09:3C:B2:3D:7F:19:87:DC:44:D3:DA:0A:91:7E:9C Fingerprint (SHA1): 96:42:D8:78:43:9E:1C:AE:70:DC:48:28:45:62:23:73:03:25:22:46 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11951: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:55:de Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Jan 08 13:37:12 2016 Not After : Fri Apr 08 13:37:12 2016 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:ae:29:54:da:b5:6e:1b:a2:67:48:de:21:2d:16:52: 4d:3f:bb:14:61:4b:75:6d:2e:70:db:d2:11:91:96:6b: b7:39:d1:63:19:1c:aa:70:15:43:3d:0f:67:ba:38:0b: a7:7e:a1:fc:50:68:80:d8:54:a3:27:be:60:38:58:bf: cd:e0:92:34:55:ff:31:c6:7b:ec:05:1b:98:74:26:7a: 3c:ba:40:a8:40:52:2e:79:2f:83:50:76:6d:e9:60:f9: 98:5b:98:1a:dc:52:b7:3b:e0:3d:7d:05:f6:d1:46:42: 6b:c4:7d:d2:ca:6d:1c:94:2b:9e:3c:61:46:e6:38:3a: d3:c7:26:08:e6:af:1d:c2:64:23:5b:ae:fb:1d:4f:28: cc:37:af:cf:2c:7b:a0:38:f7:e7:0a:41:84:73:9a:51: 2f:88:1d:e0:60:8d:10:10:a2:e6:52:d3:09:2b:40:45: 71:e9:19:39:09:11:39:06:32:2e:ce:7c:2e:5c:3f:6a: ce:cf:e8:48:76:28:b4:7f:4e:82:c3:59:6a:0d:32:f0: ce:60:13:5a:4f:02:56:ff:88:4c:46:f9:39:52:9e:21: 45:db:ff:f9:b2:5e:86:14:26:ca:0c:ee:5b:03:28:f8: 57:2e:99:95:9c:ff:80:a8:2b:b8:eb:7e:8d:af:d8:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:c9:2a:fc:01:8c:1b:a8:61:ad:b5:6b:c3:e3:03:8b: d1:f6:b6:56:01:ea:09:d6:c1:17:7b:09:a0:14:c5:e1: 75:4a:32:94:b1:9f:ae:71:df:fe:f3:f1:0c:aa:48:88: 79:8a:29:fd:ad:2f:2b:9c:58:0d:67:c6:58:b5:db:f1: 00:18:ef:d3:3c:83:cb:53:df:05:a4:22:71:89:8f:1b: e4:00:bb:05:1f:71:33:d6:c9:cb:b5:6d:14:39:29:8e: 93:92:23:b9:6e:88:be:d9:55:fd:17:44:e6:f6:10:1a: ed:a5:1d:c6:88:2b:a9:68:69:90:3e:29:f9:1f:d3:33: 60:7d:e5:08:67:4e:7f:62:7a:13:20:30:39:a5:d5:1e: b6:01:ef:73:06:24:cd:e2:23:99:9c:d4:d0:8a:09:f2: b1:d3:ac:fe:a3:62:62:62:3e:58:c6:c7:db:c5:8b:bc: d1:9d:30:72:61:d0:96:a7:a0:14:4c:f4:4c:9d:b7:51: 3e:3f:bf:68:b0:9b:27:df:50:06:d8:61:da:46:77:84: a4:70:34:c2:b2:08:e8:c5:43:e7:7d:9e:ec:8e:32:52: a7:95:5d:a1:c9:0d:f2:07:b2:14:59:5e:63:1d:9a:af: fc:d4:90:e3:f3:56:91:14:80:e3:af:49:92:48:24:8e Fingerprint (SHA-256): ED:AA:B1:E6:F3:96:11:3B:6A:77:FD:3B:74:2F:F0:72:63:59:99:B5:90:2A:90:B7:4D:30:C2:63:80:A9:0C:55 Fingerprint (SHA1): 19:82:81:48:77:56:D8:92:07:01:4C:9C:76:CB:AD:B0:24:30:52:EA Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11952: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #11953: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #11954: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #11955: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:55:f9 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Jan 08 13:37:30 2016 Not After : Fri Apr 08 13:37:30 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:76:9b:7e:1a:c4:b3:5a:d9:e3:fb:21:b2:be:74:39: 52:dd:2f:56:fa:0a:e6:a2:cd:46:72:0f:a7:1c:1c:65: fc:5a:f6:84:6b:cc:33:bc:93:db:93:09:4d:19:2e:ef: 76:d7:75:0b:ca:ad:cb:f5:1c:bd:aa:3e:bd:d7:39:73: fc:7c:1b:56:0e:b3:1e:75:d5:cf:49:97:70:a9:8b:c2: 6e:f3:97:1d:49:ab:fc:8f:d1:5b:2b:e2:46:56:97:e4: 0d:c5:46:f6:71:5f:5a:97:b0:da:18:27:84:26:6f:6a: d7:aa:9d:9c:70:2b:5d:60:30:a4:ff:2f:19:ee:42:6d: 0f:f5:51:0c:d2:c2:fb:53:87:76:81:1a:2b:c3:91:11: 25:5a:45:ef:8c:cd:1e:4a:70:63:dc:28:90:cc:04:95: 6e:75:3d:9c:35:3d:81:73:23:54:5e:65:44:c5:81:ab: 6d:84:aa:fd:7f:da:de:d8:82:f8:05:79:2d:41:1b:b9: ca:37:50:2a:50:01:2f:b1:60:02:88:48:b0:1f:77:3e: 6b:eb:a1:f2:7b:2b:4a:76:73:4a:de:a4:73:e2:9b:6e: 7e:2c:5a:18:a0:a2:2d:9c:b8:7e:9f:e9:20:52:8a:90: 6c:b7:c6:9b:f8:5c:e7:49:4c:ff:3e:bb:55:de:2d:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:ee:02:78:74:62:e5:54:71:9f:56:26:8d:db:32:b6: bd:16:d6:8b:2a:80:b1:df:de:00:ef:60:3e:3b:bb:d2: 6d:3f:dc:2c:26:1b:7e:ee:86:4d:8a:f9:dd:51:42:36: 1e:e7:46:4c:8a:c1:a3:df:91:82:44:cd:55:cc:dd:ee: b9:f6:fe:53:06:0a:26:e7:ab:6e:ae:a4:5b:3f:fa:41: 73:96:e5:3e:96:73:48:43:3e:ab:25:be:76:7c:83:56: 74:05:0a:fb:e2:20:24:25:61:22:46:2a:13:39:db:fb: eb:3c:4e:c0:58:99:c7:19:5c:16:cf:63:5f:84:b5:02: 30:5b:6d:cd:46:2b:8d:43:be:39:5d:8d:b3:f7:b0:1e: 42:c0:57:21:5e:5b:d0:41:aa:f2:50:cb:65:05:84:94: 28:c7:55:ef:2e:65:26:00:b9:ca:3f:8c:c0:0a:b8:3e: 14:25:f6:3c:25:06:a8:aa:da:58:8c:81:be:80:d6:2c: 27:e6:74:e5:75:cd:67:a0:89:e7:0f:87:23:87:4f:18: 37:e7:fd:0f:3c:ac:a1:08:4d:25:ec:e2:8e:06:50:40: 84:64:39:5a:e2:14:b1:d3:5e:ab:27:f1:18:b0:b2:97: e7:4d:0a:97:4d:b7:c2:2a:a3:91:02:09:16:c9:a8:fb Fingerprint (SHA-256): 03:38:13:7C:47:F3:24:28:34:4D:9B:6E:89:27:12:76:B9:76:B8:6C:B3:D5:73:D3:87:CD:49:77:F3:54:46:DA Fingerprint (SHA1): 87:85:26:41:85:9D:54:83:0F:1F:CD:58:B0:9A:D9:16:A8:25:E9:DE Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11956: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der cert.sh: #11957: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #11958: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #11959: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #11960: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #11961: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #11962: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #11963: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:56:8b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Jan 08 13:38:50 2016 Not After : Fri Apr 08 13:38:50 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:44:9e:f3:83:4d:fa:05:77:e7:a9:04:ea:f0:55:09: 51:a9:d9:3b:82:10:2d:4a:8a:a8:8b:5e:46:5f:4e:9d: 0b:d1:97:4f:92:8b:b2:a1:72:ca:f8:3a:ab:e4:ea:b2: 4a:63:c6:df:86:18:55:5d:a4:0c:87:0e:7b:a2:eb:81: 4c:0b:81:10:10:25:d9:5e:68:2d:1a:1c:c6:88:e8:c2: e8:09:fa:83:41:79:27:28:b9:1e:7f:fc:51:d3:e4:60: 5c:44:14:2c:b8:8b:4d:9d:20:3d:d9:e9:58:1a:af:9d: 32:a9:38:80:19:e1:0e:db:d0:fa:40:5d:50:fd:91:f5: 38:da:85:b0:7f:cb:ae:ed:7a:e0:a1:63:e2:84:d6:0f: 1e:8e:cb:34:c6:0e:31:4c:dc:13:39:0b:3b:3d:23:78: 88:c6:04:50:3d:fa:f7:7c:46:5a:d6:ae:82:db:74:71: ac:76:75:5e:76:ed:4d:9c:81:19:f6:eb:43:78:1f:70: bb:c7:2d:15:ab:28:c0:1d:17:8c:30:b0:4c:e7:1b:46: ac:38:86:28:88:93:86:c2:32:2c:a8:3f:bf:ad:17:54: be:2a:75:af:b2:77:06:ec:94:e5:89:bb:4c:88:95:ac: 2d:9b:09:33:55:47:d1:5c:2d:5c:24:32:ab:2c:b9:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e7:a4:5e:a7:5d:f4:2b:7c:da:6b:65:ac:8c:06:e9: e8:10:9a:c6:70:4c:5e:a9:45:62:6c:df:45:41:73:81: bb:45:b5:26:9f:d9:f2:8f:27:04:e3:f8:37:37:a5:3a: 23:21:07:2f:7b:97:6a:8d:6c:bd:ab:66:dc:36:0d:b2: b8:7f:58:87:45:e5:de:d3:56:0a:15:95:bd:a3:bd:10: ae:9c:fc:4c:53:6c:21:9b:dd:16:a8:ea:26:0c:f1:8f: 2a:91:6f:b9:62:7c:30:16:22:ed:24:fe:2b:5c:9e:6a: 9f:5c:4c:69:8c:d0:fe:ca:07:d8:4c:6f:ae:26:86:ae: 91:6f:0a:4a:27:89:60:9a:c5:96:9f:93:36:ab:84:14: 8f:c5:89:9f:9a:87:3d:7f:87:c6:23:6e:8e:48:cb:ca: ff:02:8d:b3:48:aa:8d:7f:9e:d7:de:90:62:7e:3e:98: 16:b8:75:66:6c:e7:f2:bb:12:ed:12:11:d6:ba:57:03: 74:1d:0d:35:71:98:1b:6f:6d:d9:06:05:58:ca:c3:cd: e7:f1:8c:51:b2:74:f3:5c:70:f9:fe:e5:f4:da:71:eb: f7:d7:cc:9b:87:ab:97:18:eb:70:c3:6c:9a:94:68:78: dd:35:b9:07:98:3c:c8:e1:b5:ff:fb:7a:e9:f7:af:fc Fingerprint (SHA-256): 9D:69:18:64:D8:00:C8:69:19:42:D7:B2:D3:AA:0F:22:4E:19:8B:AB:0B:46:2B:33:3F:9D:EC:B1:02:13:5E:8A Fingerprint (SHA1): CF:3F:7D:6B:94:11:F9:F2:87:8E:21:37:EC:9E:04:18:1C:90:32:96 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11964: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #11965: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #11966: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw cert.sh: #11967: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11968: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11969: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass -o root.cert cert.sh: #11970: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #11971: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11972: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #11973: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #11974: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11975: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA.ca.cert cert.sh: #11976: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #11977: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #11978: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11979: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #11980: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11981: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11982: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #11983: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11984: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11985: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #11986: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11987: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11988: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #11989: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11990: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11991: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #11992: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11993: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #11994: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #11995: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #11996: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #11997: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11998: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #11999: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12000: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #12001: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #12002: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #12003: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #12004: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #12005: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #12006: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12007: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12008: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12009: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12010: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #12011: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12012: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #12013: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12014: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #12015: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12016: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12017: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #12018: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12019: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12020: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #12021: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12022: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12023: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #12024: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12025: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12026: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #12027: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12028: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12029: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #12030: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12031: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12032: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #12033: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12034: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12035: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #12036: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12037: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12038: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #12039: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12040: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12041: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #12042: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12043: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12044: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #12045: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12046: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12047: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #12048: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12049: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12050: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #12051: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12052: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12053: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #12054: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12055: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12056: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #12057: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12058: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12059: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #12060: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12061: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12062: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #12063: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12064: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12065: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #12066: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12067: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12068: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #12069: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12070: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12071: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #12072: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12073: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12074: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #12075: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12076: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12077: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #12078: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12079: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12080: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #12081: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12082: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12083: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #12084: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12085: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12086: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #12087: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12088: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12089: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #12090: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12091: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12092: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #12093: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12094: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12095: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #12096: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12097: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12098: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #12099: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12100: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12101: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #12102: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12103: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12104: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #12105: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12106: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12107: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #12108: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12109: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12110: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #12111: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12112: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12113: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #12114: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12115: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12116: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #12117: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12118: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12119: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #12120: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12121: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12122: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #12123: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12124: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12125: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #12126: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12127: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12128: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #12129: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12130: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12131: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #12132: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12133: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12134: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #12135: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12136: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12137: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #12138: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12139: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12140: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #12141: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12142: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12143: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #12144: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12145: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12146: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #12147: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12148: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12149: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #12150: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12151: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12152: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #12153: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12154: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12155: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #12156: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12157: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12158: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #12159: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12160: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12161: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #12162: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12163: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12164: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #12165: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12166: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12167: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #12168: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12169: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12170: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #12171: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12172: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12173: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #12174: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12175: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12176: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #12177: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12178: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12179: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #12180: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12181: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12182: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #12183: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12184: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12185: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #12186: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12187: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12188: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #12189: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12190: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12191: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #12192: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12193: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12194: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #12195: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12196: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12197: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #12198: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12199: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12200: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #12201: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12202: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12203: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #12204: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12205: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12206: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #12207: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12208: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #12209: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #12210: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #12211: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #12212: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #12213: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #12214: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #12215: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #12216: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #12217: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #12218: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #12219: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #12220: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #12221: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #12222: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #12223: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #12224: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #12225: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Fri Jan 8 08:45:31 EST 2016 Running tests for dbtests TIMESTAMP dbtests BEGIN: Fri Jan 8 08:45:31 EST 2016 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #12226: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #12227: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #12228: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #12229: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #12230: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #12231: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #12232: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_UNRECOGNIZED_OID: Unrecognized Object Identifier. dbtests.sh: #12233: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtests.sh: #12234: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_READ_ONLY: security library: read-only database. dbtests.sh: #12235: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_UNRECOGNIZED_OID: Unrecognized Object Identifier. dbtests.sh: #12236: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #12237: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #12238: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Jan 8 08:45 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir -r--r-----. 1 mockbuild mockbuild 1222 Jan 8 08:45 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1424 Jan 8 08:45 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 578 Jan 8 08:45 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 705 Jan 8 08:45 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 870 Jan 8 08:45 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 206848 Jan 8 08:45 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/cert9.db -r--------. 1 mockbuild mockbuild 102400 Jan 8 08:45 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/key4.db -r--------. 1 mockbuild mockbuild 620 Jan 8 08:45 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/pkcs11.txt -r--r-----. 1 mockbuild mockbuild 394 Jan 8 08:45 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/req --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #12239: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:35 2016 Not After : Fri Jan 08 13:33:35 2021 Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:fa:e9:6a:4f:47:f9:7a:51:04:40:50:28:ce:8b:ac: d4:98:3e:0b:be:7f:df:50:9a:65:a1:b9:47:24:8e:47: 7b:34:2e:6c:3b:a1:83:62:6d:f6:39:09:94:a6:29:6e: e8:56:0d:4d:9f:fe:f3:88:69:1c:80:6d:24:71:e1:51: 6a:f3:43:8d:3a:a0:f4:1f:04:1a:3e:7c:89:7d:41:3a: a7:a7:4a:16:c4:2f:f9:51:30:79:32:e0:48:69:69:ba: fe:c2:be:2f:88:ef:4c:4a:db:ba:f9:6d:e6:ee:17:cf: 4f:3b:66:ce:ba:72:45:f2:ed:e5:33:dc:34:1d:51:97: 2a:fe:2d:28:ab:82:fc:34:9a:b1:49:8b:89:33:b4:e8: c6:b0:e9:8d:8d:f2:62:7b:fd:65:dd:26:d6:d1:ed:12: 95:a3:8f:0f:ab:79:75:21:25:cd:bd:ff:e1:48:6c:9b: cf:4e:26:39:6b:3b:7b:c1:2c:b8:be:ab:d7:b9:63:38: a6:1c:9d:45:34:4f:ff:d2:b3:27:2f:f2:17:57:35:a5: db:27:10:2a:b4:4b:6b:70:b1:e2:1f:60:be:0e:38:90: 9e:7a:ec:e1:2d:19:f0:c7:da:75:45:c9:a1:93:37:ec: 12:d3:fc:1d:c8:0a:c1:bd:cf:8b:a1:8d:60:86:05:b5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:75:9f:75:37:c0:d9:2b:c5:0d:c9:7b:24:17:65:05: ce:aa:8c:2d:52:f3:1a:95:aa:06:c3:00:51:4f:75:91: 24:f4:da:de:35:14:0f:a9:ba:7d:0d:b9:0c:07:8a:9f: 75:fb:7a:e2:5f:a6:82:26:9e:08:36:24:dd:8a:fa:86: a8:e9:46:b1:d9:87:d9:fd:2c:d2:58:68:82:21:1a:27: 94:e6:df:a9:6a:ee:e7:e1:3b:81:81:b3:e2:b8:4f:ca: 20:ce:b8:ec:69:04:05:e0:63:5d:2f:76:70:6e:50:87: c5:36:36:45:e3:73:53:73:d4:37:88:4c:1f:d9:31:b3: 5b:a3:9a:23:12:8a:19:56:09:dc:4c:b1:bb:62:54:b4: a3:39:d3:32:a3:b7:bf:7b:3a:9e:e5:31:52:44:37:c1: 7d:3d:ab:0b:2a:dd:da:40:77:01:fc:01:85:92:31:20: 6a:68:a1:74:0e:dc:27:cf:62:a1:4c:80:c2:98:24:63: 81:96:18:7f:d0:1d:c4:55:2e:6f:d1:0e:81:80:23:b7: 8d:27:e2:56:e1:53:94:53:8f:a8:be:b2:ae:0f:68:60: d8:22:9a:9d:99:69:00:ac:8a:cb:a7:0b:cf:58:25:3b: 54:b1:71:d0:0b:ab:55:4b:f7:89:77:28:0b:5d:87:1b Fingerprint (SHA-256): A5:A4:C2:5B:02:5F:D6:BB:F5:44:10:03:CF:53:DF:FD:9F:BB:B5:1B:A4:28:18:31:0A:22:2C:17:3C:04:9B:8A Fingerprint (SHA1): 44:0A:9B:B6:DB:AC:D0:46:FB:95:76:B0:ED:49:BC:51:61:E4:89:25 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #12240: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED TIMESTAMP dbtests END: Fri Jan 8 08:45:42 EST 2016 Running tests for tools TIMESTAMP tools BEGIN: Fri Jan 8 08:45:42 EST 2016 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12241: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 35:35:51:99:57:59:aa:af:48:4d:5e:35:fb:77:b3:7e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12242: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12243: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12244: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12245: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d1:10:7b:19:69:29:78:02:a9:92:87:7c:38:ed:86:96 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 13:29:56 2016 Not After : Fri Jan 08 13:29:56 2066 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:25:6a:b7:b8:20:a6:88:da:f5:be:08:81:9b:d7: a2:72:10:54:52:b4:56:ed:f7:21:2a:08:f9:c1:05:40: 30:71:f4:60:9b:1c:f8:9a:27:f2:f6:4e:7a:c1:5d:9f: 92:ab:a2:14:5a:c5:62:9f:98:2c:0a:b4:1a:c1:05:03: 5d:92:35:01:47:7c:b5:7d:86:50:7d:53:b5:42:c7:c1: 25:08:b4:4f:9a:54:b1:a0:70:6e:ed:d7:d2:5d:5a:46: 4c:d0:40:85:ec:e8:73:56:49:36:68:27:d0:ac:8c:5b: 94:57:fe:29:eb:d7:5f:9e:17:4b:11:a5:80:c2:cd:d2: df:12:cd:58:e6 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:87:02:42:01:3d:cd:e6:00:0c:89:39:6f:e0:a9: 04:e2:12:73:74:87:34:70:e5:6c:b9:9b:49:8a:97:df: 41:06:29:27:d2:10:ec:0d:66:59:09:94:8f:a3:2b:00: cd:46:07:c2:5b:cd:2f:7c:45:b2:66:78:a7:68:f0:3e: 92:dd:fc:c5:e2:2b:8d:02:41:57:0a:39:49:c3:c3:bd: 17:91:40:33:bc:ef:ef:43:a1:ae:7b:49:73:66:dd:54: 78:1d:49:92:b0:3a:25:e6:14:78:17:81:53:f7:a2:2a: 8d:ca:e9:d0:f2:2c:90:dd:42:37:1f:de:52:6b:7c:6d: dd:20:3d:ea:b9:df:8c:6c:c4:da Fingerprint (SHA-256): 9F:2E:E5:71:79:52:28:7B:02:52:D0:23:C8:56:7D:67:CD:75:22:93:FC:51:22:9E:A1:AC:BF:0C:8C:D1:C7:DB Fingerprint (SHA1): B5:04:5B:2D:AB:E1:29:3B:23:13:C4:19:97:EF:6D:89:5D:8A:F2:7A Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 13:33:26 2016 Not After : Fri Jan 08 13:33:26 2021 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:6d:9e:7d:b6:be:c0:b9:93:eb:07:50:9e:80:7f:07: 06:80:35:b3:bc:d4:f7:50:f1:50:b4:a9:53:8b:47:8e: 4b:dc:4c:f7:c6:1f:76:99:62:63:17:83:71:1c:90:ea: df:6d:a1:ff:3f:91:d6:21:af:3f:69:e3:69:99:f7:56: b6:8f:e5:f2:1b:a8:65:42:41:45:c4:a6:d0:96:cd:7c: 41:74:a6:06:d6:12:5f:91:35:3c:7d:96:5d:4d:39:9c: 4a Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:09:1a:a5:41:a1:8a:54:cf:3f:bf: c4:2e:c7:97:5c:c4:1c:09:63:5d:12:ee:17:46:f6:33: 51:7e:28:0f:25:03:6d:9c:66:e8:e6:1b:6c:e8:1e:0b: e2:86:d3:ba:d9:42:46:47:09:5b:14:7f:72:3b:d6:67: 93:b3:f0:9e:6c:27:60:02:42:01:fe:29:12:f6:44:86: 28:10:05:08:e4:93:63:1e:1e:a2:fd:c8:ce:48:c1:9d: 0e:5c:a6:f1:2a:b0:0b:8a:34:bf:c3:40:be:87:13:e9: f0:0e:a8:01:07:e1:24:6f:50:60:6b:2b:2e:bb:3b:89: 0f:c0:62:f8:4b:ff:58:fa:12:fa:2b Fingerprint (SHA-256): D5:A8:79:BE:66:10:F1:17:EE:07:0B:55:32:CB:B7:66:91:70:9F:6B:B6:BD:51:85:CC:39:AD:DB:D9:BC:FC:03 Fingerprint (SHA1): 0B:3F:41:EA:77:45:C3:0F:2A:D3:67:93:8D:17:AB:1B:F5:48:FF:81 Friendly Name: Alice-ec tools.sh: #12246: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12247: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 51:a9:c2:79:b0:18:22:7b:47:40:85:ba:f2:09:65:7a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12248: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12249: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12250: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 40:45:48:21:6c:67:e5:e4:f9:3f:fd:6d:b0:d2:20:b1 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12251: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12252: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12253: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 59:49:4c:75:1a:45:b6:17:8a:f9:99:47:f5:25:be:aa Iteration Count: 2000 (0x7d0) tools.sh: #12254: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12255: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12256: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2f:34:4d:12:06:06:1d:a0:c2:50:72:34:2e:39:2c:b4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12257: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12258: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12259: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1b:0a:03:06:2c:68:a8:08:5e:ef:a9:f3:c6:f4:82:c3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12260: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12261: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12262: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8e:70:4d:ee:12:76:a2:f4:01:fc:1f:94:89:a9:68:f4 Iteration Count: 2000 (0x7d0) tools.sh: #12263: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12264: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12265: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 39:6a:c8:f9:bc:1d:4f:a0:3f:a9:b7:59:4f:bf:69:b4 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:f1:2c:8c:10:09:de:e2:6d:1a:30:0d:57:60:98: 03:df Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12266: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12267: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12268: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 71:5b:51:ee:59:7d:92:3d:b1:cb:fa:b8:1f:72:3e:2d Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:5e:cd:2e:01:8a:05:ee:9e:b1:13:7d:8a:59:5d: 70:e5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12269: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12270: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12271: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0e:90:5e:18:3d:76:df:27:e1:72:92:28:d9:03:fc:5e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:96:02:eb:95:69:c3:e1:b5:81:7b:7e:86:4f:00: 37:b4 tools.sh: #12272: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12273: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12274: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e1:de:3b:7e:b8:06:af:9e:2f:36:7b:5f:84:f3:6b:d5 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:1c:8a:de:16:49:e6:5d:2f:96:90:b5:28:93:fb: 08:dd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12275: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12276: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12277: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a5:4f:6b:e5:8e:d0:84:50:64:63:56:09:8f:62:ca:d3 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:61:2a:1c:65:5f:b4:ca:60:92:94:b6:42:83:f5: bc:9c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12278: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12279: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12280: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cb:75:f0:a5:13:0b:1d:7a:7a:b5:a9:d1:ba:81:04:1f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:5d:2c:3a:6d:46:25:8c:d1:36:ba:0c:d5:54:cd: 31:73 tools.sh: #12281: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12282: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12283: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d6:b4:d4:9d:fc:86:a2:a0:a1:56:d6:df:40:41:f1:b3 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:46:60:71:96:78:74:71:dd:17:83:ca:4b:73:43: b1:3a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12284: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12285: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12286: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6e:aa:62:30:07:d2:7c:5e:f2:dd:06:f4:50:a5:c2:07 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:dc:24:54:70:28:d4:a8:b8:1c:18:1b:74:50:78: 93:b5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12287: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12288: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12289: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ba:70:da:d8:50:99:de:42:e1:ed:5f:b2:5c:67:81:00 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:1d:6a:0c:08:b3:3b:7c:55:fb:27:95:0b:8e:1f: e2:d9 tools.sh: #12290: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12291: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12292: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 15:e8:18:46:60:99:c1:58:08:1b:1b:3c:7e:a8:a1:ee Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:fc:4d:c6:70:ca:75:8c:b5:07:d4:ba:06:32:5a: e1:66 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12293: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12294: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12295: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 84:fc:05:2f:28:18:4b:2f:89:30:5c:7a:a2:64:0d:78 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:13:26:88:1d:35:38:d9:d9:4b:ab:f0:2b:b5:31: d6:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12296: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12297: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12298: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8e:4e:fb:fc:da:75:36:a0:23:30:04:20:68:b8:f7:bc Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:62:f0:85:c5:65:74:c1:ec:64:d0:81:c2:0e:b0: 96:30 tools.sh: #12299: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12300: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12301: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3f:83:c9:00:3c:0b:dc:f5:a1:f6:32:3e:3e:e4:a3:a1 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:0e:0e:80:e5:da:1c:34:cb:76:02:3b:bf:f9:61: 4e:13 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12302: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12303: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12304: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9b:be:d6:ae:da:89:e7:66:ab:a8:22:7d:a1:37:44:80 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:92:d4:62:d0:96:27:7c:e3:cb:5a:95:48:d8:65: 63:f9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12305: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12306: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12307: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ad:88:f8:d4:f0:ff:2e:86:43:e0:23:35:6c:fe:a5:98 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:7a:e5:59:84:0e:9a:b4:f9:1a:f6:ac:e4:0d:48: 6f:4e tools.sh: #12308: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12309: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12310: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1b:db:a3:58:ac:4d:7c:7d:6c:99:66:ff:6a:4b:3a:34 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:cc:b6:d4:0c:c8:d7:28:bf:33:d1:e7:14:91:0d: 62:f4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12311: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12312: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12313: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ba:83:09:e0:0c:3d:d0:34:21:ba:99:ad:53:a3:25:45 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:fc:45:24:4c:8a:3f:ef:ef:88:3a:e1:b7:a5:01: 6d:d4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12314: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12315: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12316: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4e:5e:62:28:a9:57:a5:62:98:69:6e:a4:fc:26:5b:44 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:67:53:ab:b3:54:91:ea:df:28:97:32:5f:c1:18: 1d:1a tools.sh: #12317: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12318: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12319: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 34:3e:25:84:6f:27:ba:60:8a:cc:be:9b:40:e5:2e:e6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12320: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12321: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12322: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: b5:52:7a:70:93:34:48:d2:76:52:87:d6:c2:fa:4b:5d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12323: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12324: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12325: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 00:eb:30:d1:9e:65:30:6e:47:dc:af:2a:c4:00:0c:9e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12326: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12327: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12328: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: e5:76:f8:26:60:21:dd:62:4e:ce:72:1e:9d:65:22:c6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12329: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12330: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12331: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a8:14:4f:e1:23:51:14:77:81:48:82:74:25:47:1f:4c Iteration Count: 2000 (0x7d0) tools.sh: #12332: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12333: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12334: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: dd:f4:ca:23:c2:95:db:aa:ff:32:29:b2:fa:ed:69:45 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12335: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12336: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12337: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 38:8f:5d:98:3f:0b:f4:72:5f:4a:8a:a1:53:04:de:15 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12338: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12339: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12340: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: e9:02:16:bf:e9:bc:91:5e:cf:be:8e:fb:6e:40:ed:b0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12341: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12342: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12343: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 37:32:15:c3:cf:32:bb:2d:98:90:40:da:48:04:52:98 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12344: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12345: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12346: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ad:95:47:b4:bc:41:a8:d4:73:94:e6:46:8f:9e:c4:21 Iteration Count: 2000 (0x7d0) tools.sh: #12347: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12348: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12349: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 43:df:c0:83:4d:dc:ee:f3:23:ec:20:9f:97:dc:f7:1f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12350: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12351: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12352: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7a:5f:d9:15:3a:e4:58:69:8e:f8:f8:85:44:c7:dc:13 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12353: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12354: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12355: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ba:a4:3d:9c:9f:81:97:9c:49:e1:d8:7a:5b:98:1a:d3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12356: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12357: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12358: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 27:22:ad:e0:f9:47:96:da:a2:7a:f5:73:88:83:c9:ef Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12359: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12360: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12361: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fc:e6:ff:87:cf:fd:b3:5c:0e:2b:46:2f:dc:59:5a:00 Iteration Count: 2000 (0x7d0) tools.sh: #12362: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12363: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12364: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2c:76:be:bb:c2:45:d6:14:b0:52:76:40:0e:7d:d8:94 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12365: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12366: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12367: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b2:74:f5:57:b5:6a:b6:d3:0a:e5:53:9f:84:b0:35:54 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12368: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12369: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12370: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 38:ab:6d:72:d2:7b:82:74:20:6c:f9:c1:ce:e0:35:71 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12371: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12372: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12373: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e5:98:bc:61:dc:8e:dd:5f:7d:d9:71:68:a7:db:76:bc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12374: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12375: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12376: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3b:9f:66:01:1e:56:d2:fb:b6:47:7d:af:0c:37:31:9d Iteration Count: 2000 (0x7d0) tools.sh: #12377: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12378: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12379: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1e:56:fd:5a:20:b9:76:87:40:47:f7:4d:42:92:78:88 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12380: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12381: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12382: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8c:e8:e3:ea:91:6f:ed:b3:7d:b6:a7:fa:32:43:52:af Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12383: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12384: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12385: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d5:6b:e4:92:61:8d:e5:2e:4b:bc:3b:2c:02:5b:23:35 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12386: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12387: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12388: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 53:78:8f:02:4e:e1:f9:96:48:4d:0b:e0:f0:ec:f6:b8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12389: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12390: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12391: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 13:25:0c:6b:88:36:f3:f7:71:ef:65:27:43:23:d4:5c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12392: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12393: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12394: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: da:6c:cf:36:dc:90:05:c2:cf:5b:75:fb:35:85:3e:0b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12395: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12396: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12397: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fc:20:54:20:1c:6d:3b:80:ad:a5:b4:35:ec:f8:d9:ea Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12398: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12399: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12400: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 38:97:c1:e2:5c:44:6c:37:2f:94:01:91:fa:18:af:3a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12401: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12402: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12403: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3c:15:92:ea:ea:92:58:e5:05:b0:98:28:31:ef:4c:d4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12404: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12405: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12406: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6f:1f:e8:ba:b7:c6:b6:75:ce:51:01:3a:b3:db:62:5c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:28:27 2016 Not After : Fri Jan 08 13:28:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1b:0b:dc:03:36:63:ed:51:44:6d:06:f0:e4:ed:15: b2:70:cd:e3:79:2e:88:7b:48:33:cb:fd:29:7e:66:43: f6:d2:b5:9a:a6:67:43:44:42:84:9d:49:4e:eb:34:91: dc:c6:16:7d:e6:06:37:c6:fd:89:6b:9e:32:ae:b3:b8: 15:9c:9e:4d:2c:27:fe:64:98:ae:a0:cf:d6:78:19:4e: 8a:62:91:10:af:f8:be:18:48:07:d1:25:58:29:c7:1c: c6:07:65:69:d7:89:ef:6d:80:38:15:fd:55:76:ec:5e: ff:1e:8f:c4:6e:6e:bf:b2:9a:b6:c6:d5:2d:c5:f6:34: 71:01:b9:98:0c:fd:e5:f0:07:30:32:f6:86:2b:02:64: 16:4c:58:70:b2:58:15:63:76:0c:b5:e2:0e:55:44:74: fa:84:f1:8a:73:ee:b0:f9:32:6c:c9:31:23:b9:19:f2: 79:72:3e:62:51:7f:e2:ff:f4:c4:39:05:3c:77:4e:05: c0:3e:d8:28:20:e8:5d:19:60:76:14:ec:a6:22:f5:73: 69:87:79:81:50:89:24:c8:bd:63:00:0e:05:8b:6b:fb: 5d:54:f8:c5:38:37:2c:d8:3f:5d:41:d0:d8:43:d0:e5: ed:3d:8b:46:95:ae:cd:43:85:e7:61:14:72:bc:b3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2b:fb:06:8d:f8:6d:b3:38:f3:51:22:f6:c0:63:20: 7b:9b:be:f1:ec:d6:64:5c:97:95:14:9c:f5:bb:9d:43: 65:f1:74:5a:d9:5a:50:ec:80:90:0d:90:9a:4d:d6:2d: 1d:7a:57:89:ef:00:8e:cb:e9:f0:ee:1b:b1:aa:5b:7f: b5:42:f6:59:5b:8b:3c:ef:7f:b9:4c:d3:48:2c:56:04: d8:b5:86:18:6b:d7:95:47:c1:dc:a0:37:33:43:17:e0: 09:bb:49:76:13:42:3d:79:e7:7f:ed:03:bc:2d:a8:bd: bd:4b:fc:25:5a:05:a2:13:5f:03:d1:aa:52:6c:bd:ee: 4e:c3:d5:79:f6:80:2d:4e:a4:ac:87:7f:f6:5f:e5:3d: 1b:78:68:ae:8e:fc:bd:17:3b:1e:4e:64:46:33:d8:c8: 69:e1:9b:72:ab:9f:cf:ba:37:fd:45:ce:9c:e9:fd:de: 37:ec:a0:77:6a:60:99:3f:be:73:d3:8b:78:3f:d0:67: bb:27:f4:46:93:75:0a:29:32:9d:f4:75:ce:09:8e:41: 54:e7:f1:70:a0:7f:85:e2:12:a1:88:ed:4c:5e:7c:99: 8f:2c:bd:c3:cc:6d:cd:71:bf:7c:2a:58:78:8e:32:09: f6:bc:8c:c4:c7:5b:b2:a7:d6:00:96:43:6d:56:24:ff Fingerprint (SHA-256): 82:EA:6E:F3:47:E6:2C:B6:B9:6D:42:52:C4:AF:D2:AB:0E:C7:5D:C2:35:E0:95:59:C8:1F:09:11:EC:25:06:9B Fingerprint (SHA1): FC:CF:FD:63:CF:87:FC:2E:9F:32:A6:71:12:7B:31:B4:BE:FF:91:0A Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:33:18 2016 Not After : Fri Jan 08 13:33:18 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:fb:f0:36:80:a2:6b:c4:66:23:c6:ce:58:e5:cd:43: cf:53:1c:57:82:d6:20:fa:f9:af:ac:52:39:ab:6f:f7: 11:57:c1:4e:87:1c:90:fd:4f:1d:6a:62:e0:c8:b2:c4: b2:d2:04:fd:ce:dc:43:e9:a9:77:aa:c7:c7:81:92:9f: d9:9d:37:d1:08:8d:78:1e:d7:26:96:55:cc:99:2f:0d: 10:19:74:db:48:1e:dd:ac:92:82:71:5a:af:28:51:c3: 12:f2:88:b9:05:3e:11:04:7c:e9:46:53:cc:d5:f2:ed: 64:5e:04:e6:34:3e:37:8b:c1:4a:68:2d:cd:65:ae:4e: 7d:cf:4b:c6:e9:a9:75:47:0e:12:a8:fc:b9:45:ba:d9: 7d:64:d0:6e:c6:af:b4:d3:82:df:4c:b2:a3:2a:65:0b: 6c:9a:c3:26:7b:f4:2a:ab:6f:04:9e:ea:8a:7e:bf:27: 05:4e:34:b4:df:7d:2f:9f:c1:79:32:43:e3:39:44:69: e3:48:ae:1d:45:63:35:96:aa:f8:cb:74:49:26:de:15: ae:12:34:85:00:3f:a8:75:ac:9c:ae:0a:4c:87:3b:89: 6b:1d:8b:a0:c9:32:2b:9d:58:d0:99:2b:28:42:11:ce: 73:ee:3a:e8:c8:dc:20:0a:be:16:93:f0:a4:4b:78:51 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:98:2a:88:e4:4a:fd:df:4c:24:a3:4a:f0:57:3a:3b: 3f:ae:6b:c9:22:9c:ce:0d:74:3c:a5:64:7d:64:73:bc: fc:2a:8e:82:00:c1:af:51:76:55:8c:cb:c7:69:17:82: 78:93:33:3b:2b:ab:1b:69:5f:ec:cd:61:20:f6:fd:5b: 20:98:7e:35:0d:70:c4:14:1b:06:4a:5d:e3:14:5c:70: 1b:a0:48:44:43:94:15:ab:ef:c0:05:66:81:03:c1:54: 03:99:13:82:e4:e9:e9:b6:41:21:39:ba:d2:00:40:55: 2a:fb:38:f1:7d:9e:73:7b:a9:38:09:55:95:78:c5:ec: 1b:e9:ae:1e:3c:72:ed:f8:10:57:9c:dc:4c:8b:72:de: c1:b8:6e:bb:a7:41:69:8c:59:5c:ae:cc:f1:47:b3:ab: 24:d5:ce:9a:ae:62:e8:92:e9:b7:1e:c9:44:6c:f0:34: 80:a1:d8:6a:89:41:54:58:b0:65:d0:95:e0:46:91:7b: 79:6d:df:8f:fe:46:70:36:3d:52:9d:31:75:b2:bd:b0: 35:eb:2f:45:77:17:72:cc:1c:0f:53:b3:cc:82:10:ac: e3:05:2e:eb:03:29:d9:8e:d7:f7:c9:c3:88:62:99:cf: c6:21:31:3e:95:76:7f:2e:f0:44:ca:12:ec:cb:5a:28 Fingerprint (SHA-256): F5:F7:62:6D:5D:5D:0E:6D:6A:22:A4:84:59:83:20:DB:C5:8A:2B:D6:DC:38:A4:F6:62:C1:FD:15:9E:19:B5:04 Fingerprint (SHA1): B6:36:8E:E9:0C:43:15:42:56:2B:A0:1E:B3:00:A8:23:85:ED:66:72 Friendly Name: Alice tools.sh: #12407: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12408: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #12409: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12410: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #12411: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #12412: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #12413: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #12414: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #12415: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #12416: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #12417: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Fri Jan 8 08:47:45 EST 2016 Running tests for fips TIMESTAMP fips BEGIN: Fri Jan 8 08:47:45 EST 2016 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #12418: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #12419: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa e8a79c8a5437a1cb7a4739bb79598debff6178e4 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #12420: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #12421: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #12422: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #12423: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #12424: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #12425: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #12426: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #12427: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #12428: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12429: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #12430: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa e8a79c8a5437a1cb7a4739bb79598debff6178e4 FIPS_PUB_140_Test_Certificate fips.sh: #12431: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #12432: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #12433: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12434: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #12435: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa e8a79c8a5437a1cb7a4739bb79598debff6178e4 FIPS_PUB_140_Test_Certificate fips.sh: #12436: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #12437: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #12438: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle Changing byte 0x00032fe4 (208868): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle dbtest -r -d ../fips fips.sh: #12439: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Fri Jan 8 08:48:56 EST 2016 Running tests for crmf TIMESTAMP crmf BEGIN: Fri Jan 8 08:48:56 EST 2016 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #12440: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #12441: CMMF test . - PASSED TIMESTAMP crmf END: Fri Jan 8 08:48:57 EST 2016 Running tests for smime TIMESTAMP smime BEGIN: Fri Jan 8 08:48:57 EST 2016 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #12442: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12443: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #12444: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #12445: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #12446: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #12447: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12448: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #12449: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #12450: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #12451: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #12452: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12453: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #12454: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #12455: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #12456: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #12457: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12458: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #12459: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #12460: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #12461: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #12462: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12463: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #12464: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #12465: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #12466: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #12467: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12468: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #12469: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #12470: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #12471: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #12472: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12473: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #12474: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #12475: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #12476: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #12477: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12478: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #12479: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #12480: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #12481: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #12482: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #12483: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #12484: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #12485: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #12486: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #12487: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #12488: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #12489: Decrypt with a Multiple Email cert . - PASSED smime.sh: #12490: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #12491: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #12492: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #12493: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #12494: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #12495: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #12496: Decode Encrypted-Data . - PASSED smime.sh: #12497: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #12498: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #12499: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #12500: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #12501: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #12502: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Fri Jan 8 08:49:31 EST 2016 Running tests for ssl TIMESTAMP ssl BEGIN: Fri Jan 8 08:49:31 EST 2016 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:49:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:49:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:49:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12503: Waiting for Server - FAILED kill -0 8374 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8374 found at Fri Jan 8 08:49:37 EST 2016 selfserv_9591 with PID 8374 started at Fri Jan 8 08:49:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12504: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 8374 at Fri Jan 8 08:49:37 EST 2016 kill -USR1 8374 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8374 killed at Fri Jan 8 08:49:38 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:49:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:49:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:49:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12505: Waiting for Server - FAILED kill -0 8442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8442 found at Fri Jan 8 08:49:44 EST 2016 selfserv_9591 with PID 8442 started at Fri Jan 8 08:49:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12506: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 8442 at Fri Jan 8 08:49:44 EST 2016 kill -USR1 8442 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8442 killed at Fri Jan 8 08:49:45 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:49:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:49:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:49:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12507: Waiting for Server - FAILED kill -0 8511 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8511 found at Fri Jan 8 08:49:51 EST 2016 selfserv_9591 with PID 8511 started at Fri Jan 8 08:49:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12508: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 8511 at Fri Jan 8 08:49:51 EST 2016 kill -USR1 8511 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8511 killed at Fri Jan 8 08:49:51 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:49:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:49:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:49:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12509: Waiting for Server - FAILED kill -0 8591 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8591 found at Fri Jan 8 08:49:57 EST 2016 selfserv_9591 with PID 8591 started at Fri Jan 8 08:49:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12510: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 8591 at Fri Jan 8 08:49:58 EST 2016 kill -USR1 8591 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8591 killed at Fri Jan 8 08:49:58 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:49:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:49:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:50:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12511: Waiting for Server - FAILED kill -0 8659 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8659 found at Fri Jan 8 08:50:04 EST 2016 selfserv_9591 with PID 8659 started at Fri Jan 8 08:50:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12512: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 8659 at Fri Jan 8 08:50:05 EST 2016 kill -USR1 8659 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8659 killed at Fri Jan 8 08:50:05 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:50:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:50:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:50:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12513: Waiting for Server - FAILED kill -0 8728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8728 found at Fri Jan 8 08:50:11 EST 2016 selfserv_9591 with PID 8728 started at Fri Jan 8 08:50:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12514: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 8728 at Fri Jan 8 08:50:12 EST 2016 kill -USR1 8728 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8728 killed at Fri Jan 8 08:50:12 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:50:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:50:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:50:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12515: Waiting for Server - FAILED kill -0 8808 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8808 found at Fri Jan 8 08:50:18 EST 2016 selfserv_9591 with PID 8808 started at Fri Jan 8 08:50:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12516: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 8808 at Fri Jan 8 08:50:19 EST 2016 kill -USR1 8808 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8808 killed at Fri Jan 8 08:50:19 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:50:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:50:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:50:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12517: Waiting for Server - FAILED kill -0 8876 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8876 found at Fri Jan 8 08:50:25 EST 2016 selfserv_9591 with PID 8876 started at Fri Jan 8 08:50:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12518: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 8876 at Fri Jan 8 08:50:26 EST 2016 kill -USR1 8876 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8876 killed at Fri Jan 8 08:50:26 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:50:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:50:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:50:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12519: Waiting for Server - FAILED kill -0 8945 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8945 found at Fri Jan 8 08:50:32 EST 2016 selfserv_9591 with PID 8945 started at Fri Jan 8 08:50:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12520: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 8945 at Fri Jan 8 08:50:33 EST 2016 kill -USR1 8945 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8945 killed at Fri Jan 8 08:50:33 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:50:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:50:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:50:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12521: Waiting for Server - FAILED kill -0 9025 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9025 found at Fri Jan 8 08:50:39 EST 2016 selfserv_9591 with PID 9025 started at Fri Jan 8 08:50:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12522: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 9025 at Fri Jan 8 08:50:40 EST 2016 kill -USR1 9025 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9025 killed at Fri Jan 8 08:50:40 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:50:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:50:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:50:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12523: Waiting for Server - FAILED kill -0 9093 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9093 found at Fri Jan 8 08:50:46 EST 2016 selfserv_9591 with PID 9093 started at Fri Jan 8 08:50:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12524: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 9093 at Fri Jan 8 08:50:46 EST 2016 kill -USR1 9093 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9093 killed at Fri Jan 8 08:50:47 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:50:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:50:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:50:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12525: Waiting for Server - FAILED kill -0 9162 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9162 found at Fri Jan 8 08:50:53 EST 2016 selfserv_9591 with PID 9162 started at Fri Jan 8 08:50:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12526: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 9162 at Fri Jan 8 08:50:53 EST 2016 kill -USR1 9162 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9162 killed at Fri Jan 8 08:50:54 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:50:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:50:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:50:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12527: Waiting for Server - FAILED kill -0 9242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9242 found at Fri Jan 8 08:51:00 EST 2016 selfserv_9591 with PID 9242 started at Fri Jan 8 08:51:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12528: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 9242 at Fri Jan 8 08:51:00 EST 2016 kill -USR1 9242 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9242 killed at Fri Jan 8 08:51:01 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:51:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:51:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:51:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12529: Waiting for Server - FAILED kill -0 9310 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9310 found at Fri Jan 8 08:51:07 EST 2016 selfserv_9591 with PID 9310 started at Fri Jan 8 08:51:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12530: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 9310 at Fri Jan 8 08:51:07 EST 2016 kill -USR1 9310 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9310 killed at Fri Jan 8 08:51:08 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:51:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:51:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:51:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12531: Waiting for Server - FAILED kill -0 9379 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9379 found at Fri Jan 8 08:51:14 EST 2016 selfserv_9591 with PID 9379 started at Fri Jan 8 08:51:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12532: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 9379 at Fri Jan 8 08:51:14 EST 2016 kill -USR1 9379 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9379 killed at Fri Jan 8 08:51:15 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:51:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:51:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:51:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12533: Waiting for Server - FAILED kill -0 9459 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9459 found at Fri Jan 8 08:51:21 EST 2016 selfserv_9591 with PID 9459 started at Fri Jan 8 08:51:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12534: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 9459 at Fri Jan 8 08:51:21 EST 2016 kill -USR1 9459 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9459 killed at Fri Jan 8 08:51:21 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:51:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:51:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:51:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12535: Waiting for Server - FAILED kill -0 9527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9527 found at Fri Jan 8 08:51:27 EST 2016 selfserv_9591 with PID 9527 started at Fri Jan 8 08:51:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12536: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 9527 at Fri Jan 8 08:51:28 EST 2016 kill -USR1 9527 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9527 killed at Fri Jan 8 08:51:28 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:51:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:51:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:51:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12537: Waiting for Server - FAILED kill -0 9596 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9596 found at Fri Jan 8 08:51:34 EST 2016 selfserv_9591 with PID 9596 started at Fri Jan 8 08:51:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12538: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 9596 at Fri Jan 8 08:51:35 EST 2016 kill -USR1 9596 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9596 killed at Fri Jan 8 08:51:35 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:51:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:51:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:51:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12539: Waiting for Server - FAILED kill -0 9676 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9676 found at Fri Jan 8 08:51:41 EST 2016 selfserv_9591 with PID 9676 started at Fri Jan 8 08:51:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12540: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 9676 at Fri Jan 8 08:51:42 EST 2016 kill -USR1 9676 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9676 killed at Fri Jan 8 08:51:42 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:51:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:51:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:51:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12541: Waiting for Server - FAILED kill -0 9744 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9744 found at Fri Jan 8 08:51:48 EST 2016 selfserv_9591 with PID 9744 started at Fri Jan 8 08:51:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12542: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 9744 at Fri Jan 8 08:51:49 EST 2016 kill -USR1 9744 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9744 killed at Fri Jan 8 08:51:49 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:51:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:51:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:51:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12543: Waiting for Server - FAILED kill -0 9813 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9813 found at Fri Jan 8 08:51:55 EST 2016 selfserv_9591 with PID 9813 started at Fri Jan 8 08:51:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12544: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 9813 at Fri Jan 8 08:51:56 EST 2016 kill -USR1 9813 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9813 killed at Fri Jan 8 08:51:56 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:51:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:51:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:52:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12545: Waiting for Server - FAILED kill -0 9893 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9893 found at Fri Jan 8 08:52:02 EST 2016 selfserv_9591 with PID 9893 started at Fri Jan 8 08:52:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12546: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 9893 at Fri Jan 8 08:52:03 EST 2016 kill -USR1 9893 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9893 killed at Fri Jan 8 08:52:03 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:52:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:52:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:52:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12547: Waiting for Server - FAILED kill -0 9961 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9961 found at Fri Jan 8 08:52:09 EST 2016 selfserv_9591 with PID 9961 started at Fri Jan 8 08:52:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12548: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 9961 at Fri Jan 8 08:52:10 EST 2016 kill -USR1 9961 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9961 killed at Fri Jan 8 08:52:10 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:52:10 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:52:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:52:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12549: Waiting for Server - FAILED kill -0 10030 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10030 found at Fri Jan 8 08:52:16 EST 2016 selfserv_9591 with PID 10030 started at Fri Jan 8 08:52:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12550: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 10030 at Fri Jan 8 08:52:17 EST 2016 kill -USR1 10030 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10030 killed at Fri Jan 8 08:52:17 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:52:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:52:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:52:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12551: Waiting for Server - FAILED kill -0 10110 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10110 found at Fri Jan 8 08:52:23 EST 2016 selfserv_9591 with PID 10110 started at Fri Jan 8 08:52:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12552: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 10110 at Fri Jan 8 08:52:23 EST 2016 kill -USR1 10110 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10110 killed at Fri Jan 8 08:52:24 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:52:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:52:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:52:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12553: Waiting for Server - FAILED kill -0 10178 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10178 found at Fri Jan 8 08:52:30 EST 2016 selfserv_9591 with PID 10178 started at Fri Jan 8 08:52:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12554: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 10178 at Fri Jan 8 08:52:30 EST 2016 kill -USR1 10178 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10178 killed at Fri Jan 8 08:52:31 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:52:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:52:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:52:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12555: Waiting for Server - FAILED kill -0 10247 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10247 found at Fri Jan 8 08:52:37 EST 2016 selfserv_9591 with PID 10247 started at Fri Jan 8 08:52:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12556: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 10247 at Fri Jan 8 08:52:37 EST 2016 kill -USR1 10247 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10247 killed at Fri Jan 8 08:52:38 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:52:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:52:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:52:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12557: Waiting for Server - FAILED kill -0 10327 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10327 found at Fri Jan 8 08:52:44 EST 2016 selfserv_9591 with PID 10327 started at Fri Jan 8 08:52:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12558: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 10327 at Fri Jan 8 08:52:44 EST 2016 kill -USR1 10327 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10327 killed at Fri Jan 8 08:52:45 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:52:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:52:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:52:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12559: Waiting for Server - FAILED kill -0 10395 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10395 found at Fri Jan 8 08:52:51 EST 2016 selfserv_9591 with PID 10395 started at Fri Jan 8 08:52:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12560: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 10395 at Fri Jan 8 08:52:51 EST 2016 kill -USR1 10395 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10395 killed at Fri Jan 8 08:52:52 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:52:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:52:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:52:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12561: Waiting for Server - FAILED kill -0 10464 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10464 found at Fri Jan 8 08:52:58 EST 2016 selfserv_9591 with PID 10464 started at Fri Jan 8 08:52:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12562: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 10464 at Fri Jan 8 08:52:58 EST 2016 kill -USR1 10464 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10464 killed at Fri Jan 8 08:52:59 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:52:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:52:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:53:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12563: Waiting for Server - FAILED kill -0 10544 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10544 found at Fri Jan 8 08:53:05 EST 2016 selfserv_9591 with PID 10544 started at Fri Jan 8 08:53:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12564: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 10544 at Fri Jan 8 08:53:05 EST 2016 kill -USR1 10544 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10544 killed at Fri Jan 8 08:53:05 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:53:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:53:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:53:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12565: Waiting for Server - FAILED kill -0 10612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10612 found at Fri Jan 8 08:53:11 EST 2016 selfserv_9591 with PID 10612 started at Fri Jan 8 08:53:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12566: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 10612 at Fri Jan 8 08:53:12 EST 2016 kill -USR1 10612 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10612 killed at Fri Jan 8 08:53:12 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:53:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:53:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:53:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12567: Waiting for Server - FAILED kill -0 10681 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10681 found at Fri Jan 8 08:53:18 EST 2016 selfserv_9591 with PID 10681 started at Fri Jan 8 08:53:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12568: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 10681 at Fri Jan 8 08:53:19 EST 2016 kill -USR1 10681 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10681 killed at Fri Jan 8 08:53:19 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:53:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:53:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:53:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12569: Waiting for Server - FAILED kill -0 10761 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10761 found at Fri Jan 8 08:53:25 EST 2016 selfserv_9591 with PID 10761 started at Fri Jan 8 08:53:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12570: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 10761 at Fri Jan 8 08:53:26 EST 2016 kill -USR1 10761 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10761 killed at Fri Jan 8 08:53:26 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:53:26 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:53:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:53:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12571: Waiting for Server - FAILED kill -0 10829 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10829 found at Fri Jan 8 08:53:32 EST 2016 selfserv_9591 with PID 10829 started at Fri Jan 8 08:53:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12572: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 10829 at Fri Jan 8 08:53:33 EST 2016 kill -USR1 10829 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10829 killed at Fri Jan 8 08:53:33 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:53:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:53:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:53:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12573: Waiting for Server - FAILED kill -0 10898 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10898 found at Fri Jan 8 08:53:39 EST 2016 selfserv_9591 with PID 10898 started at Fri Jan 8 08:53:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12574: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 10898 at Fri Jan 8 08:53:40 EST 2016 kill -USR1 10898 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10898 killed at Fri Jan 8 08:53:40 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:53:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:53:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:53:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12575: Waiting for Server - FAILED kill -0 10978 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10978 found at Fri Jan 8 08:53:46 EST 2016 selfserv_9591 with PID 10978 started at Fri Jan 8 08:53:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12576: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 10978 at Fri Jan 8 08:53:47 EST 2016 kill -USR1 10978 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10978 killed at Fri Jan 8 08:53:47 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:53:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:53:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:53:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12577: Waiting for Server - FAILED kill -0 11046 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11046 found at Fri Jan 8 08:53:53 EST 2016 selfserv_9591 with PID 11046 started at Fri Jan 8 08:53:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12578: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 11046 at Fri Jan 8 08:53:54 EST 2016 kill -USR1 11046 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11046 killed at Fri Jan 8 08:53:54 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:53:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:53:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:53:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12579: Waiting for Server - FAILED kill -0 11117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11117 found at Fri Jan 8 08:54:00 EST 2016 selfserv_9591 with PID 11117 started at Fri Jan 8 08:54:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12580: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 11117 at Fri Jan 8 08:54:00 EST 2016 kill -USR1 11117 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11117 killed at Fri Jan 8 08:54:01 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:54:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:54:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:54:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12581: Waiting for Server - FAILED kill -0 11197 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11197 found at Fri Jan 8 08:54:07 EST 2016 selfserv_9591 with PID 11197 started at Fri Jan 8 08:54:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12582: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 11197 at Fri Jan 8 08:54:07 EST 2016 kill -USR1 11197 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11197 killed at Fri Jan 8 08:54:08 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:54:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:54:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:54:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12583: Waiting for Server - FAILED kill -0 11265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11265 found at Fri Jan 8 08:54:14 EST 2016 selfserv_9591 with PID 11265 started at Fri Jan 8 08:54:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12584: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 11265 at Fri Jan 8 08:54:14 EST 2016 kill -USR1 11265 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11265 killed at Fri Jan 8 08:54:15 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:54:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:54:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:54:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12585: Waiting for Server - FAILED kill -0 11334 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11334 found at Fri Jan 8 08:54:21 EST 2016 selfserv_9591 with PID 11334 started at Fri Jan 8 08:54:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12586: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 11334 at Fri Jan 8 08:54:21 EST 2016 kill -USR1 11334 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11334 killed at Fri Jan 8 08:54:22 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:54:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:54:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:54:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12587: Waiting for Server - FAILED kill -0 11414 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11414 found at Fri Jan 8 08:54:28 EST 2016 selfserv_9591 with PID 11414 started at Fri Jan 8 08:54:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12588: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 11414 at Fri Jan 8 08:54:28 EST 2016 kill -USR1 11414 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11414 killed at Fri Jan 8 08:54:29 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:54:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:54:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:54:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12589: Waiting for Server - FAILED kill -0 11483 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11483 found at Fri Jan 8 08:54:35 EST 2016 selfserv_9591 with PID 11483 started at Fri Jan 8 08:54:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12590: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 11483 at Fri Jan 8 08:54:35 EST 2016 kill -USR1 11483 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11483 killed at Fri Jan 8 08:54:36 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:54:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:54:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:54:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12591: Waiting for Server - FAILED kill -0 11551 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11551 found at Fri Jan 8 08:54:42 EST 2016 selfserv_9591 with PID 11551 started at Fri Jan 8 08:54:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12592: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 11551 at Fri Jan 8 08:54:42 EST 2016 kill -USR1 11551 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11551 killed at Fri Jan 8 08:54:42 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:54:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:54:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:54:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12593: Waiting for Server - FAILED kill -0 11631 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11631 found at Fri Jan 8 08:54:49 EST 2016 selfserv_9591 with PID 11631 started at Fri Jan 8 08:54:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12594: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 11631 at Fri Jan 8 08:54:49 EST 2016 kill -USR1 11631 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11631 killed at Fri Jan 8 08:54:49 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:54:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:54:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:54:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12595: Waiting for Server - FAILED kill -0 11700 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11700 found at Fri Jan 8 08:54:55 EST 2016 selfserv_9591 with PID 11700 started at Fri Jan 8 08:54:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12596: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 11700 at Fri Jan 8 08:54:56 EST 2016 kill -USR1 11700 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11700 killed at Fri Jan 8 08:54:56 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:54:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:54:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:55:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12597: Waiting for Server - FAILED kill -0 11769 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11769 found at Fri Jan 8 08:55:02 EST 2016 selfserv_9591 with PID 11769 started at Fri Jan 8 08:55:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12598: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 11769 at Fri Jan 8 08:55:03 EST 2016 kill -USR1 11769 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11769 killed at Fri Jan 8 08:55:03 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:55:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:55:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:55:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12599: Waiting for Server - FAILED kill -0 11849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11849 found at Fri Jan 8 08:55:09 EST 2016 selfserv_9591 with PID 11849 started at Fri Jan 8 08:55:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12600: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 11849 at Fri Jan 8 08:55:10 EST 2016 kill -USR1 11849 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11849 killed at Fri Jan 8 08:55:10 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:55:10 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:55:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:55:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12601: Waiting for Server - FAILED kill -0 11918 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11918 found at Fri Jan 8 08:55:16 EST 2016 selfserv_9591 with PID 11918 started at Fri Jan 8 08:55:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12602: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 11918 at Fri Jan 8 08:55:17 EST 2016 kill -USR1 11918 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11918 killed at Fri Jan 8 08:55:17 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:55:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:55:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:55:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12603: Waiting for Server - FAILED kill -0 11986 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11986 found at Fri Jan 8 08:55:23 EST 2016 selfserv_9591 with PID 11986 started at Fri Jan 8 08:55:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12604: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 11986 at Fri Jan 8 08:55:24 EST 2016 kill -USR1 11986 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11986 killed at Fri Jan 8 08:55:24 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:55:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:55:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:55:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12605: Waiting for Server - FAILED kill -0 12066 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12066 found at Fri Jan 8 08:55:30 EST 2016 selfserv_9591 with PID 12066 started at Fri Jan 8 08:55:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12606: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 12066 at Fri Jan 8 08:55:31 EST 2016 kill -USR1 12066 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12066 killed at Fri Jan 8 08:55:31 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:55:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:55:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:55:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12607: Waiting for Server - FAILED kill -0 12135 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12135 found at Fri Jan 8 08:55:37 EST 2016 selfserv_9591 with PID 12135 started at Fri Jan 8 08:55:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12608: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12135 at Fri Jan 8 08:55:38 EST 2016 kill -USR1 12135 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12135 killed at Fri Jan 8 08:55:38 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:55:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:55:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:55:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12609: Waiting for Server - FAILED kill -0 12203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12203 found at Fri Jan 8 08:55:44 EST 2016 selfserv_9591 with PID 12203 started at Fri Jan 8 08:55:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12610: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 12203 at Fri Jan 8 08:55:44 EST 2016 kill -USR1 12203 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12203 killed at Fri Jan 8 08:55:45 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:55:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:55:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:55:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12611: Waiting for Server - FAILED kill -0 12283 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12283 found at Fri Jan 8 08:55:51 EST 2016 selfserv_9591 with PID 12283 started at Fri Jan 8 08:55:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12612: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12283 at Fri Jan 8 08:55:51 EST 2016 kill -USR1 12283 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12283 killed at Fri Jan 8 08:55:52 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:55:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:55:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:55:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12613: Waiting for Server - FAILED kill -0 12352 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12352 found at Fri Jan 8 08:55:58 EST 2016 selfserv_9591 with PID 12352 started at Fri Jan 8 08:55:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12614: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12352 at Fri Jan 8 08:55:58 EST 2016 kill -USR1 12352 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12352 killed at Fri Jan 8 08:55:59 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:55:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:55:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:56:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12615: Waiting for Server - FAILED kill -0 12420 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12420 found at Fri Jan 8 08:56:05 EST 2016 selfserv_9591 with PID 12420 started at Fri Jan 8 08:56:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12616: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12420 at Fri Jan 8 08:56:05 EST 2016 kill -USR1 12420 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12420 killed at Fri Jan 8 08:56:06 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:56:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:56:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:56:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12617: Waiting for Server - FAILED kill -0 12500 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12500 found at Fri Jan 8 08:56:12 EST 2016 selfserv_9591 with PID 12500 started at Fri Jan 8 08:56:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12618: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12500 at Fri Jan 8 08:56:12 EST 2016 kill -USR1 12500 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12500 killed at Fri Jan 8 08:56:13 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:56:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:56:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:56:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12619: Waiting for Server - FAILED kill -0 12569 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12569 found at Fri Jan 8 08:56:19 EST 2016 selfserv_9591 with PID 12569 started at Fri Jan 8 08:56:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12620: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12569 at Fri Jan 8 08:56:19 EST 2016 kill -USR1 12569 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12569 killed at Fri Jan 8 08:56:20 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:56:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:56:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:56:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12621: Waiting for Server - FAILED kill -0 12637 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12637 found at Fri Jan 8 08:56:26 EST 2016 selfserv_9591 with PID 12637 started at Fri Jan 8 08:56:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12622: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12637 at Fri Jan 8 08:56:26 EST 2016 kill -USR1 12637 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12637 killed at Fri Jan 8 08:56:26 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:56:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:56:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:56:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12623: Waiting for Server - FAILED kill -0 12717 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12717 found at Fri Jan 8 08:56:32 EST 2016 selfserv_9591 with PID 12717 started at Fri Jan 8 08:56:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12624: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 12717 at Fri Jan 8 08:56:33 EST 2016 kill -USR1 12717 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12717 killed at Fri Jan 8 08:56:33 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:56:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:56:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:56:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12625: Waiting for Server - FAILED kill -0 12786 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12786 found at Fri Jan 8 08:56:39 EST 2016 selfserv_9591 with PID 12786 started at Fri Jan 8 08:56:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12626: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 12786 at Fri Jan 8 08:56:40 EST 2016 kill -USR1 12786 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12786 killed at Fri Jan 8 08:56:40 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:56:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:56:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:56:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12627: Waiting for Server - FAILED kill -0 12854 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12854 found at Fri Jan 8 08:56:46 EST 2016 selfserv_9591 with PID 12854 started at Fri Jan 8 08:56:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12628: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 12854 at Fri Jan 8 08:56:47 EST 2016 kill -USR1 12854 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12854 killed at Fri Jan 8 08:56:47 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:56:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:56:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:56:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12629: Waiting for Server - FAILED kill -0 12934 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12934 found at Fri Jan 8 08:56:53 EST 2016 selfserv_9591 with PID 12934 started at Fri Jan 8 08:56:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12630: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 12934 at Fri Jan 8 08:56:54 EST 2016 kill -USR1 12934 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12934 killed at Fri Jan 8 08:56:54 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:56:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:56:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:57:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12631: Waiting for Server - FAILED kill -0 13003 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13003 found at Fri Jan 8 08:57:00 EST 2016 selfserv_9591 with PID 13003 started at Fri Jan 8 08:57:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12632: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13003 at Fri Jan 8 08:57:01 EST 2016 kill -USR1 13003 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13003 killed at Fri Jan 8 08:57:01 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:57:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:57:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:57:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12633: Waiting for Server - FAILED kill -0 13071 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13071 found at Fri Jan 8 08:57:07 EST 2016 selfserv_9591 with PID 13071 started at Fri Jan 8 08:57:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12634: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13071 at Fri Jan 8 08:57:08 EST 2016 kill -USR1 13071 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13071 killed at Fri Jan 8 08:57:08 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:57:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:57:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:57:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12635: Waiting for Server - FAILED kill -0 13151 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13151 found at Fri Jan 8 08:57:14 EST 2016 selfserv_9591 with PID 13151 started at Fri Jan 8 08:57:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12636: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13151 at Fri Jan 8 08:57:15 EST 2016 kill -USR1 13151 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13151 killed at Fri Jan 8 08:57:15 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:57:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:57:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:57:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12637: Waiting for Server - FAILED kill -0 13220 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13220 found at Fri Jan 8 08:57:21 EST 2016 selfserv_9591 with PID 13220 started at Fri Jan 8 08:57:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12638: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13220 at Fri Jan 8 08:57:21 EST 2016 kill -USR1 13220 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13220 killed at Fri Jan 8 08:57:22 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:57:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:57:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:57:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12639: Waiting for Server - FAILED kill -0 13288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13288 found at Fri Jan 8 08:57:28 EST 2016 selfserv_9591 with PID 13288 started at Fri Jan 8 08:57:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12640: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13288 at Fri Jan 8 08:57:28 EST 2016 kill -USR1 13288 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13288 killed at Fri Jan 8 08:57:29 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:57:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:57:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:57:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12641: Waiting for Server - FAILED kill -0 13368 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13368 found at Fri Jan 8 08:57:35 EST 2016 selfserv_9591 with PID 13368 started at Fri Jan 8 08:57:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12642: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13368 at Fri Jan 8 08:57:35 EST 2016 kill -USR1 13368 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13368 killed at Fri Jan 8 08:57:36 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:57:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:57:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:57:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12643: Waiting for Server - FAILED kill -0 13437 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13437 found at Fri Jan 8 08:57:42 EST 2016 selfserv_9591 with PID 13437 started at Fri Jan 8 08:57:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12644: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13437 at Fri Jan 8 08:57:42 EST 2016 kill -USR1 13437 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13437 killed at Fri Jan 8 08:57:43 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:57:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:57:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:57:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12645: Waiting for Server - FAILED kill -0 13507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13507 found at Fri Jan 8 08:57:49 EST 2016 selfserv_9591 with PID 13507 started at Fri Jan 8 08:57:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12646: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 13507 at Fri Jan 8 08:57:49 EST 2016 kill -USR1 13507 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13507 killed at Fri Jan 8 08:57:50 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:57:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:57:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:57:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12647: Waiting for Server - FAILED kill -0 13587 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13587 found at Fri Jan 8 08:57:56 EST 2016 selfserv_9591 with PID 13587 started at Fri Jan 8 08:57:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12648: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13587 at Fri Jan 8 08:57:56 EST 2016 kill -USR1 13587 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13587 killed at Fri Jan 8 08:57:57 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:57:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:57:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:58:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12649: Waiting for Server - FAILED kill -0 13656 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13656 found at Fri Jan 8 08:58:03 EST 2016 selfserv_9591 with PID 13656 started at Fri Jan 8 08:58:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12650: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13656 at Fri Jan 8 08:58:03 EST 2016 kill -USR1 13656 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13656 killed at Fri Jan 8 08:58:03 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:58:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:58:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:58:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12651: Waiting for Server - FAILED kill -0 13724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13724 found at Fri Jan 8 08:58:09 EST 2016 selfserv_9591 with PID 13724 started at Fri Jan 8 08:58:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12652: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13724 at Fri Jan 8 08:58:10 EST 2016 kill -USR1 13724 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13724 killed at Fri Jan 8 08:58:10 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:58:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:58:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:58:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12653: Waiting for Server - FAILED kill -0 13804 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13804 found at Fri Jan 8 08:58:16 EST 2016 selfserv_9591 with PID 13804 started at Fri Jan 8 08:58:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12654: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13804 at Fri Jan 8 08:58:17 EST 2016 kill -USR1 13804 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13804 killed at Fri Jan 8 08:58:17 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:58:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:58:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:58:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12655: Waiting for Server - FAILED kill -0 13873 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13873 found at Fri Jan 8 08:58:23 EST 2016 selfserv_9591 with PID 13873 started at Fri Jan 8 08:58:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12656: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13873 at Fri Jan 8 08:58:24 EST 2016 kill -USR1 13873 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13873 killed at Fri Jan 8 08:58:24 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:58:24 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:58:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:58:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12657: Waiting for Server - FAILED kill -0 13941 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13941 found at Fri Jan 8 08:58:30 EST 2016 selfserv_9591 with PID 13941 started at Fri Jan 8 08:58:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12658: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 13941 at Fri Jan 8 08:58:31 EST 2016 kill -USR1 13941 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13941 killed at Fri Jan 8 08:58:31 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:58:31 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:58:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:58:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12659: Waiting for Server - FAILED kill -0 14021 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14021 found at Fri Jan 8 08:58:37 EST 2016 selfserv_9591 with PID 14021 started at Fri Jan 8 08:58:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12660: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14021 at Fri Jan 8 08:58:38 EST 2016 kill -USR1 14021 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14021 killed at Fri Jan 8 08:58:38 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:58:38 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:58:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:58:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12661: Waiting for Server - FAILED kill -0 14090 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14090 found at Fri Jan 8 08:58:44 EST 2016 selfserv_9591 with PID 14090 started at Fri Jan 8 08:58:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12662: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14090 at Fri Jan 8 08:58:45 EST 2016 kill -USR1 14090 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14090 killed at Fri Jan 8 08:58:45 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:58:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:58:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:58:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12663: Waiting for Server - FAILED kill -0 14158 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14158 found at Fri Jan 8 08:58:51 EST 2016 selfserv_9591 with PID 14158 started at Fri Jan 8 08:58:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12664: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14158 at Fri Jan 8 08:58:52 EST 2016 kill -USR1 14158 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14158 killed at Fri Jan 8 08:58:52 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:58:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:58:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:58:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12665: Waiting for Server - FAILED kill -0 14238 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14238 found at Fri Jan 8 08:58:58 EST 2016 selfserv_9591 with PID 14238 started at Fri Jan 8 08:58:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12666: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14238 at Fri Jan 8 08:58:59 EST 2016 kill -USR1 14238 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14238 killed at Fri Jan 8 08:58:59 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:58:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:58:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:59:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12667: Waiting for Server - FAILED kill -0 14307 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14307 found at Fri Jan 8 08:59:05 EST 2016 selfserv_9591 with PID 14307 started at Fri Jan 8 08:59:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12668: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14307 at Fri Jan 8 08:59:05 EST 2016 kill -USR1 14307 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14307 killed at Fri Jan 8 08:59:06 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9591 starting at Fri Jan 8 08:59:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:59:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:59:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12669: Waiting for Server - FAILED kill -0 14375 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14375 found at Fri Jan 8 08:59:12 EST 2016 selfserv_9591 with PID 14375 started at Fri Jan 8 08:59:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12670: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14375 at Fri Jan 8 08:59:12 EST 2016 kill -USR1 14375 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14375 killed at Fri Jan 8 08:59:13 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:59:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:59:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:59:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12671: Waiting for Server - FAILED kill -0 14456 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14456 found at Fri Jan 8 08:59:19 EST 2016 selfserv_9591 with PID 14456 started at Fri Jan 8 08:59:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12672: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14456 at Fri Jan 8 08:59:19 EST 2016 kill -USR1 14456 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14456 killed at Fri Jan 8 08:59:20 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:59:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:59:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:59:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12673: Waiting for Server - FAILED kill -0 14525 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14525 found at Fri Jan 8 08:59:26 EST 2016 selfserv_9591 with PID 14525 started at Fri Jan 8 08:59:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12674: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14525 at Fri Jan 8 08:59:26 EST 2016 kill -USR1 14525 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14525 killed at Fri Jan 8 08:59:27 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:59:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:59:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:59:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12675: Waiting for Server - FAILED kill -0 14593 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14593 found at Fri Jan 8 08:59:33 EST 2016 selfserv_9591 with PID 14593 started at Fri Jan 8 08:59:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12676: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14593 at Fri Jan 8 08:59:33 EST 2016 kill -USR1 14593 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14593 killed at Fri Jan 8 08:59:34 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:59:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:59:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:59:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12677: Waiting for Server - FAILED kill -0 14673 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14673 found at Fri Jan 8 08:59:40 EST 2016 selfserv_9591 with PID 14673 started at Fri Jan 8 08:59:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12678: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14673 at Fri Jan 8 08:59:40 EST 2016 kill -USR1 14673 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14673 killed at Fri Jan 8 08:59:41 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:59:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:59:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:59:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12679: Waiting for Server - FAILED kill -0 14742 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14742 found at Fri Jan 8 08:59:47 EST 2016 selfserv_9591 with PID 14742 started at Fri Jan 8 08:59:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12680: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14742 at Fri Jan 8 08:59:47 EST 2016 kill -USR1 14742 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14742 killed at Fri Jan 8 08:59:47 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 08:59:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:59:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 08:59:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12681: Waiting for Server - FAILED kill -0 14810 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14810 found at Fri Jan 8 08:59:53 EST 2016 selfserv_9591 with PID 14810 started at Fri Jan 8 08:59:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12682: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 14810 at Fri Jan 8 08:59:54 EST 2016 kill -USR1 14810 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14810 killed at Fri Jan 8 08:59:54 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 08:59:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 08:59:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:00:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12683: Waiting for Server - FAILED kill -0 14899 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14899 found at Fri Jan 8 09:00:00 EST 2016 selfserv_9591 with PID 14899 started at Fri Jan 8 09:00:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12684: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14899 at Fri Jan 8 09:00:01 EST 2016 kill -USR1 14899 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14899 killed at Fri Jan 8 09:00:01 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:00:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:00:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:00:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12685: Waiting for Server - FAILED kill -0 14968 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14968 found at Fri Jan 8 09:00:07 EST 2016 selfserv_9591 with PID 14968 started at Fri Jan 8 09:00:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12686: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 14968 at Fri Jan 8 09:00:08 EST 2016 kill -USR1 14968 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14968 killed at Fri Jan 8 09:00:08 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:00:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:00:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:00:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12687: Waiting for Server - FAILED kill -0 15036 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15036 found at Fri Jan 8 09:00:14 EST 2016 selfserv_9591 with PID 15036 started at Fri Jan 8 09:00:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12688: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15036 at Fri Jan 8 09:00:15 EST 2016 kill -USR1 15036 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15036 killed at Fri Jan 8 09:00:15 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:00:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:00:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:00:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12689: Waiting for Server - FAILED kill -0 15116 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15116 found at Fri Jan 8 09:00:21 EST 2016 selfserv_9591 with PID 15116 started at Fri Jan 8 09:00:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12690: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 15116 at Fri Jan 8 09:00:22 EST 2016 kill -USR1 15116 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15116 killed at Fri Jan 8 09:00:22 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:00:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:00:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:00:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12691: Waiting for Server - FAILED kill -0 15185 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15185 found at Fri Jan 8 09:00:28 EST 2016 selfserv_9591 with PID 15185 started at Fri Jan 8 09:00:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12692: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15185 at Fri Jan 8 09:00:29 EST 2016 kill -USR1 15185 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15185 killed at Fri Jan 8 09:00:29 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:00:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:00:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:00:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12693: Waiting for Server - FAILED kill -0 15253 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15253 found at Fri Jan 8 09:00:35 EST 2016 selfserv_9591 with PID 15253 started at Fri Jan 8 09:00:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12694: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 15253 at Fri Jan 8 09:00:36 EST 2016 kill -USR1 15253 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15253 killed at Fri Jan 8 09:00:36 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:00:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:00:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:00:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12695: Waiting for Server - FAILED kill -0 15333 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15333 found at Fri Jan 8 09:00:42 EST 2016 selfserv_9591 with PID 15333 started at Fri Jan 8 09:00:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12696: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 15333 at Fri Jan 8 09:00:43 EST 2016 kill -USR1 15333 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15333 killed at Fri Jan 8 09:00:43 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:00:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:00:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:00:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12697: Waiting for Server - FAILED kill -0 15402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15402 found at Fri Jan 8 09:00:49 EST 2016 selfserv_9591 with PID 15402 started at Fri Jan 8 09:00:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12698: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 15402 at Fri Jan 8 09:00:49 EST 2016 kill -USR1 15402 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15402 killed at Fri Jan 8 09:00:50 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:00:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:00:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:00:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12699: Waiting for Server - FAILED kill -0 15470 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15470 found at Fri Jan 8 09:00:56 EST 2016 selfserv_9591 with PID 15470 started at Fri Jan 8 09:00:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12700: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 15470 at Fri Jan 8 09:00:56 EST 2016 kill -USR1 15470 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15470 killed at Fri Jan 8 09:00:57 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:00:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:00:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:01:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12701: Waiting for Server - FAILED kill -0 15550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15550 found at Fri Jan 8 09:01:03 EST 2016 selfserv_9591 with PID 15550 started at Fri Jan 8 09:01:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12702: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 15550 at Fri Jan 8 09:01:03 EST 2016 kill -USR1 15550 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15550 killed at Fri Jan 8 09:01:04 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:01:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:01:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:01:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12703: Waiting for Server - FAILED kill -0 15644 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15644 found at Fri Jan 8 09:01:10 EST 2016 selfserv_9591 with PID 15644 started at Fri Jan 8 09:01:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12704: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15644 at Fri Jan 8 09:01:10 EST 2016 kill -USR1 15644 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15644 killed at Fri Jan 8 09:01:11 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:01:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:01:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:01:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12705: Waiting for Server - FAILED kill -0 15712 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15712 found at Fri Jan 8 09:01:17 EST 2016 selfserv_9591 with PID 15712 started at Fri Jan 8 09:01:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12706: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 15712 at Fri Jan 8 09:01:17 EST 2016 kill -USR1 15712 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15712 killed at Fri Jan 8 09:01:18 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:01:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:01:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:01:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12707: Waiting for Server - FAILED kill -0 15792 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15792 found at Fri Jan 8 09:01:24 EST 2016 selfserv_9591 with PID 15792 started at Fri Jan 8 09:01:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12708: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15792 at Fri Jan 8 09:01:24 EST 2016 kill -USR1 15792 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15792 killed at Fri Jan 8 09:01:25 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:01:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:01:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:01:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12709: Waiting for Server - FAILED kill -0 15861 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15861 found at Fri Jan 8 09:01:31 EST 2016 selfserv_9591 with PID 15861 started at Fri Jan 8 09:01:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12710: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15861 at Fri Jan 8 09:01:31 EST 2016 kill -USR1 15861 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15861 killed at Fri Jan 8 09:01:31 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:01:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:01:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:01:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12711: Waiting for Server - FAILED kill -0 15930 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15930 found at Fri Jan 8 09:01:37 EST 2016 selfserv_9591 with PID 15930 started at Fri Jan 8 09:01:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12712: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 15930 at Fri Jan 8 09:01:38 EST 2016 kill -USR1 15930 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15930 killed at Fri Jan 8 09:01:38 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:01:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:01:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:01:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12713: Waiting for Server - FAILED kill -0 16010 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16010 found at Fri Jan 8 09:01:44 EST 2016 selfserv_9591 with PID 16010 started at Fri Jan 8 09:01:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12714: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 16010 at Fri Jan 8 09:01:45 EST 2016 kill -USR1 16010 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16010 killed at Fri Jan 8 09:01:45 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:01:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:01:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:01:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12715: Waiting for Server - FAILED kill -0 16079 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16079 found at Fri Jan 8 09:01:51 EST 2016 selfserv_9591 with PID 16079 started at Fri Jan 8 09:01:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12716: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16079 at Fri Jan 8 09:01:52 EST 2016 kill -USR1 16079 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16079 killed at Fri Jan 8 09:01:52 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:01:52 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:01:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:01:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12717: Waiting for Server - FAILED kill -0 16147 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16147 found at Fri Jan 8 09:01:58 EST 2016 selfserv_9591 with PID 16147 started at Fri Jan 8 09:01:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12718: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 16147 at Fri Jan 8 09:01:59 EST 2016 kill -USR1 16147 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16147 killed at Fri Jan 8 09:01:59 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:01:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:01:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:02:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12719: Waiting for Server - FAILED kill -0 16227 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16227 found at Fri Jan 8 09:02:05 EST 2016 selfserv_9591 with PID 16227 started at Fri Jan 8 09:02:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12720: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 16227 at Fri Jan 8 09:02:06 EST 2016 kill -USR1 16227 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16227 killed at Fri Jan 8 09:02:06 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:02:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:02:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:02:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12721: Waiting for Server - FAILED kill -0 16296 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16296 found at Fri Jan 8 09:02:12 EST 2016 selfserv_9591 with PID 16296 started at Fri Jan 8 09:02:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12722: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 16296 at Fri Jan 8 09:02:13 EST 2016 kill -USR1 16296 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16296 killed at Fri Jan 8 09:02:13 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:02:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:02:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:02:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12723: Waiting for Server - FAILED kill -0 16364 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16364 found at Fri Jan 8 09:02:19 EST 2016 selfserv_9591 with PID 16364 started at Fri Jan 8 09:02:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12724: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 16364 at Fri Jan 8 09:02:20 EST 2016 kill -USR1 16364 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16364 killed at Fri Jan 8 09:02:20 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:02:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:02:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:02:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12725: Waiting for Server - FAILED kill -0 16444 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16444 found at Fri Jan 8 09:02:26 EST 2016 selfserv_9591 with PID 16444 started at Fri Jan 8 09:02:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12726: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 16444 at Fri Jan 8 09:02:26 EST 2016 kill -USR1 16444 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16444 killed at Fri Jan 8 09:02:27 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:02:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:02:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:02:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12727: Waiting for Server - FAILED kill -0 16513 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16513 found at Fri Jan 8 09:02:33 EST 2016 selfserv_9591 with PID 16513 started at Fri Jan 8 09:02:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12728: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16513 at Fri Jan 8 09:02:33 EST 2016 kill -USR1 16513 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16513 killed at Fri Jan 8 09:02:34 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:02:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:02:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:02:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12729: Waiting for Server - FAILED kill -0 16581 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16581 found at Fri Jan 8 09:02:40 EST 2016 selfserv_9591 with PID 16581 started at Fri Jan 8 09:02:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12730: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 16581 at Fri Jan 8 09:02:40 EST 2016 kill -USR1 16581 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16581 killed at Fri Jan 8 09:02:41 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:02:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:02:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:02:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12731: Waiting for Server - FAILED kill -0 16661 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16661 found at Fri Jan 8 09:02:47 EST 2016 selfserv_9591 with PID 16661 started at Fri Jan 8 09:02:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12732: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16661 at Fri Jan 8 09:02:47 EST 2016 kill -USR1 16661 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16661 killed at Fri Jan 8 09:02:48 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:02:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:02:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:02:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12733: Waiting for Server - FAILED kill -0 16730 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16730 found at Fri Jan 8 09:02:54 EST 2016 selfserv_9591 with PID 16730 started at Fri Jan 8 09:02:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12734: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16730 at Fri Jan 8 09:02:54 EST 2016 kill -USR1 16730 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16730 killed at Fri Jan 8 09:02:55 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:02:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:02:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:03:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12735: Waiting for Server - FAILED kill -0 16798 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16798 found at Fri Jan 8 09:03:01 EST 2016 selfserv_9591 with PID 16798 started at Fri Jan 8 09:03:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12736: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16798 at Fri Jan 8 09:03:01 EST 2016 kill -USR1 16798 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16798 killed at Fri Jan 8 09:03:02 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:03:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:03:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:03:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12737: Waiting for Server - FAILED kill -0 16878 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16878 found at Fri Jan 8 09:03:08 EST 2016 selfserv_9591 with PID 16878 started at Fri Jan 8 09:03:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12738: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 16878 at Fri Jan 8 09:03:08 EST 2016 kill -USR1 16878 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16878 killed at Fri Jan 8 09:03:09 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:03:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:03:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:03:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12739: Waiting for Server - FAILED kill -0 16947 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16947 found at Fri Jan 8 09:03:15 EST 2016 selfserv_9591 with PID 16947 started at Fri Jan 8 09:03:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12740: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 16947 at Fri Jan 8 09:03:15 EST 2016 kill -USR1 16947 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16947 killed at Fri Jan 8 09:03:15 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:03:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:03:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:03:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12741: Waiting for Server - FAILED kill -0 17015 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17015 found at Fri Jan 8 09:03:21 EST 2016 selfserv_9591 with PID 17015 started at Fri Jan 8 09:03:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12742: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17015 at Fri Jan 8 09:03:22 EST 2016 kill -USR1 17015 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17015 killed at Fri Jan 8 09:03:22 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:03:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:03:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:03:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12743: Waiting for Server - FAILED kill -0 17096 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17096 found at Fri Jan 8 09:03:28 EST 2016 selfserv_9591 with PID 17096 started at Fri Jan 8 09:03:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12744: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17096 at Fri Jan 8 09:03:29 EST 2016 kill -USR1 17096 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17096 killed at Fri Jan 8 09:03:29 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:03:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:03:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:03:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12745: Waiting for Server - FAILED kill -0 17164 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17164 found at Fri Jan 8 09:03:35 EST 2016 selfserv_9591 with PID 17164 started at Fri Jan 8 09:03:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12746: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17164 at Fri Jan 8 09:03:36 EST 2016 kill -USR1 17164 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17164 killed at Fri Jan 8 09:03:36 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:03:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:03:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:03:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12747: Waiting for Server - FAILED kill -0 17232 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17232 found at Fri Jan 8 09:03:42 EST 2016 selfserv_9591 with PID 17232 started at Fri Jan 8 09:03:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12748: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17232 at Fri Jan 8 09:03:43 EST 2016 kill -USR1 17232 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17232 killed at Fri Jan 8 09:03:43 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:03:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:03:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:03:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12749: Waiting for Server - FAILED kill -0 17313 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17313 found at Fri Jan 8 09:03:49 EST 2016 selfserv_9591 with PID 17313 started at Fri Jan 8 09:03:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12750: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17313 at Fri Jan 8 09:03:50 EST 2016 kill -USR1 17313 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17313 killed at Fri Jan 8 09:03:50 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:03:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:03:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:03:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12751: Waiting for Server - FAILED kill -0 17381 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17381 found at Fri Jan 8 09:03:56 EST 2016 selfserv_9591 with PID 17381 started at Fri Jan 8 09:03:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12752: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17381 at Fri Jan 8 09:03:57 EST 2016 kill -USR1 17381 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17381 killed at Fri Jan 8 09:03:57 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:03:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:03:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:04:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12753: Waiting for Server - FAILED kill -0 17449 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17449 found at Fri Jan 8 09:04:03 EST 2016 selfserv_9591 with PID 17449 started at Fri Jan 8 09:04:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12754: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17449 at Fri Jan 8 09:04:04 EST 2016 kill -USR1 17449 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17449 killed at Fri Jan 8 09:04:04 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:04:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:04:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:04:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12755: Waiting for Server - FAILED kill -0 17530 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17530 found at Fri Jan 8 09:04:10 EST 2016 selfserv_9591 with PID 17530 started at Fri Jan 8 09:04:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12756: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17530 at Fri Jan 8 09:04:11 EST 2016 kill -USR1 17530 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17530 killed at Fri Jan 8 09:04:11 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:04:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:04:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:04:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12757: Waiting for Server - FAILED kill -0 17598 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17598 found at Fri Jan 8 09:04:17 EST 2016 selfserv_9591 with PID 17598 started at Fri Jan 8 09:04:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12758: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17598 at Fri Jan 8 09:04:17 EST 2016 kill -USR1 17598 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17598 killed at Fri Jan 8 09:04:18 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:04:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:04:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:04:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12759: Waiting for Server - FAILED kill -0 17666 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17666 found at Fri Jan 8 09:04:24 EST 2016 selfserv_9591 with PID 17666 started at Fri Jan 8 09:04:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12760: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17666 at Fri Jan 8 09:04:24 EST 2016 kill -USR1 17666 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17666 killed at Fri Jan 8 09:04:25 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:04:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:04:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:04:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12761: Waiting for Server - FAILED kill -0 17747 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17747 found at Fri Jan 8 09:04:31 EST 2016 selfserv_9591 with PID 17747 started at Fri Jan 8 09:04:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12762: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17747 at Fri Jan 8 09:04:31 EST 2016 kill -USR1 17747 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17747 killed at Fri Jan 8 09:04:32 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:04:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:04:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:04:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12763: Waiting for Server - FAILED kill -0 17815 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17815 found at Fri Jan 8 09:04:38 EST 2016 selfserv_9591 with PID 17815 started at Fri Jan 8 09:04:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12764: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 17815 at Fri Jan 8 09:04:38 EST 2016 kill -USR1 17815 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17815 killed at Fri Jan 8 09:04:39 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:04:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:04:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:04:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12765: Waiting for Server - FAILED kill -0 17883 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17883 found at Fri Jan 8 09:04:45 EST 2016 selfserv_9591 with PID 17883 started at Fri Jan 8 09:04:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12766: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17883 at Fri Jan 8 09:04:45 EST 2016 kill -USR1 17883 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17883 killed at Fri Jan 8 09:04:46 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:04:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:04:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:04:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12767: Waiting for Server - FAILED kill -0 17964 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17964 found at Fri Jan 8 09:04:52 EST 2016 selfserv_9591 with PID 17964 started at Fri Jan 8 09:04:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12768: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 17964 at Fri Jan 8 09:04:52 EST 2016 kill -USR1 17964 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17964 killed at Fri Jan 8 09:04:53 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:04:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:04:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:04:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12769: Waiting for Server - FAILED kill -0 18032 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18032 found at Fri Jan 8 09:04:59 EST 2016 selfserv_9591 with PID 18032 started at Fri Jan 8 09:04:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12770: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 18032 at Fri Jan 8 09:04:59 EST 2016 kill -USR1 18032 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18032 killed at Fri Jan 8 09:04:59 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:05:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:05:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:05:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12771: Waiting for Server - FAILED kill -0 18100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18100 found at Fri Jan 8 09:05:05 EST 2016 selfserv_9591 with PID 18100 started at Fri Jan 8 09:05:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12772: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 18100 at Fri Jan 8 09:05:06 EST 2016 kill -USR1 18100 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18100 killed at Fri Jan 8 09:05:06 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:05:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:05:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:05:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12773: Waiting for Server - FAILED kill -0 18181 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18181 found at Fri Jan 8 09:05:12 EST 2016 selfserv_9591 with PID 18181 started at Fri Jan 8 09:05:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12774: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 18181 at Fri Jan 8 09:05:13 EST 2016 kill -USR1 18181 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18181 killed at Fri Jan 8 09:05:13 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:05:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:05:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:05:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12775: Waiting for Server - FAILED kill -0 18249 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18249 found at Fri Jan 8 09:05:19 EST 2016 selfserv_9591 with PID 18249 started at Fri Jan 8 09:05:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12776: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18249 at Fri Jan 8 09:05:20 EST 2016 kill -USR1 18249 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18249 killed at Fri Jan 8 09:05:20 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:05:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:05:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:05:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12777: Waiting for Server - FAILED kill -0 18317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18317 found at Fri Jan 8 09:05:26 EST 2016 selfserv_9591 with PID 18317 started at Fri Jan 8 09:05:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12778: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 18317 at Fri Jan 8 09:05:27 EST 2016 kill -USR1 18317 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18317 killed at Fri Jan 8 09:05:27 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:05:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:05:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:05:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12779: Waiting for Server - FAILED kill -0 18398 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18398 found at Fri Jan 8 09:05:33 EST 2016 selfserv_9591 with PID 18398 started at Fri Jan 8 09:05:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12780: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18398 at Fri Jan 8 09:05:34 EST 2016 kill -USR1 18398 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18398 killed at Fri Jan 8 09:05:34 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:05:34 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:05:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:05:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12781: Waiting for Server - FAILED kill -0 18466 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18466 found at Fri Jan 8 09:05:40 EST 2016 selfserv_9591 with PID 18466 started at Fri Jan 8 09:05:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12782: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18466 at Fri Jan 8 09:05:41 EST 2016 kill -USR1 18466 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18466 killed at Fri Jan 8 09:05:41 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:05:41 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:05:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:05:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12783: Waiting for Server - FAILED kill -0 18534 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18534 found at Fri Jan 8 09:05:47 EST 2016 selfserv_9591 with PID 18534 started at Fri Jan 8 09:05:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12784: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18534 at Fri Jan 8 09:05:48 EST 2016 kill -USR1 18534 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18534 killed at Fri Jan 8 09:05:48 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:05:48 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:05:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:05:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12785: Waiting for Server - FAILED kill -0 18617 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18617 found at Fri Jan 8 09:05:54 EST 2016 selfserv_9591 with PID 18617 started at Fri Jan 8 09:05:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12786: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 18617 at Fri Jan 8 09:05:55 EST 2016 kill -USR1 18617 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18617 killed at Fri Jan 8 09:05:55 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:05:55 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:05:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:06:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12787: Waiting for Server - FAILED kill -0 18687 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18687 found at Fri Jan 8 09:06:01 EST 2016 selfserv_9591 with PID 18687 started at Fri Jan 8 09:06:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12788: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 18687 at Fri Jan 8 09:06:01 EST 2016 kill -USR1 18687 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18687 killed at Fri Jan 8 09:06:02 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:06:02 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:06:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:06:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12789: Waiting for Server - FAILED kill -0 18755 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18755 found at Fri Jan 8 09:06:08 EST 2016 selfserv_9591 with PID 18755 started at Fri Jan 8 09:06:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12790: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 18755 at Fri Jan 8 09:06:08 EST 2016 kill -USR1 18755 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18755 killed at Fri Jan 8 09:06:09 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:06:09 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:06:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:06:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12791: Waiting for Server - FAILED kill -0 18836 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18836 found at Fri Jan 8 09:06:15 EST 2016 selfserv_9591 with PID 18836 started at Fri Jan 8 09:06:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12792: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 18836 at Fri Jan 8 09:06:15 EST 2016 kill -USR1 18836 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18836 killed at Fri Jan 8 09:06:16 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:06:16 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:06:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:06:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12793: Waiting for Server - FAILED kill -0 18904 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18904 found at Fri Jan 8 09:06:22 EST 2016 selfserv_9591 with PID 18904 started at Fri Jan 8 09:06:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12794: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 18904 at Fri Jan 8 09:06:22 EST 2016 kill -USR1 18904 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18904 killed at Fri Jan 8 09:06:23 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9591 starting at Fri Jan 8 09:06:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:06:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:06:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12795: Waiting for Server - FAILED kill -0 18972 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 18972 found at Fri Jan 8 09:06:29 EST 2016 selfserv_9591 with PID 18972 started at Fri Jan 8 09:06:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12796: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 18972 at Fri Jan 8 09:06:29 EST 2016 kill -USR1 18972 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 18972 killed at Fri Jan 8 09:06:30 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:06:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:06:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:06:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12797: Waiting for Server - FAILED kill -0 19053 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19053 found at Fri Jan 8 09:06:36 EST 2016 selfserv_9591 with PID 19053 started at Fri Jan 8 09:06:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12798: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 19053 at Fri Jan 8 09:06:36 EST 2016 kill -USR1 19053 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19053 killed at Fri Jan 8 09:06:37 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:06:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:06:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:06:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12799: Waiting for Server - FAILED kill -0 19121 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19121 found at Fri Jan 8 09:06:43 EST 2016 selfserv_9591 with PID 19121 started at Fri Jan 8 09:06:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12800: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 19121 at Fri Jan 8 09:06:43 EST 2016 kill -USR1 19121 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19121 killed at Fri Jan 8 09:06:44 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:06:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:06:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:06:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12801: Waiting for Server - FAILED kill -0 19189 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19189 found at Fri Jan 8 09:06:50 EST 2016 selfserv_9591 with PID 19189 started at Fri Jan 8 09:06:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12802: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 19189 at Fri Jan 8 09:06:50 EST 2016 kill -USR1 19189 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19189 killed at Fri Jan 8 09:06:50 EST 2016 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/authin.tl.tmp 0 selfserv_9591 starting at Fri Jan 8 09:06:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:06:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:06:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12803: Waiting for Server - FAILED kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:06:56 EST 2016 selfserv_9591 with PID 19265 started at Fri Jan 8 09:06:56 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:06:57 EST 2016 ssl.sh: #12804: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:06:58 EST 2016 ssl.sh: #12805: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:06:58 EST 2016 ssl.sh: #12806: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:06:59 EST 2016 ssl.sh: #12807: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:06:59 EST 2016 ssl.sh: #12808: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:00 EST 2016 ssl.sh: #12809: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:00 EST 2016 ssl.sh: #12810: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:01 EST 2016 ssl.sh: #12811: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:01 EST 2016 ssl.sh: #12812: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:02 EST 2016 ssl.sh: #12813: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:03 EST 2016 ssl.sh: #12814: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:03 EST 2016 ssl.sh: #12815: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:04 EST 2016 ssl.sh: #12816: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:04 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12817: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:05 EST 2016 ssl.sh: #12818: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:05 EST 2016 ssl.sh: #12819: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:06 EST 2016 ssl.sh: #12820: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:07 EST 2016 ssl.sh: #12821: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:07 EST 2016 ssl.sh: #12822: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:08 EST 2016 ssl.sh: #12823: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:08 EST 2016 ssl.sh: #12824: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:09 EST 2016 ssl.sh: #12825: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:09 EST 2016 ssl.sh: #12826: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:10 EST 2016 ssl.sh: #12827: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:11 EST 2016 ssl.sh: #12828: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:11 EST 2016 ssl.sh: #12829: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:12 EST 2016 ssl.sh: #12830: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:12 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12831: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:13 EST 2016 ssl.sh: #12832: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:13 EST 2016 ssl.sh: #12833: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:14 EST 2016 ssl.sh: #12834: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:14 EST 2016 ssl.sh: #12835: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:15 EST 2016 ssl.sh: #12836: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:16 EST 2016 ssl.sh: #12837: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:16 EST 2016 ssl.sh: #12838: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:17 EST 2016 ssl.sh: #12839: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:17 EST 2016 ssl.sh: #12840: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:18 EST 2016 ssl.sh: #12841: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:18 EST 2016 ssl.sh: #12842: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:19 EST 2016 ssl.sh: #12843: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 19265 found at Fri Jan 8 09:07:20 EST 2016 ssl.sh: #12844: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 19265 at Fri Jan 8 09:07:20 EST 2016 kill -USR1 19265 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 19265 killed at Fri Jan 8 09:07:20 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:07:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:07:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:07:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12845: Waiting for Server - FAILED kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:26 EST 2016 selfserv_9591 with PID 20702 started at Fri Jan 8 09:07:26 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:27 EST 2016 ssl.sh: #12846: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:27 EST 2016 ssl.sh: #12847: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:28 EST 2016 ssl.sh: #12848: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:28 EST 2016 ssl.sh: #12849: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:29 EST 2016 ssl.sh: #12850: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:29 EST 2016 ssl.sh: #12851: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:30 EST 2016 ssl.sh: #12852: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:30 EST 2016 ssl.sh: #12853: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:31 EST 2016 ssl.sh: #12854: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:32 EST 2016 ssl.sh: #12855: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:32 EST 2016 ssl.sh: #12856: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:33 EST 2016 ssl.sh: #12857: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:33 EST 2016 ssl.sh: #12858: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:34 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12859: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:34 EST 2016 ssl.sh: #12860: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:35 EST 2016 ssl.sh: #12861: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:36 EST 2016 ssl.sh: #12862: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:36 EST 2016 ssl.sh: #12863: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:37 EST 2016 ssl.sh: #12864: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:37 EST 2016 ssl.sh: #12865: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:38 EST 2016 ssl.sh: #12866: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:38 EST 2016 ssl.sh: #12867: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:39 EST 2016 ssl.sh: #12868: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:40 EST 2016 ssl.sh: #12869: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:40 EST 2016 ssl.sh: #12870: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:41 EST 2016 ssl.sh: #12871: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:41 EST 2016 ssl.sh: #12872: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:42 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12873: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:42 EST 2016 ssl.sh: #12874: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:43 EST 2016 ssl.sh: #12875: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:43 EST 2016 ssl.sh: #12876: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:44 EST 2016 ssl.sh: #12877: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:45 EST 2016 ssl.sh: #12878: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:45 EST 2016 ssl.sh: #12879: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:46 EST 2016 ssl.sh: #12880: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:46 EST 2016 ssl.sh: #12881: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:47 EST 2016 ssl.sh: #12882: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:47 EST 2016 ssl.sh: #12883: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:48 EST 2016 ssl.sh: #12884: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:49 EST 2016 ssl.sh: #12885: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 20702 found at Fri Jan 8 09:07:49 EST 2016 ssl.sh: #12886: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 20702 at Fri Jan 8 09:07:49 EST 2016 kill -USR1 20702 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 20702 killed at Fri Jan 8 09:07:50 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:07:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:07:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:07:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12887: Waiting for Server - FAILED kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:07:56 EST 2016 selfserv_9591 with PID 22139 started at Fri Jan 8 09:07:56 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:07:56 EST 2016 ssl.sh: #12888: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:07:57 EST 2016 ssl.sh: #12889: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:07:57 EST 2016 ssl.sh: #12890: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:07:58 EST 2016 ssl.sh: #12891: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:07:58 EST 2016 ssl.sh: #12892: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:07:59 EST 2016 ssl.sh: #12893: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:00 EST 2016 ssl.sh: #12894: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:00 EST 2016 ssl.sh: #12895: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:01 EST 2016 ssl.sh: #12896: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:01 EST 2016 ssl.sh: #12897: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:02 EST 2016 ssl.sh: #12898: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:02 EST 2016 ssl.sh: #12899: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:03 EST 2016 ssl.sh: #12900: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:04 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12901: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:04 EST 2016 ssl.sh: #12902: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:05 EST 2016 ssl.sh: #12903: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:05 EST 2016 ssl.sh: #12904: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:06 EST 2016 ssl.sh: #12905: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:06 EST 2016 ssl.sh: #12906: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:07 EST 2016 ssl.sh: #12907: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:07 EST 2016 ssl.sh: #12908: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:08 EST 2016 ssl.sh: #12909: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:09 EST 2016 ssl.sh: #12910: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:09 EST 2016 ssl.sh: #12911: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:10 EST 2016 ssl.sh: #12912: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:10 EST 2016 ssl.sh: #12913: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:11 EST 2016 ssl.sh: #12914: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:11 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12915: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:12 EST 2016 ssl.sh: #12916: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:13 EST 2016 ssl.sh: #12917: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:13 EST 2016 ssl.sh: #12918: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:14 EST 2016 ssl.sh: #12919: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:14 EST 2016 ssl.sh: #12920: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:15 EST 2016 ssl.sh: #12921: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:15 EST 2016 ssl.sh: #12922: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:16 EST 2016 ssl.sh: #12923: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:16 EST 2016 ssl.sh: #12924: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:17 EST 2016 ssl.sh: #12925: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:18 EST 2016 ssl.sh: #12926: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:18 EST 2016 ssl.sh: #12927: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 22139 found at Fri Jan 8 09:08:19 EST 2016 ssl.sh: #12928: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 22139 at Fri Jan 8 09:08:19 EST 2016 kill -USR1 22139 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 22139 killed at Fri Jan 8 09:08:19 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:08:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:08:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:08:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12929: Waiting for Server - FAILED kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:25 EST 2016 selfserv_9591 with PID 23574 started at Fri Jan 8 09:08:25 EST 2016 Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:26 EST 2016 ssl.sh: #12930: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:26 EST 2016 ssl.sh: #12931: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:27 EST 2016 ssl.sh: #12932: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:27 EST 2016 ssl.sh: #12933: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:28 EST 2016 ssl.sh: #12934: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:29 EST 2016 ssl.sh: #12935: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:29 EST 2016 ssl.sh: #12936: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:30 EST 2016 ssl.sh: #12937: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:30 EST 2016 ssl.sh: #12938: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:31 EST 2016 ssl.sh: #12939: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:31 EST 2016 ssl.sh: #12940: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:32 EST 2016 ssl.sh: #12941: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:33 EST 2016 ssl.sh: #12942: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:33 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12943: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:34 EST 2016 ssl.sh: #12944: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:34 EST 2016 ssl.sh: #12945: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:35 EST 2016 ssl.sh: #12946: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:35 EST 2016 ssl.sh: #12947: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:36 EST 2016 ssl.sh: #12948: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:36 EST 2016 ssl.sh: #12949: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:37 EST 2016 ssl.sh: #12950: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:38 EST 2016 ssl.sh: #12951: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:38 EST 2016 ssl.sh: #12952: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:39 EST 2016 ssl.sh: #12953: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:39 EST 2016 ssl.sh: #12954: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:40 EST 2016 ssl.sh: #12955: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:41 EST 2016 ssl.sh: #12956: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:41 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12957: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:42 EST 2016 ssl.sh: #12958: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:47 EST 2016 ssl.sh: #12959: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:48 EST 2016 ssl.sh: #12960: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:48 EST 2016 ssl.sh: #12961: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:49 EST 2016 ssl.sh: #12962: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:54 EST 2016 ssl.sh: #12963: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:55 EST 2016 ssl.sh: #12964: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:56 EST 2016 ssl.sh: #12965: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:08:56 EST 2016 ssl.sh: #12966: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:09:02 EST 2016 ssl.sh: #12967: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:09:02 EST 2016 ssl.sh: #12968: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:09:03 EST 2016 ssl.sh: #12969: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23574 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 23574 found at Fri Jan 8 09:09:04 EST 2016 ssl.sh: #12970: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9591 with PID 23574 at Fri Jan 8 09:09:04 EST 2016 kill -USR1 23574 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 23574 killed at Fri Jan 8 09:09:04 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:09:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:09:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:09:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12971: Waiting for Server - FAILED kill -0 25016 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25016 found at Fri Jan 8 09:09:10 EST 2016 selfserv_9591 with PID 25016 started at Fri Jan 8 09:09:10 EST 2016 trying to kill selfserv_9591 with PID 25016 at Fri Jan 8 09:09:10 EST 2016 kill -USR1 25016 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25016 killed at Fri Jan 8 09:09:10 EST 2016 selfserv_9591 starting at Fri Jan 8 09:09:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:09:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:09:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12972: Waiting for Server - FAILED kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:16 EST 2016 selfserv_9591 with PID 25070 started at Fri Jan 8 09:09:16 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:17 EST 2016 ssl.sh: #12973: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:18 EST 2016 ssl.sh: #12974: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:18 EST 2016 ssl.sh: #12975: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:19 EST 2016 ssl.sh: #12976: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:19 EST 2016 ssl.sh: #12977: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:20 EST 2016 ssl.sh: #12978: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:20 EST 2016 ssl.sh: #12979: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:21 EST 2016 ssl.sh: #12980: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:21 EST 2016 ssl.sh: #12981: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:22 EST 2016 ssl.sh: #12982: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:23 EST 2016 ssl.sh: #12983: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:23 EST 2016 ssl.sh: #12984: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:24 EST 2016 ssl.sh: #12985: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:24 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12986: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:25 EST 2016 ssl.sh: #12987: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:25 EST 2016 ssl.sh: #12988: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:26 EST 2016 ssl.sh: #12989: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:27 EST 2016 ssl.sh: #12990: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:27 EST 2016 ssl.sh: #12991: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:28 EST 2016 ssl.sh: #12992: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:28 EST 2016 ssl.sh: #12993: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:29 EST 2016 ssl.sh: #12994: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:29 EST 2016 ssl.sh: #12995: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:30 EST 2016 ssl.sh: #12996: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:31 EST 2016 ssl.sh: #12997: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:31 EST 2016 ssl.sh: #12998: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:32 EST 2016 ssl.sh: #12999: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:32 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13000: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:33 EST 2016 ssl.sh: #13001: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:33 EST 2016 ssl.sh: #13002: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:34 EST 2016 ssl.sh: #13003: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:34 EST 2016 ssl.sh: #13004: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:35 EST 2016 ssl.sh: #13005: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:36 EST 2016 ssl.sh: #13006: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:36 EST 2016 ssl.sh: #13007: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:37 EST 2016 ssl.sh: #13008: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:37 EST 2016 ssl.sh: #13009: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:38 EST 2016 ssl.sh: #13010: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:44 EST 2016 ssl.sh: #13011: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:44 EST 2016 ssl.sh: #13012: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25070 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 25070 found at Fri Jan 8 09:09:45 EST 2016 ssl.sh: #13013: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 25070 at Fri Jan 8 09:09:45 EST 2016 kill -USR1 25070 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 25070 killed at Fri Jan 8 09:09:45 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:09:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:09:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:09:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13014: Waiting for Server - FAILED kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:51 EST 2016 selfserv_9591 with PID 26507 started at Fri Jan 8 09:09:51 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:52 EST 2016 ssl.sh: #13015: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:52 EST 2016 ssl.sh: #13016: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:53 EST 2016 ssl.sh: #13017: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:53 EST 2016 ssl.sh: #13018: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:54 EST 2016 ssl.sh: #13019: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:55 EST 2016 ssl.sh: #13020: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:55 EST 2016 ssl.sh: #13021: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:56 EST 2016 ssl.sh: #13022: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:56 EST 2016 ssl.sh: #13023: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:57 EST 2016 ssl.sh: #13024: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:57 EST 2016 ssl.sh: #13025: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:58 EST 2016 ssl.sh: #13026: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:59 EST 2016 ssl.sh: #13027: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:09:59 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13028: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:00 EST 2016 ssl.sh: #13029: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:00 EST 2016 ssl.sh: #13030: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:01 EST 2016 ssl.sh: #13031: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:01 EST 2016 ssl.sh: #13032: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:02 EST 2016 ssl.sh: #13033: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:02 EST 2016 ssl.sh: #13034: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:03 EST 2016 ssl.sh: #13035: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:04 EST 2016 ssl.sh: #13036: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:04 EST 2016 ssl.sh: #13037: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:05 EST 2016 ssl.sh: #13038: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:05 EST 2016 ssl.sh: #13039: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:06 EST 2016 ssl.sh: #13040: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:06 EST 2016 ssl.sh: #13041: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:07 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13042: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:08 EST 2016 ssl.sh: #13043: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:08 EST 2016 ssl.sh: #13044: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:09 EST 2016 ssl.sh: #13045: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:09 EST 2016 ssl.sh: #13046: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:10 EST 2016 ssl.sh: #13047: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:10 EST 2016 ssl.sh: #13048: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:11 EST 2016 ssl.sh: #13049: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:11 EST 2016 ssl.sh: #13050: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:12 EST 2016 ssl.sh: #13051: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:13 EST 2016 ssl.sh: #13052: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:13 EST 2016 ssl.sh: #13053: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:14 EST 2016 ssl.sh: #13054: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26507 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 26507 found at Fri Jan 8 09:10:14 EST 2016 ssl.sh: #13055: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 26507 at Fri Jan 8 09:10:14 EST 2016 kill -USR1 26507 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 26507 killed at Fri Jan 8 09:10:15 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:10:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:10:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:10:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13056: Waiting for Server - FAILED kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:21 EST 2016 selfserv_9591 with PID 27948 started at Fri Jan 8 09:10:21 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:21 EST 2016 ssl.sh: #13057: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:22 EST 2016 ssl.sh: #13058: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:22 EST 2016 ssl.sh: #13059: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:23 EST 2016 ssl.sh: #13060: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:24 EST 2016 ssl.sh: #13061: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:24 EST 2016 ssl.sh: #13062: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:25 EST 2016 ssl.sh: #13063: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:25 EST 2016 ssl.sh: #13064: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:26 EST 2016 ssl.sh: #13065: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:26 EST 2016 ssl.sh: #13066: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:27 EST 2016 ssl.sh: #13067: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:28 EST 2016 ssl.sh: #13068: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:28 EST 2016 ssl.sh: #13069: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:29 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13070: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:29 EST 2016 ssl.sh: #13071: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:30 EST 2016 ssl.sh: #13072: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:30 EST 2016 ssl.sh: #13073: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:31 EST 2016 ssl.sh: #13074: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:32 EST 2016 ssl.sh: #13075: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:32 EST 2016 ssl.sh: #13076: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:33 EST 2016 ssl.sh: #13077: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:33 EST 2016 ssl.sh: #13078: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:34 EST 2016 ssl.sh: #13079: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:34 EST 2016 ssl.sh: #13080: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:35 EST 2016 ssl.sh: #13081: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:36 EST 2016 ssl.sh: #13082: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:36 EST 2016 ssl.sh: #13083: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:37 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13084: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:37 EST 2016 ssl.sh: #13085: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:38 EST 2016 ssl.sh: #13086: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:38 EST 2016 ssl.sh: #13087: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:39 EST 2016 ssl.sh: #13088: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:39 EST 2016 ssl.sh: #13089: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:40 EST 2016 ssl.sh: #13090: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:41 EST 2016 ssl.sh: #13091: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:41 EST 2016 ssl.sh: #13092: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:42 EST 2016 ssl.sh: #13093: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:42 EST 2016 ssl.sh: #13094: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:43 EST 2016 ssl.sh: #13095: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:43 EST 2016 ssl.sh: #13096: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 27948 found at Fri Jan 8 09:10:44 EST 2016 ssl.sh: #13097: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 27948 at Fri Jan 8 09:10:44 EST 2016 kill -USR1 27948 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 27948 killed at Fri Jan 8 09:10:45 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:10:45 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:10:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:10:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13098: Waiting for Server - FAILED kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:51 EST 2016 selfserv_9591 with PID 29383 started at Fri Jan 8 09:10:51 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:51 EST 2016 ssl.sh: #13099: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:52 EST 2016 ssl.sh: #13100: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:52 EST 2016 ssl.sh: #13101: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:53 EST 2016 ssl.sh: #13102: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:53 EST 2016 ssl.sh: #13103: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:54 EST 2016 ssl.sh: #13104: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:54 EST 2016 ssl.sh: #13105: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:55 EST 2016 ssl.sh: #13106: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:56 EST 2016 ssl.sh: #13107: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:56 EST 2016 ssl.sh: #13108: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:57 EST 2016 ssl.sh: #13109: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:57 EST 2016 ssl.sh: #13110: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:58 EST 2016 ssl.sh: #13111: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:58 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13112: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:59 EST 2016 ssl.sh: #13113: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:10:59 EST 2016 ssl.sh: #13114: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:00 EST 2016 ssl.sh: #13115: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:01 EST 2016 ssl.sh: #13116: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:01 EST 2016 ssl.sh: #13117: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:02 EST 2016 ssl.sh: #13118: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:02 EST 2016 ssl.sh: #13119: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:03 EST 2016 ssl.sh: #13120: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:03 EST 2016 ssl.sh: #13121: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:04 EST 2016 ssl.sh: #13122: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:05 EST 2016 ssl.sh: #13123: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:05 EST 2016 ssl.sh: #13124: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:06 EST 2016 ssl.sh: #13125: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:06 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13126: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:07 EST 2016 ssl.sh: #13127: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:07 EST 2016 ssl.sh: #13128: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:08 EST 2016 ssl.sh: #13129: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:09 EST 2016 ssl.sh: #13130: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:09 EST 2016 ssl.sh: #13131: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:10 EST 2016 ssl.sh: #13132: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:10 EST 2016 ssl.sh: #13133: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:11 EST 2016 ssl.sh: #13134: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:11 EST 2016 ssl.sh: #13135: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:12 EST 2016 ssl.sh: #13136: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:13 EST 2016 ssl.sh: #13137: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:13 EST 2016 ssl.sh: #13138: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 29383 found at Fri Jan 8 09:11:14 EST 2016 ssl.sh: #13139: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 29383 at Fri Jan 8 09:11:14 EST 2016 kill -USR1 29383 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 29383 killed at Fri Jan 8 09:11:14 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:11:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:11:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:11:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13140: Waiting for Server - FAILED kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:20 EST 2016 selfserv_9591 with PID 30818 started at Fri Jan 8 09:11:20 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:21 EST 2016 ssl.sh: #13141: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:21 EST 2016 ssl.sh: #13142: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:22 EST 2016 ssl.sh: #13143: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:22 EST 2016 ssl.sh: #13144: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:23 EST 2016 ssl.sh: #13145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:24 EST 2016 ssl.sh: #13146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:24 EST 2016 ssl.sh: #13147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:25 EST 2016 ssl.sh: #13148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:25 EST 2016 ssl.sh: #13149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:26 EST 2016 ssl.sh: #13150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:26 EST 2016 ssl.sh: #13151: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:27 EST 2016 ssl.sh: #13152: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:28 EST 2016 ssl.sh: #13153: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:28 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13154: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:29 EST 2016 ssl.sh: #13155: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:29 EST 2016 ssl.sh: #13156: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:30 EST 2016 ssl.sh: #13157: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:30 EST 2016 ssl.sh: #13158: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:31 EST 2016 ssl.sh: #13159: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:31 EST 2016 ssl.sh: #13160: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:32 EST 2016 ssl.sh: #13161: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:33 EST 2016 ssl.sh: #13162: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:33 EST 2016 ssl.sh: #13163: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:34 EST 2016 ssl.sh: #13164: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:34 EST 2016 ssl.sh: #13165: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:35 EST 2016 ssl.sh: #13166: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:36 EST 2016 ssl.sh: #13167: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:36 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13168: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:37 EST 2016 ssl.sh: #13169: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:37 EST 2016 ssl.sh: #13170: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:38 EST 2016 ssl.sh: #13171: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:38 EST 2016 ssl.sh: #13172: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:39 EST 2016 ssl.sh: #13173: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:39 EST 2016 ssl.sh: #13174: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:40 EST 2016 ssl.sh: #13175: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:40 EST 2016 ssl.sh: #13176: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:41 EST 2016 ssl.sh: #13177: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:42 EST 2016 ssl.sh: #13178: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:42 EST 2016 ssl.sh: #13179: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:43 EST 2016 ssl.sh: #13180: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 30818 found at Fri Jan 8 09:11:43 EST 2016 ssl.sh: #13181: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 30818 at Fri Jan 8 09:11:43 EST 2016 kill -USR1 30818 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 30818 killed at Fri Jan 8 09:11:44 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:11:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:11:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:11:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13182: Waiting for Server - FAILED kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:50 EST 2016 selfserv_9591 with PID 32263 started at Fri Jan 8 09:11:50 EST 2016 Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:50 EST 2016 ssl.sh: #13183: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:51 EST 2016 ssl.sh: #13184: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:52 EST 2016 ssl.sh: #13185: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:52 EST 2016 ssl.sh: #13186: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:53 EST 2016 ssl.sh: #13187: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:53 EST 2016 ssl.sh: #13188: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:54 EST 2016 ssl.sh: #13189: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:54 EST 2016 ssl.sh: #13190: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:55 EST 2016 ssl.sh: #13191: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:55 EST 2016 ssl.sh: #13192: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:56 EST 2016 ssl.sh: #13193: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:57 EST 2016 ssl.sh: #13194: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:57 EST 2016 ssl.sh: #13195: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:58 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13196: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:58 EST 2016 ssl.sh: #13197: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:59 EST 2016 ssl.sh: #13198: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:11:59 EST 2016 ssl.sh: #13199: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:00 EST 2016 ssl.sh: #13200: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:01 EST 2016 ssl.sh: #13201: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:01 EST 2016 ssl.sh: #13202: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:02 EST 2016 ssl.sh: #13203: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:02 EST 2016 ssl.sh: #13204: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:03 EST 2016 ssl.sh: #13205: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:03 EST 2016 ssl.sh: #13206: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:04 EST 2016 ssl.sh: #13207: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:05 EST 2016 ssl.sh: #13208: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:05 EST 2016 ssl.sh: #13209: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:06 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13210: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:06 EST 2016 ssl.sh: #13211: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:07 EST 2016 ssl.sh: #13212: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:07 EST 2016 ssl.sh: #13213: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:08 EST 2016 ssl.sh: #13214: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:08 EST 2016 ssl.sh: #13215: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:09 EST 2016 ssl.sh: #13216: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:10 EST 2016 ssl.sh: #13217: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:10 EST 2016 ssl.sh: #13218: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:11 EST 2016 ssl.sh: #13219: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:11 EST 2016 ssl.sh: #13220: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:12 EST 2016 ssl.sh: #13221: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:13 EST 2016 ssl.sh: #13222: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 32263 found at Fri Jan 8 09:12:13 EST 2016 ssl.sh: #13223: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 32263 at Fri Jan 8 09:12:13 EST 2016 kill -USR1 32263 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 32263 killed at Fri Jan 8 09:12:14 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:12:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:12:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:12:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13224: Waiting for Server - FAILED kill -0 1262 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1262 found at Fri Jan 8 09:12:20 EST 2016 selfserv_9591 with PID 1262 started at Fri Jan 8 09:12:20 EST 2016 trying to kill selfserv_9591 with PID 1262 at Fri Jan 8 09:12:20 EST 2016 kill -USR1 1262 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1262 killed at Fri Jan 8 09:12:20 EST 2016 selfserv_9591 starting at Fri Jan 8 09:12:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:12:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:12:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13225: Waiting for Server - FAILED kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:26 EST 2016 selfserv_9591 with PID 1317 started at Fri Jan 8 09:12:26 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:27 EST 2016 ssl.sh: #13226: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:27 EST 2016 ssl.sh: #13227: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:28 EST 2016 ssl.sh: #13228: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:28 EST 2016 ssl.sh: #13229: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:29 EST 2016 ssl.sh: #13230: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:29 EST 2016 ssl.sh: #13231: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:30 EST 2016 ssl.sh: #13232: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:30 EST 2016 ssl.sh: #13233: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:31 EST 2016 ssl.sh: #13234: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:32 EST 2016 ssl.sh: #13235: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:32 EST 2016 ssl.sh: #13236: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:33 EST 2016 ssl.sh: #13237: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:33 EST 2016 ssl.sh: #13238: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:34 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13239: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:34 EST 2016 ssl.sh: #13240: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:35 EST 2016 ssl.sh: #13241: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:36 EST 2016 ssl.sh: #13242: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:36 EST 2016 ssl.sh: #13243: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:37 EST 2016 ssl.sh: #13244: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:37 EST 2016 ssl.sh: #13245: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:38 EST 2016 ssl.sh: #13246: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:38 EST 2016 ssl.sh: #13247: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:39 EST 2016 ssl.sh: #13248: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:40 EST 2016 ssl.sh: #13249: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:40 EST 2016 ssl.sh: #13250: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:41 EST 2016 ssl.sh: #13251: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:41 EST 2016 ssl.sh: #13252: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:42 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13253: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:42 EST 2016 ssl.sh: #13254: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:43 EST 2016 ssl.sh: #13255: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:43 EST 2016 ssl.sh: #13256: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:44 EST 2016 ssl.sh: #13257: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:45 EST 2016 ssl.sh: #13258: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:45 EST 2016 ssl.sh: #13259: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:46 EST 2016 ssl.sh: #13260: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:46 EST 2016 ssl.sh: #13261: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:47 EST 2016 ssl.sh: #13262: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:47 EST 2016 ssl.sh: #13263: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:48 EST 2016 ssl.sh: #13264: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:49 EST 2016 ssl.sh: #13265: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 1317 found at Fri Jan 8 09:12:49 EST 2016 ssl.sh: #13266: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 1317 at Fri Jan 8 09:12:49 EST 2016 kill -USR1 1317 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 1317 killed at Fri Jan 8 09:12:50 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:12:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:12:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:12:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13267: Waiting for Server - FAILED kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:12:56 EST 2016 selfserv_9591 with PID 2758 started at Fri Jan 8 09:12:56 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:12:56 EST 2016 ssl.sh: #13268: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:12:57 EST 2016 ssl.sh: #13269: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:12:57 EST 2016 ssl.sh: #13270: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:12:58 EST 2016 ssl.sh: #13271: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:12:58 EST 2016 ssl.sh: #13272: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:12:59 EST 2016 ssl.sh: #13273: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:00 EST 2016 ssl.sh: #13274: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:00 EST 2016 ssl.sh: #13275: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:01 EST 2016 ssl.sh: #13276: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:01 EST 2016 ssl.sh: #13277: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:02 EST 2016 ssl.sh: #13278: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:03 EST 2016 ssl.sh: #13279: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:03 EST 2016 ssl.sh: #13280: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:04 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13281: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:04 EST 2016 ssl.sh: #13282: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:05 EST 2016 ssl.sh: #13283: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:05 EST 2016 ssl.sh: #13284: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:06 EST 2016 ssl.sh: #13285: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:06 EST 2016 ssl.sh: #13286: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:07 EST 2016 ssl.sh: #13287: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:08 EST 2016 ssl.sh: #13288: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:08 EST 2016 ssl.sh: #13289: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:09 EST 2016 ssl.sh: #13290: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:09 EST 2016 ssl.sh: #13291: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:10 EST 2016 ssl.sh: #13292: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:10 EST 2016 ssl.sh: #13293: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:11 EST 2016 ssl.sh: #13294: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:12 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13295: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:12 EST 2016 ssl.sh: #13296: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:13 EST 2016 ssl.sh: #13297: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:13 EST 2016 ssl.sh: #13298: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:14 EST 2016 ssl.sh: #13299: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:14 EST 2016 ssl.sh: #13300: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:15 EST 2016 ssl.sh: #13301: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:15 EST 2016 ssl.sh: #13302: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:16 EST 2016 ssl.sh: #13303: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:17 EST 2016 ssl.sh: #13304: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:17 EST 2016 ssl.sh: #13305: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:18 EST 2016 ssl.sh: #13306: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:18 EST 2016 ssl.sh: #13307: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 2758 found at Fri Jan 8 09:13:19 EST 2016 ssl.sh: #13308: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 2758 at Fri Jan 8 09:13:19 EST 2016 kill -USR1 2758 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 2758 killed at Fri Jan 8 09:13:19 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:13:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:13:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:13:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13309: Waiting for Server - FAILED kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:25 EST 2016 selfserv_9591 with PID 4194 started at Fri Jan 8 09:13:25 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:26 EST 2016 ssl.sh: #13310: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:27 EST 2016 ssl.sh: #13311: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:27 EST 2016 ssl.sh: #13312: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:28 EST 2016 ssl.sh: #13313: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:28 EST 2016 ssl.sh: #13314: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:29 EST 2016 ssl.sh: #13315: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:29 EST 2016 ssl.sh: #13316: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:30 EST 2016 ssl.sh: #13317: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:30 EST 2016 ssl.sh: #13318: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:31 EST 2016 ssl.sh: #13319: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:32 EST 2016 ssl.sh: #13320: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:32 EST 2016 ssl.sh: #13321: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:33 EST 2016 ssl.sh: #13322: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:33 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13323: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:34 EST 2016 ssl.sh: #13324: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:34 EST 2016 ssl.sh: #13325: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:35 EST 2016 ssl.sh: #13326: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:36 EST 2016 ssl.sh: #13327: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:36 EST 2016 ssl.sh: #13328: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:37 EST 2016 ssl.sh: #13329: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:37 EST 2016 ssl.sh: #13330: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:38 EST 2016 ssl.sh: #13331: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:38 EST 2016 ssl.sh: #13332: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:39 EST 2016 ssl.sh: #13333: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:40 EST 2016 ssl.sh: #13334: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:40 EST 2016 ssl.sh: #13335: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:41 EST 2016 ssl.sh: #13336: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:41 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13337: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:42 EST 2016 ssl.sh: #13338: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:42 EST 2016 ssl.sh: #13339: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:43 EST 2016 ssl.sh: #13340: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:43 EST 2016 ssl.sh: #13341: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:44 EST 2016 ssl.sh: #13342: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:45 EST 2016 ssl.sh: #13343: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:45 EST 2016 ssl.sh: #13344: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:46 EST 2016 ssl.sh: #13345: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:46 EST 2016 ssl.sh: #13346: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:47 EST 2016 ssl.sh: #13347: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:48 EST 2016 ssl.sh: #13348: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:48 EST 2016 ssl.sh: #13349: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 4194 found at Fri Jan 8 09:13:49 EST 2016 ssl.sh: #13350: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 4194 at Fri Jan 8 09:13:49 EST 2016 kill -USR1 4194 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 4194 killed at Fri Jan 8 09:13:49 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:13:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:13:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:13:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13351: Waiting for Server - FAILED kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:13:55 EST 2016 selfserv_9591 with PID 5629 started at Fri Jan 8 09:13:55 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:13:56 EST 2016 ssl.sh: #13352: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:13:56 EST 2016 ssl.sh: #13353: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:13:57 EST 2016 ssl.sh: #13354: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:13:57 EST 2016 ssl.sh: #13355: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:13:58 EST 2016 ssl.sh: #13356: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:13:58 EST 2016 ssl.sh: #13357: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:13:59 EST 2016 ssl.sh: #13358: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:00 EST 2016 ssl.sh: #13359: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:00 EST 2016 ssl.sh: #13360: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:01 EST 2016 ssl.sh: #13361: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:01 EST 2016 ssl.sh: #13362: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:02 EST 2016 ssl.sh: #13363: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:03 EST 2016 ssl.sh: #13364: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:03 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13365: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:04 EST 2016 ssl.sh: #13366: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:04 EST 2016 ssl.sh: #13367: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:05 EST 2016 ssl.sh: #13368: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:05 EST 2016 ssl.sh: #13369: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:06 EST 2016 ssl.sh: #13370: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:06 EST 2016 ssl.sh: #13371: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:07 EST 2016 ssl.sh: #13372: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:08 EST 2016 ssl.sh: #13373: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:08 EST 2016 ssl.sh: #13374: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:09 EST 2016 ssl.sh: #13375: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:09 EST 2016 ssl.sh: #13376: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:10 EST 2016 ssl.sh: #13377: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:10 EST 2016 ssl.sh: #13378: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:11 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13379: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:12 EST 2016 ssl.sh: #13380: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:12 EST 2016 ssl.sh: #13381: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:13 EST 2016 ssl.sh: #13382: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:13 EST 2016 ssl.sh: #13383: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:14 EST 2016 ssl.sh: #13384: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:14 EST 2016 ssl.sh: #13385: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:15 EST 2016 ssl.sh: #13386: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:15 EST 2016 ssl.sh: #13387: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:16 EST 2016 ssl.sh: #13388: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:17 EST 2016 ssl.sh: #13389: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:17 EST 2016 ssl.sh: #13390: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:18 EST 2016 ssl.sh: #13391: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5629 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 5629 found at Fri Jan 8 09:14:18 EST 2016 ssl.sh: #13392: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 5629 at Fri Jan 8 09:14:19 EST 2016 kill -USR1 5629 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 5629 killed at Fri Jan 8 09:14:19 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:14:19 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:14:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:14:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13393: Waiting for Server - FAILED kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:25 EST 2016 selfserv_9591 with PID 7064 started at Fri Jan 8 09:14:25 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:25 EST 2016 ssl.sh: #13394: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:26 EST 2016 ssl.sh: #13395: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:27 EST 2016 ssl.sh: #13396: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:27 EST 2016 ssl.sh: #13397: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:28 EST 2016 ssl.sh: #13398: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:28 EST 2016 ssl.sh: #13399: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:29 EST 2016 ssl.sh: #13400: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:29 EST 2016 ssl.sh: #13401: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:30 EST 2016 ssl.sh: #13402: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:31 EST 2016 ssl.sh: #13403: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:31 EST 2016 ssl.sh: #13404: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:32 EST 2016 ssl.sh: #13405: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:32 EST 2016 ssl.sh: #13406: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:33 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13407: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:33 EST 2016 ssl.sh: #13408: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:34 EST 2016 ssl.sh: #13409: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:34 EST 2016 ssl.sh: #13410: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:35 EST 2016 ssl.sh: #13411: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:36 EST 2016 ssl.sh: #13412: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:36 EST 2016 ssl.sh: #13413: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:37 EST 2016 ssl.sh: #13414: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:37 EST 2016 ssl.sh: #13415: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:38 EST 2016 ssl.sh: #13416: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:38 EST 2016 ssl.sh: #13417: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:39 EST 2016 ssl.sh: #13418: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:40 EST 2016 ssl.sh: #13419: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:40 EST 2016 ssl.sh: #13420: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:41 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13421: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:41 EST 2016 ssl.sh: #13422: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:42 EST 2016 ssl.sh: #13423: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:42 EST 2016 ssl.sh: #13424: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:43 EST 2016 ssl.sh: #13425: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:44 EST 2016 ssl.sh: #13426: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:44 EST 2016 ssl.sh: #13427: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:45 EST 2016 ssl.sh: #13428: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:45 EST 2016 ssl.sh: #13429: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:46 EST 2016 ssl.sh: #13430: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:46 EST 2016 ssl.sh: #13431: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:47 EST 2016 ssl.sh: #13432: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:48 EST 2016 ssl.sh: #13433: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7064 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 7064 found at Fri Jan 8 09:14:48 EST 2016 ssl.sh: #13434: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 7064 at Fri Jan 8 09:14:48 EST 2016 kill -USR1 7064 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 7064 killed at Fri Jan 8 09:14:49 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:14:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:14:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:14:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13435: Waiting for Server - FAILED kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:14:55 EST 2016 selfserv_9591 with PID 8503 started at Fri Jan 8 09:14:55 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:14:55 EST 2016 ssl.sh: #13436: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:14:56 EST 2016 ssl.sh: #13437: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:14:56 EST 2016 ssl.sh: #13438: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:14:57 EST 2016 ssl.sh: #13439: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:14:57 EST 2016 ssl.sh: #13440: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:14:58 EST 2016 ssl.sh: #13441: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:14:59 EST 2016 ssl.sh: #13442: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:14:59 EST 2016 ssl.sh: #13443: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:00 EST 2016 ssl.sh: #13444: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:00 EST 2016 ssl.sh: #13445: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:01 EST 2016 ssl.sh: #13446: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:01 EST 2016 ssl.sh: #13447: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:02 EST 2016 ssl.sh: #13448: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:03 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13449: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:03 EST 2016 ssl.sh: #13450: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:04 EST 2016 ssl.sh: #13451: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:04 EST 2016 ssl.sh: #13452: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:05 EST 2016 ssl.sh: #13453: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:05 EST 2016 ssl.sh: #13454: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:06 EST 2016 ssl.sh: #13455: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:06 EST 2016 ssl.sh: #13456: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:07 EST 2016 ssl.sh: #13457: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:08 EST 2016 ssl.sh: #13458: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:08 EST 2016 ssl.sh: #13459: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:09 EST 2016 ssl.sh: #13460: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:09 EST 2016 ssl.sh: #13461: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:10 EST 2016 ssl.sh: #13462: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:10 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13463: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:11 EST 2016 ssl.sh: #13464: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:12 EST 2016 ssl.sh: #13465: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:12 EST 2016 ssl.sh: #13466: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:13 EST 2016 ssl.sh: #13467: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:13 EST 2016 ssl.sh: #13468: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:14 EST 2016 ssl.sh: #13469: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:14 EST 2016 ssl.sh: #13470: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:15 EST 2016 ssl.sh: #13471: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:16 EST 2016 ssl.sh: #13472: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:16 EST 2016 ssl.sh: #13473: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:17 EST 2016 ssl.sh: #13474: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:17 EST 2016 ssl.sh: #13475: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8503 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 8503 found at Fri Jan 8 09:15:18 EST 2016 ssl.sh: #13476: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9591 with PID 8503 at Fri Jan 8 09:15:18 EST 2016 kill -USR1 8503 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 8503 killed at Fri Jan 8 09:15:18 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:15:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:15:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:15:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13477: Waiting for Server - FAILED kill -0 9938 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9938 found at Fri Jan 8 09:15:24 EST 2016 selfserv_9591 with PID 9938 started at Fri Jan 8 09:15:24 EST 2016 trying to kill selfserv_9591 with PID 9938 at Fri Jan 8 09:15:24 EST 2016 kill -USR1 9938 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9938 killed at Fri Jan 8 09:15:25 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server bypass/client bypass - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9591 starting at Fri Jan 8 09:15:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:15:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:15:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13478: Waiting for Server - FAILED kill -0 9999 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 9999 found at Fri Jan 8 09:15:31 EST 2016 selfserv_9591 with PID 9999 started at Fri Jan 8 09:15:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13479: OCSP stapling, signed response, good status produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9591 with PID 9999 at Fri Jan 8 09:15:31 EST 2016 kill -USR1 9999 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 9999 killed at Fri Jan 8 09:15:32 EST 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9591 starting at Fri Jan 8 09:15:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:15:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:15:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13480: Waiting for Server - FAILED kill -0 10060 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10060 found at Fri Jan 8 09:15:38 EST 2016 selfserv_9591 with PID 10060 started at Fri Jan 8 09:15:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13481: OCSP stapling, signed response, revoked status produced a returncode of 1, expected is 3 - FAILED trying to kill selfserv_9591 with PID 10060 at Fri Jan 8 09:15:38 EST 2016 kill -USR1 10060 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10060 killed at Fri Jan 8 09:15:39 EST 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9591 starting at Fri Jan 8 09:15:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:15:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:15:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13482: Waiting for Server - FAILED kill -0 10121 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10121 found at Fri Jan 8 09:15:45 EST 2016 selfserv_9591 with PID 10121 started at Fri Jan 8 09:15:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13483: OCSP stapling, signed response, unknown status produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 10121 at Fri Jan 8 09:15:45 EST 2016 kill -USR1 10121 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10121 killed at Fri Jan 8 09:15:46 EST 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9591 starting at Fri Jan 8 09:15:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:15:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:15:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13484: Waiting for Server - FAILED kill -0 10183 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10183 found at Fri Jan 8 09:15:52 EST 2016 selfserv_9591 with PID 10183 started at Fri Jan 8 09:15:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13485: OCSP stapling, unsigned failure response produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 10183 at Fri Jan 8 09:15:52 EST 2016 kill -USR1 10183 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10183 killed at Fri Jan 8 09:15:52 EST 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9591 starting at Fri Jan 8 09:15:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:15:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:15:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13486: Waiting for Server - FAILED kill -0 10244 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10244 found at Fri Jan 8 09:15:58 EST 2016 selfserv_9591 with PID 10244 started at Fri Jan 8 09:15:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13487: OCSP stapling, good status, bad signature produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 10244 at Fri Jan 8 09:15:59 EST 2016 kill -USR1 10244 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10244 killed at Fri Jan 8 09:15:59 EST 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9591 starting at Fri Jan 8 09:15:59 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:15:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:16:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13488: Waiting for Server - FAILED kill -0 10305 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10305 found at Fri Jan 8 09:16:05 EST 2016 selfserv_9591 with PID 10305 started at Fri Jan 8 09:16:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13489: OCSP stapling, invalid cert status data produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 10305 at Fri Jan 8 09:16:06 EST 2016 kill -USR1 10305 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10305 killed at Fri Jan 8 09:16:06 EST 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9591 starting at Fri Jan 8 09:16:06 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:16:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:16:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13490: Waiting for Server - FAILED kill -0 10367 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10367 found at Fri Jan 8 09:16:12 EST 2016 selfserv_9591 with PID 10367 started at Fri Jan 8 09:16:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13491: Valid cert, Server doesn't staple produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9591 with PID 10367 at Fri Jan 8 09:16:13 EST 2016 kill -USR1 10367 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10367 killed at Fri Jan 8 09:16:13 EST 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9591 starting at Fri Jan 8 09:16:13 EST 2016 selfserv_9591 -D -p 9591 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:16:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:16:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13492: Waiting for Server - FAILED kill -0 10428 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10428 found at Fri Jan 8 09:16:19 EST 2016 selfserv_9591 with PID 10428 started at Fri Jan 8 09:16:19 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Fri Jan 8 09:16:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:16:20 EST 2016 ssl.sh: #13493: Stress OCSP stapling, server uses random status produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 10428 at Fri Jan 8 09:16:20 EST 2016 kill -USR1 10428 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10428 killed at Fri Jan 8 09:16:20 EST 2016 ssl.sh: SSL Stress Test - server bypass/client bypass - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 09:16:21 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:16:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:16:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13494: Waiting for Server - FAILED kill -0 10580 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10580 found at Fri Jan 8 09:16:26 EST 2016 selfserv_9591 with PID 10580 started at Fri Jan 8 09:16:27 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 09:16:27 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:16:27 EST 2016 ssl.sh: #13495: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 10580 at Fri Jan 8 09:16:27 EST 2016 kill -USR1 10580 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10580 killed at Fri Jan 8 09:16:28 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 09:16:28 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:16:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:16:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13496: Waiting for Server - FAILED kill -0 10660 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10660 found at Fri Jan 8 09:16:34 EST 2016 selfserv_9591 with PID 10660 started at Fri Jan 8 09:16:34 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 09:16:34 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:16:34 EST 2016 ssl.sh: #13497: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 10660 at Fri Jan 8 09:16:34 EST 2016 kill -USR1 10660 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10660 killed at Fri Jan 8 09:16:35 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9591 starting at Fri Jan 8 09:16:35 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:16:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:16:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13498: Waiting for Server - FAILED kill -0 10739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10739 found at Fri Jan 8 09:16:41 EST 2016 selfserv_9591 with PID 10739 started at Fri Jan 8 09:16:41 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 09:16:41 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:16:41 EST 2016 ssl.sh: #13499: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 10739 at Fri Jan 8 09:16:41 EST 2016 kill -USR1 10739 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10739 killed at Fri Jan 8 09:16:42 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9591 starting at Fri Jan 8 09:16:42 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:16:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:16:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13500: Waiting for Server - FAILED kill -0 10818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10818 found at Fri Jan 8 09:16:48 EST 2016 selfserv_9591 with PID 10818 started at Fri Jan 8 09:16:48 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 09:16:48 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:16:48 EST 2016 ssl.sh: #13501: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 10818 at Fri Jan 8 09:16:48 EST 2016 kill -USR1 10818 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10818 killed at Fri Jan 8 09:16:49 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9591 starting at Fri Jan 8 09:16:49 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:16:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:16:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13502: Waiting for Server - FAILED kill -0 10898 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10898 found at Fri Jan 8 09:16:55 EST 2016 selfserv_9591 with PID 10898 started at Fri Jan 8 09:16:55 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 09:16:55 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:16:55 EST 2016 ssl.sh: #13503: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 10898 at Fri Jan 8 09:16:56 EST 2016 kill -USR1 10898 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10898 killed at Fri Jan 8 09:16:56 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9591 starting at Fri Jan 8 09:16:56 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:16:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:17:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13504: Waiting for Server - FAILED kill -0 10977 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 10977 found at Fri Jan 8 09:17:02 EST 2016 selfserv_9591 with PID 10977 started at Fri Jan 8 09:17:02 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 09:17:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:17:03 EST 2016 ssl.sh: #13505: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 10977 at Fri Jan 8 09:17:03 EST 2016 kill -USR1 10977 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 10977 killed at Fri Jan 8 09:17:03 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9591 starting at Fri Jan 8 09:17:03 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:17:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:17:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13506: Waiting for Server - FAILED kill -0 11056 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11056 found at Fri Jan 8 09:17:09 EST 2016 selfserv_9591 with PID 11056 started at Fri Jan 8 09:17:09 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 09:17:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:17:10 EST 2016 ssl.sh: #13507: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 11056 at Fri Jan 8 09:17:10 EST 2016 kill -USR1 11056 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11056 killed at Fri Jan 8 09:17:10 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9591 starting at Fri Jan 8 09:17:10 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:17:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:17:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13508: Waiting for Server - FAILED kill -0 11144 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11144 found at Fri Jan 8 09:17:16 EST 2016 selfserv_9591 with PID 11144 started at Fri Jan 8 09:17:16 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 09:17:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:17:17 EST 2016 ssl.sh: #13509: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 11144 at Fri Jan 8 09:17:17 EST 2016 kill -USR1 11144 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11144 killed at Fri Jan 8 09:17:17 EST 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:17:17 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:17:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:17:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13510: Waiting for Server - FAILED kill -0 11251 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11251 found at Fri Jan 8 09:17:23 EST 2016 selfserv_9591 with PID 11251 started at Fri Jan 8 09:17:23 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 09:17:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:17:24 EST 2016 ssl.sh: #13511: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 11251 at Fri Jan 8 09:17:24 EST 2016 kill -USR1 11251 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11251 killed at Fri Jan 8 09:17:24 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:17:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:17:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:17:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13512: Waiting for Server - FAILED kill -0 11330 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11330 found at Fri Jan 8 09:17:30 EST 2016 selfserv_9591 with PID 11330 started at Fri Jan 8 09:17:31 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 09:17:31 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:17:31 EST 2016 ssl.sh: #13513: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 11330 at Fri Jan 8 09:17:31 EST 2016 kill -USR1 11330 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11330 killed at Fri Jan 8 09:17:32 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:17:32 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:17:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:17:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13514: Waiting for Server - FAILED kill -0 11410 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11410 found at Fri Jan 8 09:17:38 EST 2016 selfserv_9591 with PID 11410 started at Fri Jan 8 09:17:38 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 09:17:38 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:17:38 EST 2016 ssl.sh: #13515: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 11410 at Fri Jan 8 09:17:38 EST 2016 kill -USR1 11410 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11410 killed at Fri Jan 8 09:17:39 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:17:39 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:17:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:17:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13516: Waiting for Server - FAILED kill -0 11489 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11489 found at Fri Jan 8 09:17:45 EST 2016 selfserv_9591 with PID 11489 started at Fri Jan 8 09:17:45 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 09:17:45 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:17:45 EST 2016 ssl.sh: #13517: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 11489 at Fri Jan 8 09:17:45 EST 2016 kill -USR1 11489 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11489 killed at Fri Jan 8 09:17:46 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 09:17:46 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:17:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:17:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13518: Waiting for Server - FAILED kill -0 11569 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11569 found at Fri Jan 8 09:17:52 EST 2016 selfserv_9591 with PID 11569 started at Fri Jan 8 09:17:52 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 09:17:52 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:17:52 EST 2016 ssl.sh: #13519: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 11569 at Fri Jan 8 09:17:53 EST 2016 kill -USR1 11569 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11569 killed at Fri Jan 8 09:17:53 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:17:53 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:17:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:17:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13520: Waiting for Server - FAILED kill -0 11648 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11648 found at Fri Jan 8 09:17:59 EST 2016 selfserv_9591 with PID 11648 started at Fri Jan 8 09:17:59 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 09:17:59 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:18:00 EST 2016 ssl.sh: #13521: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 11648 at Fri Jan 8 09:18:00 EST 2016 kill -USR1 11648 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11648 killed at Fri Jan 8 09:18:00 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 09:18:00 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:18:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:18:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13522: Waiting for Server - FAILED kill -0 11727 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11727 found at Fri Jan 8 09:18:06 EST 2016 selfserv_9591 with PID 11727 started at Fri Jan 8 09:18:06 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 09:18:06 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:18:07 EST 2016 ssl.sh: #13523: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 11727 at Fri Jan 8 09:18:07 EST 2016 kill -USR1 11727 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11727 killed at Fri Jan 8 09:18:07 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9591 starting at Fri Jan 8 09:18:07 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:18:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:18:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13524: Waiting for Server - FAILED kill -0 11814 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11814 found at Fri Jan 8 09:18:13 EST 2016 selfserv_9591 with PID 11814 started at Fri Jan 8 09:18:13 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 09:18:13 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:18:14 EST 2016 ssl.sh: #13525: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 11814 at Fri Jan 8 09:18:14 EST 2016 kill -USR1 11814 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11814 killed at Fri Jan 8 09:18:14 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9591 starting at Fri Jan 8 09:18:14 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:18:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:18:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13526: Waiting for Server - FAILED kill -0 11899 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11899 found at Fri Jan 8 09:18:20 EST 2016 selfserv_9591 with PID 11899 started at Fri Jan 8 09:18:20 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Fri Jan 8 09:18:20 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:18:21 EST 2016 ssl.sh: #13527: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 11899 at Fri Jan 8 09:18:21 EST 2016 kill -USR1 11899 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11899 killed at Fri Jan 8 09:18:21 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:18:22 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:18:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:18:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13528: Waiting for Server - FAILED kill -0 11999 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 11999 found at Fri Jan 8 09:18:28 EST 2016 selfserv_9591 with PID 11999 started at Fri Jan 8 09:18:28 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:18:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:18:28 EST 2016 ssl.sh: #13529: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 11999 at Fri Jan 8 09:18:28 EST 2016 kill -USR1 11999 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 11999 killed at Fri Jan 8 09:18:29 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:18:29 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:18:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:18:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13530: Waiting for Server - FAILED kill -0 12079 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12079 found at Fri Jan 8 09:18:35 EST 2016 selfserv_9591 with PID 12079 started at Fri Jan 8 09:18:35 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:18:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:18:35 EST 2016 ssl.sh: #13531: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 12079 at Fri Jan 8 09:18:35 EST 2016 kill -USR1 12079 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12079 killed at Fri Jan 8 09:18:36 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:18:36 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:18:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:18:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13532: Waiting for Server - FAILED kill -0 12158 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12158 found at Fri Jan 8 09:18:42 EST 2016 selfserv_9591 with PID 12158 started at Fri Jan 8 09:18:42 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:18:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:18:42 EST 2016 ssl.sh: #13533: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 12158 at Fri Jan 8 09:18:42 EST 2016 kill -USR1 12158 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12158 killed at Fri Jan 8 09:18:43 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:18:43 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:18:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:18:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13534: Waiting for Server - FAILED kill -0 12237 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12237 found at Fri Jan 8 09:18:49 EST 2016 selfserv_9591 with PID 12237 started at Fri Jan 8 09:18:49 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:18:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:18:49 EST 2016 ssl.sh: #13535: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 12237 at Fri Jan 8 09:18:49 EST 2016 kill -USR1 12237 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12237 killed at Fri Jan 8 09:18:50 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:18:50 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:18:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:18:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13536: Waiting for Server - FAILED kill -0 12317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12317 found at Fri Jan 8 09:18:56 EST 2016 selfserv_9591 with PID 12317 started at Fri Jan 8 09:18:56 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:18:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:18:57 EST 2016 ssl.sh: #13537: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 12317 at Fri Jan 8 09:18:57 EST 2016 kill -USR1 12317 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12317 killed at Fri Jan 8 09:18:57 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9591 starting at Fri Jan 8 09:18:57 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:18:57 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:19:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13538: Waiting for Server - FAILED kill -0 12396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12396 found at Fri Jan 8 09:19:03 EST 2016 selfserv_9591 with PID 12396 started at Fri Jan 8 09:19:03 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 09:19:03 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:19:04 EST 2016 ssl.sh: #13539: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 12396 at Fri Jan 8 09:19:04 EST 2016 kill -USR1 12396 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12396 killed at Fri Jan 8 09:19:04 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9591 starting at Fri Jan 8 09:19:04 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:19:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:19:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13540: Waiting for Server - FAILED kill -0 12475 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12475 found at Fri Jan 8 09:19:10 EST 2016 selfserv_9591 with PID 12475 started at Fri Jan 8 09:19:10 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 09:19:10 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:19:11 EST 2016 ssl.sh: #13541: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 12475 at Fri Jan 8 09:19:11 EST 2016 kill -USR1 12475 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12475 killed at Fri Jan 8 09:19:11 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9591 starting at Fri Jan 8 09:19:11 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:19:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:19:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13542: Waiting for Server - FAILED kill -0 12555 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12555 found at Fri Jan 8 09:19:17 EST 2016 selfserv_9591 with PID 12555 started at Fri Jan 8 09:19:17 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 09:19:17 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:19:18 EST 2016 ssl.sh: #13543: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 12555 at Fri Jan 8 09:19:18 EST 2016 kill -USR1 12555 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12555 killed at Fri Jan 8 09:19:18 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 09:19:18 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:19:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:19:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13544: Waiting for Server - FAILED kill -0 12636 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12636 found at Fri Jan 8 09:19:24 EST 2016 selfserv_9591 with PID 12636 started at Fri Jan 8 09:19:24 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 09:19:24 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:19:25 EST 2016 ssl.sh: #13545: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 12636 at Fri Jan 8 09:19:25 EST 2016 kill -USR1 12636 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12636 killed at Fri Jan 8 09:19:25 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 09:19:25 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:19:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:19:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13546: Waiting for Server - FAILED kill -0 12715 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12715 found at Fri Jan 8 09:19:31 EST 2016 selfserv_9591 with PID 12715 started at Fri Jan 8 09:19:31 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 09:19:31 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:19:32 EST 2016 ssl.sh: #13547: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 12715 at Fri Jan 8 09:19:32 EST 2016 kill -USR1 12715 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12715 killed at Fri Jan 8 09:19:32 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:19:33 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:19:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:19:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13548: Waiting for Server - FAILED kill -0 12816 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12816 found at Fri Jan 8 09:19:39 EST 2016 selfserv_9591 with PID 12816 started at Fri Jan 8 09:19:39 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 09:19:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:19:39 EST 2016 ssl.sh: #13549: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 12816 at Fri Jan 8 09:19:39 EST 2016 kill -USR1 12816 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12816 killed at Fri Jan 8 09:19:40 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:19:40 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:19:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:19:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13550: Waiting for Server - FAILED kill -0 12895 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12895 found at Fri Jan 8 09:19:46 EST 2016 selfserv_9591 with PID 12895 started at Fri Jan 8 09:19:46 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 09:19:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:19:46 EST 2016 ssl.sh: #13551: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 12895 at Fri Jan 8 09:19:46 EST 2016 kill -USR1 12895 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12895 killed at Fri Jan 8 09:19:47 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:19:47 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:19:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:19:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13552: Waiting for Server - FAILED kill -0 12974 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 12974 found at Fri Jan 8 09:19:53 EST 2016 selfserv_9591 with PID 12974 started at Fri Jan 8 09:19:53 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 09:19:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:19:53 EST 2016 ssl.sh: #13553: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 12974 at Fri Jan 8 09:19:53 EST 2016 kill -USR1 12974 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 12974 killed at Fri Jan 8 09:19:54 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:19:54 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:19:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:19:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13554: Waiting for Server - FAILED kill -0 13054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13054 found at Fri Jan 8 09:20:00 EST 2016 selfserv_9591 with PID 13054 started at Fri Jan 8 09:20:00 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 09:20:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:20:01 EST 2016 ssl.sh: #13555: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 13054 at Fri Jan 8 09:20:01 EST 2016 kill -USR1 13054 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13054 killed at Fri Jan 8 09:20:01 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9591 starting at Fri Jan 8 09:20:01 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:20:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:20:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13556: Waiting for Server - FAILED kill -0 13133 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13133 found at Fri Jan 8 09:20:07 EST 2016 selfserv_9591 with PID 13133 started at Fri Jan 8 09:20:07 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 09:20:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:20:08 EST 2016 ssl.sh: #13557: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 13133 at Fri Jan 8 09:20:08 EST 2016 kill -USR1 13133 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13133 killed at Fri Jan 8 09:20:08 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:20:08 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:20:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:20:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13558: Waiting for Server - FAILED kill -0 13212 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13212 found at Fri Jan 8 09:20:14 EST 2016 selfserv_9591 with PID 13212 started at Fri Jan 8 09:20:14 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 09:20:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:20:15 EST 2016 ssl.sh: #13559: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 13212 at Fri Jan 8 09:20:15 EST 2016 kill -USR1 13212 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13212 killed at Fri Jan 8 09:20:15 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:20:15 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:20:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:20:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13560: Waiting for Server - FAILED kill -0 13313 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13313 found at Fri Jan 8 09:20:21 EST 2016 selfserv_9591 with PID 13313 started at Fri Jan 8 09:20:21 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:20:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:20:22 EST 2016 ssl.sh: #13561: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 13313 at Fri Jan 8 09:20:22 EST 2016 kill -USR1 13313 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13313 killed at Fri Jan 8 09:20:22 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9591 starting at Fri Jan 8 09:20:23 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:20:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:20:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13562: Waiting for Server - FAILED kill -0 13392 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13392 found at Fri Jan 8 09:20:28 EST 2016 selfserv_9591 with PID 13392 started at Fri Jan 8 09:20:28 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 09:20:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:20:29 EST 2016 ssl.sh: #13563: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 13392 at Fri Jan 8 09:20:29 EST 2016 kill -USR1 13392 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13392 killed at Fri Jan 8 09:20:30 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:20:30 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:20:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:20:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13564: Waiting for Server - FAILED kill -0 13471 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13471 found at Fri Jan 8 09:20:36 EST 2016 selfserv_9591 with PID 13471 started at Fri Jan 8 09:20:36 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:20:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:20:36 EST 2016 ssl.sh: #13565: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 13471 at Fri Jan 8 09:20:36 EST 2016 kill -USR1 13471 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13471 killed at Fri Jan 8 09:20:37 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:20:37 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:20:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:20:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13566: Waiting for Server - FAILED kill -0 13551 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13551 found at Fri Jan 8 09:20:43 EST 2016 selfserv_9591 with PID 13551 started at Fri Jan 8 09:20:43 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:20:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:20:43 EST 2016 ssl.sh: #13567: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 13551 at Fri Jan 8 09:20:43 EST 2016 kill -USR1 13551 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13551 killed at Fri Jan 8 09:20:44 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:20:44 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:20:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:20:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13568: Waiting for Server - FAILED kill -0 13644 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13644 found at Fri Jan 8 09:20:50 EST 2016 selfserv_9591 with PID 13644 started at Fri Jan 8 09:20:50 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:20:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:20:50 EST 2016 ssl.sh: #13569: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 13644 at Fri Jan 8 09:20:50 EST 2016 kill -USR1 13644 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13644 killed at Fri Jan 8 09:20:51 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9591 starting at Fri Jan 8 09:20:51 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:20:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:20:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13570: Waiting for Server - FAILED kill -0 13738 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13738 found at Fri Jan 8 09:20:57 EST 2016 selfserv_9591 with PID 13738 started at Fri Jan 8 09:20:57 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:20:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:20:58 EST 2016 ssl.sh: #13571: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 13738 at Fri Jan 8 09:20:58 EST 2016 kill -USR1 13738 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13738 killed at Fri Jan 8 09:20:58 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:20:58 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:20:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:21:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13572: Waiting for Server - FAILED kill -0 13817 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13817 found at Fri Jan 8 09:21:04 EST 2016 selfserv_9591 with PID 13817 started at Fri Jan 8 09:21:04 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:21:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:21:05 EST 2016 ssl.sh: #13573: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 13817 at Fri Jan 8 09:21:05 EST 2016 kill -USR1 13817 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13817 killed at Fri Jan 8 09:21:05 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:21:05 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:21:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:21:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13574: Waiting for Server - FAILED kill -0 13896 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13896 found at Fri Jan 8 09:21:11 EST 2016 selfserv_9591 with PID 13896 started at Fri Jan 8 09:21:11 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:21:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:21:12 EST 2016 ssl.sh: #13575: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 13896 at Fri Jan 8 09:21:12 EST 2016 kill -USR1 13896 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13896 killed at Fri Jan 8 09:21:12 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:21:12 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:21:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:21:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13576: Waiting for Server - FAILED kill -0 13997 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 13997 found at Fri Jan 8 09:21:18 EST 2016 selfserv_9591 with PID 13997 started at Fri Jan 8 09:21:18 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 09:21:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:21:19 EST 2016 ssl.sh: #13577: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 13997 at Fri Jan 8 09:21:19 EST 2016 kill -USR1 13997 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 13997 killed at Fri Jan 8 09:21:19 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:21:20 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:21:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:21:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13578: Waiting for Server - FAILED kill -0 14076 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14076 found at Fri Jan 8 09:21:25 EST 2016 selfserv_9591 with PID 14076 started at Fri Jan 8 09:21:25 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 09:21:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:21:26 EST 2016 ssl.sh: #13579: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 14076 at Fri Jan 8 09:21:26 EST 2016 kill -USR1 14076 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14076 killed at Fri Jan 8 09:21:27 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:21:27 EST 2016 selfserv_9591 -D -p 9591 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:21:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:21:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13580: Waiting for Server - FAILED kill -0 14169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14169 found at Fri Jan 8 09:21:33 EST 2016 selfserv_9591 with PID 14169 started at Fri Jan 8 09:21:33 EST 2016 strsclnt -q -p 9591 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 09:21:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:21:33 EST 2016 ssl.sh: #13581: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 14169 at Fri Jan 8 09:21:33 EST 2016 kill -USR1 14169 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14169 killed at Fri Jan 8 09:21:34 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 09:21:34 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:21:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:21:40 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13582: Waiting for Server - FAILED kill -0 14323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14323 found at Fri Jan 8 09:21:40 EST 2016 selfserv_9591 with PID 14323 started at Fri Jan 8 09:21:40 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 09:21:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:21:41 EST 2016 ssl.sh: #13583: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 14323 at Fri Jan 8 09:21:41 EST 2016 kill -USR1 14323 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14323 killed at Fri Jan 8 09:21:41 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9591 starting at Fri Jan 8 09:21:41 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:21:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:21:47 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13584: Waiting for Server - FAILED kill -0 14402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14402 found at Fri Jan 8 09:21:47 EST 2016 selfserv_9591 with PID 14402 started at Fri Jan 8 09:21:47 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 09:21:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:21:48 EST 2016 ssl.sh: #13585: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 14402 at Fri Jan 8 09:21:48 EST 2016 kill -USR1 14402 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14402 killed at Fri Jan 8 09:21:48 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9591 starting at Fri Jan 8 09:21:48 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:21:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:21:54 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13586: Waiting for Server - FAILED kill -0 14482 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14482 found at Fri Jan 8 09:21:54 EST 2016 selfserv_9591 with PID 14482 started at Fri Jan 8 09:21:54 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 09:21:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:21:55 EST 2016 ssl.sh: #13587: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 14482 at Fri Jan 8 09:21:55 EST 2016 kill -USR1 14482 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14482 killed at Fri Jan 8 09:21:55 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9591 starting at Fri Jan 8 09:21:55 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:21:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:22:01 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13588: Waiting for Server - FAILED kill -0 14562 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14562 found at Fri Jan 8 09:22:01 EST 2016 selfserv_9591 with PID 14562 started at Fri Jan 8 09:22:01 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 09:22:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:22:02 EST 2016 ssl.sh: #13589: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 14562 at Fri Jan 8 09:22:02 EST 2016 kill -USR1 14562 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14562 killed at Fri Jan 8 09:22:02 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9591 starting at Fri Jan 8 09:22:03 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:22:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:22:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13590: Waiting for Server - FAILED kill -0 14641 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14641 found at Fri Jan 8 09:22:08 EST 2016 selfserv_9591 with PID 14641 started at Fri Jan 8 09:22:08 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 09:22:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:22:09 EST 2016 ssl.sh: #13591: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 14641 at Fri Jan 8 09:22:09 EST 2016 kill -USR1 14641 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14641 killed at Fri Jan 8 09:22:10 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9591 starting at Fri Jan 8 09:22:10 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:22:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:22:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13592: Waiting for Server - FAILED kill -0 14720 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14720 found at Fri Jan 8 09:22:16 EST 2016 selfserv_9591 with PID 14720 started at Fri Jan 8 09:22:16 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 09:22:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:22:16 EST 2016 ssl.sh: #13593: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 14720 at Fri Jan 8 09:22:16 EST 2016 kill -USR1 14720 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14720 killed at Fri Jan 8 09:22:17 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9591 starting at Fri Jan 8 09:22:17 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:22:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:22:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13594: Waiting for Server - FAILED kill -0 14800 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14800 found at Fri Jan 8 09:22:23 EST 2016 selfserv_9591 with PID 14800 started at Fri Jan 8 09:22:23 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 09:22:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:22:23 EST 2016 ssl.sh: #13595: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 14800 at Fri Jan 8 09:22:23 EST 2016 kill -USR1 14800 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14800 killed at Fri Jan 8 09:22:24 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:22:24 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:22:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:22:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13596: Waiting for Server - FAILED kill -0 14908 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14908 found at Fri Jan 8 09:22:30 EST 2016 selfserv_9591 with PID 14908 started at Fri Jan 8 09:22:30 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 09:22:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:22:30 EST 2016 ssl.sh: #13597: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 14908 at Fri Jan 8 09:22:30 EST 2016 kill -USR1 14908 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14908 killed at Fri Jan 8 09:22:31 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:22:31 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:22:31 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:22:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13598: Waiting for Server - FAILED kill -0 14987 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 14987 found at Fri Jan 8 09:22:37 EST 2016 selfserv_9591 with PID 14987 started at Fri Jan 8 09:22:37 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 09:22:37 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:22:38 EST 2016 ssl.sh: #13599: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 14987 at Fri Jan 8 09:22:38 EST 2016 kill -USR1 14987 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 14987 killed at Fri Jan 8 09:22:38 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:22:38 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:22:38 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:22:44 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13600: Waiting for Server - FAILED kill -0 15067 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15067 found at Fri Jan 8 09:22:44 EST 2016 selfserv_9591 with PID 15067 started at Fri Jan 8 09:22:44 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 09:22:44 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:22:45 EST 2016 ssl.sh: #13601: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15067 at Fri Jan 8 09:22:45 EST 2016 kill -USR1 15067 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15067 killed at Fri Jan 8 09:22:45 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:22:45 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:22:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:22:51 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13602: Waiting for Server - FAILED kill -0 15146 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15146 found at Fri Jan 8 09:22:51 EST 2016 selfserv_9591 with PID 15146 started at Fri Jan 8 09:22:51 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 09:22:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:22:52 EST 2016 ssl.sh: #13603: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 15146 at Fri Jan 8 09:22:52 EST 2016 kill -USR1 15146 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15146 killed at Fri Jan 8 09:22:52 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 09:22:52 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:22:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:22:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13604: Waiting for Server - FAILED kill -0 15225 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15225 found at Fri Jan 8 09:22:58 EST 2016 selfserv_9591 with PID 15225 started at Fri Jan 8 09:22:58 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 09:22:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:22:59 EST 2016 ssl.sh: #13605: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 15225 at Fri Jan 8 09:22:59 EST 2016 kill -USR1 15225 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15225 killed at Fri Jan 8 09:22:59 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:23:00 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:23:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:23:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13606: Waiting for Server - FAILED kill -0 15305 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15305 found at Fri Jan 8 09:23:05 EST 2016 selfserv_9591 with PID 15305 started at Fri Jan 8 09:23:05 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 09:23:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:23:06 EST 2016 ssl.sh: #13607: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15305 at Fri Jan 8 09:23:06 EST 2016 kill -USR1 15305 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15305 killed at Fri Jan 8 09:23:07 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9591 starting at Fri Jan 8 09:23:07 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:23:07 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:23:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13608: Waiting for Server - FAILED kill -0 15384 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15384 found at Fri Jan 8 09:23:13 EST 2016 selfserv_9591 with PID 15384 started at Fri Jan 8 09:23:13 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 09:23:13 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:23:13 EST 2016 ssl.sh: #13609: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15384 at Fri Jan 8 09:23:13 EST 2016 kill -USR1 15384 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15384 killed at Fri Jan 8 09:23:14 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:23:14 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:23:14 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:23:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13610: Waiting for Server - FAILED kill -0 15492 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15492 found at Fri Jan 8 09:23:20 EST 2016 selfserv_9591 with PID 15492 started at Fri Jan 8 09:23:20 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:23:20 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:23:20 EST 2016 ssl.sh: #13611: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15492 at Fri Jan 8 09:23:20 EST 2016 kill -USR1 15492 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15492 killed at Fri Jan 8 09:23:21 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:23:21 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:23:21 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:23:26 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13612: Waiting for Server - FAILED kill -0 15572 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15572 found at Fri Jan 8 09:23:27 EST 2016 selfserv_9591 with PID 15572 started at Fri Jan 8 09:23:27 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:23:27 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:23:27 EST 2016 ssl.sh: #13613: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15572 at Fri Jan 8 09:23:28 EST 2016 kill -USR1 15572 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15572 killed at Fri Jan 8 09:23:28 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:23:28 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:23:28 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:23:33 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13614: Waiting for Server - FAILED kill -0 15654 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15654 found at Fri Jan 8 09:23:34 EST 2016 selfserv_9591 with PID 15654 started at Fri Jan 8 09:23:34 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:23:34 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:23:35 EST 2016 ssl.sh: #13615: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15654 at Fri Jan 8 09:23:35 EST 2016 kill -USR1 15654 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15654 killed at Fri Jan 8 09:23:35 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:23:35 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:23:35 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:23:41 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13616: Waiting for Server - FAILED kill -0 15734 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15734 found at Fri Jan 8 09:23:41 EST 2016 selfserv_9591 with PID 15734 started at Fri Jan 8 09:23:41 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:23:41 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:23:42 EST 2016 ssl.sh: #13617: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15734 at Fri Jan 8 09:23:42 EST 2016 kill -USR1 15734 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15734 killed at Fri Jan 8 09:23:42 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:23:42 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:23:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:23:48 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13618: Waiting for Server - FAILED kill -0 15813 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15813 found at Fri Jan 8 09:23:48 EST 2016 selfserv_9591 with PID 15813 started at Fri Jan 8 09:23:48 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:23:48 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:23:49 EST 2016 ssl.sh: #13619: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 15813 at Fri Jan 8 09:23:49 EST 2016 kill -USR1 15813 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15813 killed at Fri Jan 8 09:23:49 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9591 starting at Fri Jan 8 09:23:49 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:23:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:23:55 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13620: Waiting for Server - FAILED kill -0 15893 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15893 found at Fri Jan 8 09:23:55 EST 2016 selfserv_9591 with PID 15893 started at Fri Jan 8 09:23:55 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 09:23:55 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:23:56 EST 2016 ssl.sh: #13621: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 15893 at Fri Jan 8 09:23:56 EST 2016 kill -USR1 15893 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15893 killed at Fri Jan 8 09:23:56 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9591 starting at Fri Jan 8 09:23:56 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:23:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:24:02 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13622: Waiting for Server - FAILED kill -0 15973 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 15973 found at Fri Jan 8 09:24:02 EST 2016 selfserv_9591 with PID 15973 started at Fri Jan 8 09:24:02 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 09:24:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:24:03 EST 2016 ssl.sh: #13623: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 15973 at Fri Jan 8 09:24:03 EST 2016 kill -USR1 15973 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 15973 killed at Fri Jan 8 09:24:03 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9591 starting at Fri Jan 8 09:24:04 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:24:04 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:24:09 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13624: Waiting for Server - FAILED kill -0 16052 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16052 found at Fri Jan 8 09:24:09 EST 2016 selfserv_9591 with PID 16052 started at Fri Jan 8 09:24:09 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 09:24:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:24:10 EST 2016 ssl.sh: #13625: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 16052 at Fri Jan 8 09:24:10 EST 2016 kill -USR1 16052 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16052 killed at Fri Jan 8 09:24:11 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 09:24:11 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:24:11 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:24:16 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13626: Waiting for Server - FAILED kill -0 16131 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16131 found at Fri Jan 8 09:24:17 EST 2016 selfserv_9591 with PID 16131 started at Fri Jan 8 09:24:17 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 09:24:17 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:24:17 EST 2016 ssl.sh: #13627: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16131 at Fri Jan 8 09:24:17 EST 2016 kill -USR1 16131 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16131 killed at Fri Jan 8 09:24:18 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9591 starting at Fri Jan 8 09:24:18 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:24:18 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:24:23 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13628: Waiting for Server - FAILED kill -0 16211 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16211 found at Fri Jan 8 09:24:24 EST 2016 selfserv_9591 with PID 16211 started at Fri Jan 8 09:24:24 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 09:24:24 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:24:24 EST 2016 ssl.sh: #13629: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16211 at Fri Jan 8 09:24:24 EST 2016 kill -USR1 16211 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16211 killed at Fri Jan 8 09:24:25 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:24:25 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:24:25 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:24:30 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13630: Waiting for Server - FAILED kill -0 16311 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16311 found at Fri Jan 8 09:24:31 EST 2016 selfserv_9591 with PID 16311 started at Fri Jan 8 09:24:31 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 09:24:31 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:24:31 EST 2016 ssl.sh: #13631: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16311 at Fri Jan 8 09:24:31 EST 2016 kill -USR1 16311 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16311 killed at Fri Jan 8 09:24:32 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:24:32 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:24:32 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:24:37 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13632: Waiting for Server - FAILED kill -0 16390 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16390 found at Fri Jan 8 09:24:38 EST 2016 selfserv_9591 with PID 16390 started at Fri Jan 8 09:24:38 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 09:24:38 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:24:39 EST 2016 ssl.sh: #13633: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 16390 at Fri Jan 8 09:24:39 EST 2016 kill -USR1 16390 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16390 killed at Fri Jan 8 09:24:39 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:24:39 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:24:39 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:24:45 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13634: Waiting for Server - FAILED kill -0 16470 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16470 found at Fri Jan 8 09:24:45 EST 2016 selfserv_9591 with PID 16470 started at Fri Jan 8 09:24:45 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 09:24:45 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:24:46 EST 2016 ssl.sh: #13635: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16470 at Fri Jan 8 09:24:46 EST 2016 kill -USR1 16470 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16470 killed at Fri Jan 8 09:24:46 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:24:46 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:24:46 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:24:52 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13636: Waiting for Server - FAILED kill -0 16549 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16549 found at Fri Jan 8 09:24:52 EST 2016 selfserv_9591 with PID 16549 started at Fri Jan 8 09:24:52 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 09:24:52 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:24:53 EST 2016 ssl.sh: #13637: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16549 at Fri Jan 8 09:24:53 EST 2016 kill -USR1 16549 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16549 killed at Fri Jan 8 09:24:53 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9591 starting at Fri Jan 8 09:24:53 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:24:53 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:24:59 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13638: Waiting for Server - FAILED kill -0 16628 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16628 found at Fri Jan 8 09:24:59 EST 2016 selfserv_9591 with PID 16628 started at Fri Jan 8 09:24:59 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 09:24:59 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:25:00 EST 2016 ssl.sh: #13639: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 16628 at Fri Jan 8 09:25:00 EST 2016 kill -USR1 16628 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16628 killed at Fri Jan 8 09:25:00 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:25:00 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:25:00 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:25:06 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13640: Waiting for Server - FAILED kill -0 16708 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16708 found at Fri Jan 8 09:25:06 EST 2016 selfserv_9591 with PID 16708 started at Fri Jan 8 09:25:06 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 09:25:06 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:25:07 EST 2016 ssl.sh: #13641: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16708 at Fri Jan 8 09:25:07 EST 2016 kill -USR1 16708 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16708 killed at Fri Jan 8 09:25:07 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:25:08 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:25:08 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:25:13 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13642: Waiting for Server - FAILED kill -0 16808 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16808 found at Fri Jan 8 09:25:14 EST 2016 selfserv_9591 with PID 16808 started at Fri Jan 8 09:25:14 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:25:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:25:14 EST 2016 ssl.sh: #13643: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16808 at Fri Jan 8 09:25:14 EST 2016 kill -USR1 16808 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16808 killed at Fri Jan 8 09:25:15 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9591 starting at Fri Jan 8 09:25:15 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:25:15 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:25:20 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13644: Waiting for Server - FAILED kill -0 16887 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16887 found at Fri Jan 8 09:25:21 EST 2016 selfserv_9591 with PID 16887 started at Fri Jan 8 09:25:21 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 09:25:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:25:21 EST 2016 ssl.sh: #13645: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 16887 at Fri Jan 8 09:25:21 EST 2016 kill -USR1 16887 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16887 killed at Fri Jan 8 09:25:22 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:25:22 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:25:22 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:25:27 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13646: Waiting for Server - FAILED kill -0 16967 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 16967 found at Fri Jan 8 09:25:28 EST 2016 selfserv_9591 with PID 16967 started at Fri Jan 8 09:25:28 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:25:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:25:28 EST 2016 ssl.sh: #13647: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 16967 at Fri Jan 8 09:25:28 EST 2016 kill -USR1 16967 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 16967 killed at Fri Jan 8 09:25:29 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:25:29 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:25:29 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:25:34 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13648: Waiting for Server - FAILED kill -0 17046 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17046 found at Fri Jan 8 09:25:35 EST 2016 selfserv_9591 with PID 17046 started at Fri Jan 8 09:25:35 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:25:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:25:35 EST 2016 ssl.sh: #13649: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17046 at Fri Jan 8 09:25:36 EST 2016 kill -USR1 17046 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17046 killed at Fri Jan 8 09:25:36 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:25:36 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:25:36 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:25:42 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13650: Waiting for Server - FAILED kill -0 17139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17139 found at Fri Jan 8 09:25:42 EST 2016 selfserv_9591 with PID 17139 started at Fri Jan 8 09:25:42 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:25:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:25:43 EST 2016 ssl.sh: #13651: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17139 at Fri Jan 8 09:25:43 EST 2016 kill -USR1 17139 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17139 killed at Fri Jan 8 09:25:43 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9591 starting at Fri Jan 8 09:25:43 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:25:43 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:25:49 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13652: Waiting for Server - FAILED kill -0 17233 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17233 found at Fri Jan 8 09:25:49 EST 2016 selfserv_9591 with PID 17233 started at Fri Jan 8 09:25:49 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:25:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:25:50 EST 2016 ssl.sh: #13653: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17233 at Fri Jan 8 09:25:50 EST 2016 kill -USR1 17233 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17233 killed at Fri Jan 8 09:25:50 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:25:50 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:25:50 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:25:56 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13654: Waiting for Server - FAILED kill -0 17312 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17312 found at Fri Jan 8 09:25:56 EST 2016 selfserv_9591 with PID 17312 started at Fri Jan 8 09:25:56 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:25:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:25:57 EST 2016 ssl.sh: #13655: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17312 at Fri Jan 8 09:25:57 EST 2016 kill -USR1 17312 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17312 killed at Fri Jan 8 09:25:57 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9591 starting at Fri Jan 8 09:25:57 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:25:58 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:26:03 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13656: Waiting for Server - FAILED kill -0 17391 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17391 found at Fri Jan 8 09:26:03 EST 2016 selfserv_9591 with PID 17391 started at Fri Jan 8 09:26:03 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 09:26:03 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:26:04 EST 2016 ssl.sh: #13657: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17391 at Fri Jan 8 09:26:04 EST 2016 kill -USR1 17391 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17391 killed at Fri Jan 8 09:26:04 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:26:05 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:26:05 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:26:10 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13658: Waiting for Server - FAILED kill -0 17492 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17492 found at Fri Jan 8 09:26:11 EST 2016 selfserv_9591 with PID 17492 started at Fri Jan 8 09:26:11 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 09:26:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:26:11 EST 2016 ssl.sh: #13659: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17492 at Fri Jan 8 09:26:11 EST 2016 kill -USR1 17492 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17492 killed at Fri Jan 8 09:26:12 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9591 starting at Fri Jan 8 09:26:12 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:26:12 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:26:17 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13660: Waiting for Server - FAILED kill -0 17571 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17571 found at Fri Jan 8 09:26:18 EST 2016 selfserv_9591 with PID 17571 started at Fri Jan 8 09:26:18 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 09:26:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:26:18 EST 2016 ssl.sh: #13661: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9591 with PID 17571 at Fri Jan 8 09:26:18 EST 2016 kill -USR1 17571 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17571 killed at Fri Jan 8 09:26:19 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9591 starting at Fri Jan 8 09:26:19 EST 2016 selfserv_9591 -D -p 9591 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.18586\ -H 1 -V ssl3: & trying to connect to selfserv_9591 at Fri Jan 8 09:26:19 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9591 at Fri Jan 8 09:26:24 EST 2016 tstclnt -p 9591 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13662: Waiting for Server - FAILED kill -0 17665 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9591 with PID 17665 found at Fri Jan 8 09:26:25 EST 2016 selfserv_9591 with PID 17665 started at Fri Jan 8 09:26:25 EST 2016 strsclnt -q -p 9591 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 09:26:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 09:26:25 EST 2016 ssl.sh: #13663: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9591 with PID 17665 at Fri Jan 8 09:26:26 EST 2016 kill -USR1 17665 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9591 -b -p 9591 2>/dev/null; selfserv_9591 with PID 17665 killed at Fri Jan 8 09:26:26 EST 2016 TIMESTAMP ssl END: Fri Jan 8 09:26:26 EST 2016 Running tests for merge TIMESTAMP merge BEGIN: Fri Jan 8 09:26:26 EST 2016 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v1.18586 -t "Test1" sdr.sh: #13664: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v2.18586 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #13665: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v3.18586 -t "1234567" sdr.sh: #13666: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v1.18586 -t "Test1" sdr.sh: #13667: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v2.18586 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #13668: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v3.18586 -t "1234567" sdr.sh: #13669: Decrypt - Value 3 - PASSED merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v3.18586 -t Test2 -f ../tests.pw merge.sh: #13670: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13671: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13672: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13673: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13674: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13675: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:42:35 2016 Not After : Fri Jan 08 13:42:35 2021 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:1d:9a:c3:cd:68:08:5e:ba:e2:e9:78:b7:0c:09:84: ed:01:73:89:c1:a0:9b:35:0e:e3:a2:33:f2:18:eb:56: 25:46:76:6d:8d:c1:e0:7f:76:8e:3b:cf:ac:63:47:d7: 69:a2:9b:67:aa:7c:e7:93:1c:18:15:33:69:f0:b5:97: a0:51:84:48:cb:33:02:0b:04:7a:d7:d9:0a:54:a1:35: 1e:3e:c3:14:90:a1:72:11:60:e9:f4:ea:89:38:bf:38: 77:04:45:6e:7f:c0:80:19:da:b7:38:ce:62:ee:ae:92: c0:0a:88:c2:ee:d8:5f:01:86:85:32:26:2b:a5:ca:bf: 3b:2e:45:3b:90:0c:78:9d:1e:44:08:78:23:c7:f5:68: 22:f3:e2:cd:f7:46:bd:f1:e4:e9:36:d5:9d:16:00:5b: 6b:41:8e:16:c6:1d:56:a3:71:e0:15:c9:d5:32:d6:2a: 9a:cc:8d:3c:25:ff:ca:58:5f:e6:c8:65:18:be:a9:e9: af:a7:71:88:d8:82:42:15:47:39:7f:90:5a:51:a3:2e: a1:bb:0f:71:de:9d:f0:c1:59:ea:31:83:4b:b2:8a:29: 2e:e0:5a:c5:c2:9b:50:e0:f3:ca:de:b6:f5:59:09:79: 4d:14:6f:15:e8:ac:42:a8:1f:4d:9c:75:8c:c7:76:65 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:19:80:02:08:bc:d4:b2:da:de:7b:fa:32:e5:6f:17: fc:73:7e:5b:40:9e:c1:9a:fd:93:78:e3:21:79:25:86: 01:ba:0f:ad:61:66:f4:72:17:d8:dc:4f:75:d4:4b:3c: 0c:d9:ee:84:45:0e:b3:03:a0:3c:b6:be:c9:57:a9:43: ae:7a:87:3b:10:79:43:f5:41:42:4e:8e:7b:17:61:08: 24:13:ff:86:c6:70:a2:9d:e3:22:6b:3e:77:85:96:e8: e0:7a:4e:ca:b8:62:4f:67:fd:a8:e9:b9:69:90:29:c3: cc:96:89:2a:b7:98:c3:f8:7d:08:c0:18:ca:0c:35:97: a9:91:75:96:b8:b0:54:7c:52:4b:37:50:50:26:e2:a9: 14:74:5d:9b:79:81:4c:74:c2:17:e1:5d:27:38:5a:d3: 1c:ab:d0:88:f7:a2:65:ea:52:1f:44:46:dc:36:6a:e3: dd:04:19:03:79:93:fc:61:d5:99:9d:b1:ec:53:11:ef: ea:ad:e6:69:05:26:0c:c3:25:6a:b0:26:b2:be:21:f0: bd:06:ae:11:6b:55:98:9c:ec:c5:cc:9f:8e:6e:fc:c5: 78:cb:ed:5f:5b:72:5e:99:9d:3a:b6:1f:a5:ff:98:b5: 27:3b:02:24:5e:91:1b:23:14:01:1f:69:99:20:e2:d6 Fingerprint (SHA-256): 6B:D5:E4:88:26:02:01:FA:E9:F6:9F:D8:9A:E7:E3:55:DE:47:9D:41:91:71:CD:83:59:81:01:AE:8E:2D:64:CC Fingerprint (SHA1): 8F:DB:90:FC:A6:92:42:DC:AC:88:0C:5F:49:1C:6B:3D:A4:40:51:F8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #13676: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 13:42:51 2016 Not After : Fri Jan 08 13:42:51 2021 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:4e:42:5d:9b:e3:36:8f:43:41:1b:ed:67:20:31:42: 65:ba:dd:79:74:49:73:10:01:0e:5a:1d:fd:88:4a:f5: 22:d2:be:83:be:79:48:4e:f2:1c:50:3d:94:fe:77:21: a4:f1:0e:af:a3:6e:bb:83:4b:bd:de:21:fe:a5:4b:fe: 1f:9b:f0:c5:f7:2f:4d:14:f3:26:a8:ed:2d:5b:36:4e: 5b:4e:4b:00:46:7a:a3:bb:eb:90:86:70:c4:55:5a:cd: 17:bb:dd:f7:f1:55:f1:23:43:a9:65:7e:46:73:26:b0: 3e:60:dd:dd:cd:36:e4:b1:a2:1c:24:2e:f0:86:3a:c9: ea:83:5c:3b:df:b1:40:3b:49:7b:a4:14:14:65:98:3e: 39:1a:2a:67:f5:3f:e1:5f:53:6e:73:ab:d5:02:11:a8: 06:46:9e:4c:ed:c6:12:38:db:6c:82:53:3e:e7:05:51: 8a:2b:92:4e:5c:df:00:ec:9d:34:9c:51:e4:e2:d1:33: 68:02:4e:97:2b:79:db:a0:7a:f6:94:24:74:33:f8:41: 1f:fa:8c:7f:e6:38:f6:68:5c:bc:64:5c:9a:ee:bc:3a: 9f:13:1e:ac:0e:fe:09:7f:b3:aa:a5:6e:cc:d8:a2:33: 0c:5e:9a:84:7f:f1:59:17:f8:21:81:dc:81:74:43:a3 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:bc:fd:b8:07:24:f4:72:dd:c8:cd:f9:7d:1c:f7:62: 59:36:e5:f9:94:bd:d8:56:cc:fa:63:b6:d0:67:80:7b: 72:4a:76:34:0a:e9:3f:67:76:87:11:24:f7:64:47:a3: 28:7a:c0:8a:66:02:c2:2c:31:68:08:56:56:c9:ac:30: 68:d3:c0:13:bd:c2:65:67:86:c0:04:7d:52:64:49:24: 6d:fe:79:6b:8c:b9:28:f2:20:12:09:73:18:ca:7e:80: dd:79:5b:a0:7a:c3:9e:bf:b0:b0:a9:c1:d1:2d:3e:f2: e9:f2:2c:53:e6:5d:ef:a8:e2:1a:98:a8:48:30:e5:7e: 94:9e:e7:5c:36:9a:3b:52:39:a9:ff:04:42:2a:c7:1a: 05:74:f0:a0:cb:e6:e3:d7:a3:7c:48:5c:c1:e7:5c:e3: f8:f7:ab:7b:89:3c:70:a6:b0:79:10:f8:82:73:f2:f0: 3e:5d:2f:bd:36:d0:d9:3d:ca:ad:e2:10:40:ea:bd:98: 2f:e1:7f:80:2c:88:8f:57:73:2b:39:ec:48:db:93:66: 19:78:9d:c7:3e:13:86:e3:ff:bd:57:d7:df:2e:4a:76: a6:9c:44:ef:e8:ba:64:47:32:81:57:5b:07:c0:ea:31: 67:23:85:2d:71:51:ce:86:57:6a:b7:26:da:96:0f:12 Fingerprint (SHA-256): 7D:4E:33:D3:6C:F5:76:1E:C0:A2:4F:F3:66:E8:29:9B:BD:2B:FA:45:09:CB:79:FE:B0:13:1A:33:5C:A9:A0:ED Fingerprint (SHA1): 4C:06:4C:B5:3B:92:4C:4E:D4:7B:01:ED:C4:72:67:71:14:18:BF:55 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #13677: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13678: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA CT,C,C TestCA-dsa CT,C,C TestCA-ec CT,C,C Alice u,u,u Alice-dsa u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u Alice-ecmixed u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, Dave-ec u,u,u Dave-dsa u,u,u Dave-dsamixed u,u,u Dave-ecmixed u,u,u localhost.localdomain u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost.localdomain-ecmixed u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u localhost-sni.localdomain-ecmixed u,u,u ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C ExtendedSSLUser-ecmixed u,u,u chain-2-clientCA-dsa ,, clientCA-dsa T,C,C chain-1-clientCA-dsa ,, clientCA T,C,C chain-2-clientCA-ec ,, chain-2-clientCA ,, chain-1-clientCA ,, chain-1-clientCA-ec ,, clientCA-ec T,C,C Alice #2 ,, Alice #1 ,, Alice #99 ,, Alice #3 ,, Alice #4 ,, Alice #100 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v3.18586 -t Test2 -f ../tests.pw merge.sh: #13679: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v1.18586 -t Test1 -f ../tests.pw merge.sh: #13680: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #13681: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #13682: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #13683: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Fri Jan 08 13:45:19 2016 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 13:28:23 2016 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Fri Jan 08 13:45:12 2016 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #13684: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Fri Jan 8 09:26:58 EST 2016 Running tests for chains TIMESTAMP chains BEGIN: Fri Jan 8 09:26:59 EST 2016 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #13685: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092660 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13686: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #13687: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #13688: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #13689: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13690: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13691: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13692: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #13693: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #13694: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13695: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13696: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13697: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #13698: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #13699: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13700: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9602 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13701: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13702: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #13703: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #13704: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13705: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13706: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13707: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #13708: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13709: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13710: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13711: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #13712: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13713: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13714: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13715: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #13716: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13717: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13718: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13719: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #13720: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13721: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9602 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13722: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13723: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #13724: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13725: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13726: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13727: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #13728: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13729: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13730: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13731: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #13732: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13733: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9602 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13734: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13735: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #13736: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13737: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13738: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13739: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #13740: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13741: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9601/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13742: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13743: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #13744: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13745: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9602 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13746: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13747: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160108143000Z nextupdate=20170108143000Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Jan 08 14:30:00 2016 Next Update: Sun Jan 08 14:30:00 2017 CRL Extensions: chains.sh: #13748: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160108143001Z addcert 2 20160108143001Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Jan 08 14:30:01 2016 Next Update: Sun Jan 08 14:30:00 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 14:30:01 2016 CRL Extensions: chains.sh: #13749: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108143002Z nextupdate=20170108143002Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 14:30:02 2016 Next Update: Sun Jan 08 14:30:02 2017 CRL Extensions: chains.sh: #13750: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108143003Z addcert 2 20160108143003Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 14:30:03 2016 Next Update: Sun Jan 08 14:30:02 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 14:30:03 2016 CRL Extensions: chains.sh: #13751: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108143004Z addcert 4 20160108143004Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 14:30:04 2016 Next Update: Sun Jan 08 14:30:02 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 14:30:03 2016 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Fri Jan 08 14:30:04 2016 CRL Extensions: chains.sh: #13752: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108143005Z nextupdate=20170108143005Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 14:30:05 2016 Next Update: Sun Jan 08 14:30:05 2017 CRL Extensions: chains.sh: #13753: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108143006Z addcert 2 20160108143006Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 14:30:06 2016 Next Update: Sun Jan 08 14:30:05 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 14:30:06 2016 CRL Extensions: chains.sh: #13754: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108143007Z addcert 3 20160108143007Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 14:30:07 2016 Next Update: Sun Jan 08 14:30:05 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 14:30:06 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Jan 08 14:30:07 2016 CRL Extensions: chains.sh: #13755: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108143008Z nextupdate=20170108143008Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 14:30:08 2016 Next Update: Sun Jan 08 14:30:08 2017 CRL Extensions: chains.sh: #13756: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108143009Z addcert 2 20160108143009Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 14:30:09 2016 Next Update: Sun Jan 08 14:30:08 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 14:30:09 2016 CRL Extensions: chains.sh: #13757: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108143010Z addcert 3 20160108143010Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 14:30:10 2016 Next Update: Sun Jan 08 14:30:08 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 14:30:09 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Jan 08 14:30:10 2016 CRL Extensions: chains.sh: #13758: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #13759: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #13760: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #13761: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #13762: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #13763: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #13764: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #13765: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #13766: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #13767: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #13768: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #13769: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #13770: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #13771: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #13772: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #13773: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #13774: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #13775: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #13776: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #13777: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #13778: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #13779: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #13780: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #13781: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #13782: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Fri Jan 8 09:30:29 EST 2016 httpserv -D -p 9601 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.18586 & trying to connect to httpserv at Fri Jan 8 09:30:29 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 09:30:34 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #13783: Waiting for Server - FAILED kill -0 19350 >/dev/null 2>/dev/null httpserv with PID 19350 found at Fri Jan 8 09:30:35 EST 2016 httpserv with PID 19350 started at Fri Jan 8 09:30:35 EST 2016 tstclnt -h localhost.localdomain -p 9601 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #13784: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 19350 at Fri Jan 8 09:30:36 EST 2016 kill -USR1 19350 httpserv: normal termination httpserv -b -p 9601 2>/dev/null; httpserv with PID 19350 killed at Fri Jan 8 09:30:37 EST 2016 httpserv starting at Fri Jan 8 09:30:37 EST 2016 httpserv -D -p 9601 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.18586 & trying to connect to httpserv at Fri Jan 8 09:30:37 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 09:30:42 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #13785: Waiting for Server - FAILED kill -0 19435 >/dev/null 2>/dev/null httpserv with PID 19435 found at Fri Jan 8 09:30:43 EST 2016 httpserv with PID 19435 started at Fri Jan 8 09:30:43 EST 2016 tstclnt -h localhost.localdomain -p 9601 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #13786: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 19435 at Fri Jan 8 09:30:44 EST 2016 kill -USR1 19435 httpserv: normal termination httpserv -b -p 9601 2>/dev/null; httpserv with PID 19435 killed at Fri Jan 8 09:30:44 EST 2016 httpserv starting at Fri Jan 8 09:30:44 EST 2016 httpserv -D -p 9601 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.18586 & trying to connect to httpserv at Fri Jan 8 09:30:44 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 09:30:50 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #13787: Waiting for Server - FAILED kill -0 19520 >/dev/null 2>/dev/null httpserv with PID 19520 found at Fri Jan 8 09:30:50 EST 2016 httpserv with PID 19520 started at Fri Jan 8 09:30:50 EST 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #13788: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092661 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13789: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #13790: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #13791: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092662 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13792: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #13793: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #13794: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13795: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108092663 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13796: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13797: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108092664 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13798: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13799: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #13800: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #13801: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13802: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 108092665 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13803: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13804: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13805: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #13806: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #13807: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092662 (0x6715cf6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 14:31:12 2016 Not After : Fri Jan 08 14:31:12 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:03:9e:f6:67:dd:fe:00:cc:be:2b:db:79:3d:19:a7: 57:c7:ef:66:d5:60:fd:09:d7:9d:db:75:50:b9:60:38: a7:14:c1:e3:2a:eb:f8:ed:06:31:f1:96:18:aa:d0:d2: 66:a0:39:2a:b0:f2:b7:e5:bf:b7:32:b9:7e:99:c7:81: 5e:a2:3c:fe:30:09:47:5c:4e:2e:20:91:1f:fc:5d:31: e3:69:66:8f:13:fb:c7:41:1c:69:5f:01:32:00:8f:db: 1f:29:b7:a9:a0:8c:92:fc:be:c7:1e:17:72:29:6e:f2: 35:4d:16:39:27:b6:bb:46:20:96:46:72:91:d6:fe:10: 49:7f:2c:b3:2d:c4:9d:1f:8d:01:8b:02:d1:20:38:bf: 06:91:11:25:c2:85:d2:d2:ed:26:fb:93:69:25:87:5d: 58:b4:6e:56:d3:94:fa:e0:83:11:c9:60:a0:07:ea:d2: ac:f9:74:80:80:9f:59:30:d4:bd:f5:05:f2:c9:16:f2: 74:9e:df:d6:12:44:5f:c4:fa:a3:ba:90:2d:19:fd:62: d6:8b:4e:66:1d:75:ed:59:a9:7d:cb:e6:34:df:8c:54: 6d:49:cb:cc:4f:d5:fc:d0:ea:50:72:f2:b8:ed:b3:52: 1d:36:7c:04:3e:2c:02:90:59:36:d1:c4:43:bf:67:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:5a:38:45:00:a5:d3:c4:ca:66:e2:0b:ba:d4:1d:46: 81:62:08:13:e3:37:4c:c4:e6:f1:5f:15:ad:10:26:ed: 70:a2:34:9f:6c:00:3d:e5:f1:71:8c:67:64:de:63:0d: b1:8d:bc:40:56:7d:93:65:2f:a4:33:54:7a:e4:9d:ef: dd:63:2e:b4:99:fb:e1:df:05:b3:68:6c:6d:25:ff:c9: c2:32:d8:d4:1b:2e:08:d8:82:a4:b1:5e:c5:bb:e2:59: 97:6f:85:15:05:76:06:87:c5:c8:38:ca:a6:d1:12:f7: 65:da:89:db:78:39:e0:eb:ed:55:e3:be:ac:d1:c2:6c: 25:34:ac:c7:78:6c:ec:35:80:35:e0:c8:f9:59:a1:2c: 66:76:3b:8e:de:a0:1c:3e:4f:35:88:76:20:f0:ba:59: be:66:6f:c9:9a:a9:2d:a7:57:da:fe:b2:cc:1c:12:36: 3d:5d:61:49:81:10:c5:6f:d9:75:99:79:eb:ad:6d:d1: a7:2b:64:32:b4:38:39:73:29:0f:de:ee:48:91:7c:75: 29:fd:6d:e8:c0:94:a1:2a:15:7b:bc:8b:c1:38:16:8b: 34:c8:f8:7d:63:48:99:16:6a:b9:73:67:e7:42:d4:92: f2:1f:4d:22:2d:41:b2:45:4e:f6:48:8f:64:0a:2f:b5 Fingerprint (SHA-256): 52:12:F9:95:32:11:92:23:82:BF:22:7D:4C:D9:A9:BC:57:4C:8B:20:56:09:74:9D:45:7D:9C:1D:A7:A2:BA:3A Fingerprint (SHA1): DF:AE:90:00:92:7E:B1:96:E2:0B:4E:4D:5D:9C:C6:0D:66:34:86:59 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13808: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092661 (0x6715cf5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 14:31:03 2016 Not After : Fri Jan 08 14:31:03 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:2d:17:e8:67:76:86:c4:ce:e8:40:81:6d:a3:08:33: 78:92:30:40:c5:5c:f2:c7:65:4a:dd:b2:af:fb:87:72: f2:2a:67:fc:27:fc:39:7c:3d:38:b7:74:ac:f3:da:2e: 2f:67:f2:41:76:64:a4:0f:64:af:b1:25:8d:cc:71:d8: 51:74:ca:9a:84:03:fe:ff:91:7c:6a:8c:42:fc:03:17: 08:99:bd:19:af:2d:ec:04:28:42:3d:6d:7c:7f:fd:22: 2d:2f:11:55:7d:f9:68:6f:4b:48:88:47:ba:32:6d:55: 0d:c5:45:20:5c:20:a6:be:79:57:15:63:d1:51:99:40: 8e:95:4b:56:f8:1c:e9:ba:bd:85:2f:55:92:48:cb:32: a0:37:b3:31:55:68:80:78:86:a4:22:a6:5e:15:8b:0f: 20:68:7f:56:83:5d:33:75:6f:ca:40:64:2f:a7:96:db: 59:70:f8:e1:62:15:5b:ab:db:96:1f:8e:a7:5f:35:94: be:aa:32:fa:2c:fc:2e:3f:c2:d5:34:c6:d3:ec:65:20: a3:48:d7:71:9a:93:91:48:b1:f1:ed:06:bf:f3:54:d3: a2:c5:dc:e3:37:71:ec:d8:fd:70:44:71:52:c7:1f:a5: c8:6e:25:e9:eb:68:7b:ab:c3:8b:73:cb:9a:df:90:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:4c:8c:b1:c4:13:20:e8:a2:26:5d:1d:35:23:aa:0b: 30:d0:da:7c:75:a5:ac:11:77:db:91:25:d1:6d:50:94: d9:ed:1d:a3:5f:74:7c:75:61:1c:ef:af:d8:96:03:d5: 91:07:e7:db:2b:b3:57:b3:7b:49:b7:c1:2c:39:b2:f5: b1:0b:46:77:70:3e:1b:e9:03:9a:ec:92:ab:af:7b:15: 63:7f:a9:cb:b6:5c:42:bf:a4:dc:be:f4:35:99:7f:a3: 9a:c2:85:59:eb:4b:f0:67:ae:21:30:0f:3b:0b:bc:52: 5c:0e:fd:ab:f4:77:db:0d:1c:4e:17:00:5d:6c:16:43: 60:26:ad:53:4d:97:67:04:30:09:86:2a:c7:b9:79:1e: fa:76:4f:7a:4f:c7:51:e6:46:b2:0a:6f:16:e3:84:f7: 61:e0:9c:61:c3:49:60:33:af:bf:38:73:c1:b1:42:a1: 2f:ed:53:57:ea:08:78:14:26:8c:f8:5d:35:5b:46:ff: 95:8c:c5:b9:9e:76:eb:b4:fa:ba:87:c9:a7:6e:24:37: 1d:df:3a:b8:26:98:e1:ae:ee:05:f5:67:fb:36:b8:e0: a4:c3:92:c8:a1:60:b1:83:a0:f3:66:7e:51:0a:7d:d2: 56:73:e9:b2:61:d5:ee:0a:ed:df:e1:54:5d:e6:dd:16 Fingerprint (SHA-256): 95:3B:52:70:1C:D6:50:01:69:05:7F:7C:9D:D9:88:2B:71:9E:D4:78:2B:F7:46:C6:09:27:4F:A7:9D:35:E8:72 Fingerprint (SHA1): 70:0E:56:10:C2:40:1C:37:0A:62:48:32:30:4C:DD:B7:02:F7:3A:1A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13809: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #13810: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #13811: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #13812: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092661 (0x6715cf5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 14:31:03 2016 Not After : Fri Jan 08 14:31:03 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:2d:17:e8:67:76:86:c4:ce:e8:40:81:6d:a3:08:33: 78:92:30:40:c5:5c:f2:c7:65:4a:dd:b2:af:fb:87:72: f2:2a:67:fc:27:fc:39:7c:3d:38:b7:74:ac:f3:da:2e: 2f:67:f2:41:76:64:a4:0f:64:af:b1:25:8d:cc:71:d8: 51:74:ca:9a:84:03:fe:ff:91:7c:6a:8c:42:fc:03:17: 08:99:bd:19:af:2d:ec:04:28:42:3d:6d:7c:7f:fd:22: 2d:2f:11:55:7d:f9:68:6f:4b:48:88:47:ba:32:6d:55: 0d:c5:45:20:5c:20:a6:be:79:57:15:63:d1:51:99:40: 8e:95:4b:56:f8:1c:e9:ba:bd:85:2f:55:92:48:cb:32: a0:37:b3:31:55:68:80:78:86:a4:22:a6:5e:15:8b:0f: 20:68:7f:56:83:5d:33:75:6f:ca:40:64:2f:a7:96:db: 59:70:f8:e1:62:15:5b:ab:db:96:1f:8e:a7:5f:35:94: be:aa:32:fa:2c:fc:2e:3f:c2:d5:34:c6:d3:ec:65:20: a3:48:d7:71:9a:93:91:48:b1:f1:ed:06:bf:f3:54:d3: a2:c5:dc:e3:37:71:ec:d8:fd:70:44:71:52:c7:1f:a5: c8:6e:25:e9:eb:68:7b:ab:c3:8b:73:cb:9a:df:90:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:4c:8c:b1:c4:13:20:e8:a2:26:5d:1d:35:23:aa:0b: 30:d0:da:7c:75:a5:ac:11:77:db:91:25:d1:6d:50:94: d9:ed:1d:a3:5f:74:7c:75:61:1c:ef:af:d8:96:03:d5: 91:07:e7:db:2b:b3:57:b3:7b:49:b7:c1:2c:39:b2:f5: b1:0b:46:77:70:3e:1b:e9:03:9a:ec:92:ab:af:7b:15: 63:7f:a9:cb:b6:5c:42:bf:a4:dc:be:f4:35:99:7f:a3: 9a:c2:85:59:eb:4b:f0:67:ae:21:30:0f:3b:0b:bc:52: 5c:0e:fd:ab:f4:77:db:0d:1c:4e:17:00:5d:6c:16:43: 60:26:ad:53:4d:97:67:04:30:09:86:2a:c7:b9:79:1e: fa:76:4f:7a:4f:c7:51:e6:46:b2:0a:6f:16:e3:84:f7: 61:e0:9c:61:c3:49:60:33:af:bf:38:73:c1:b1:42:a1: 2f:ed:53:57:ea:08:78:14:26:8c:f8:5d:35:5b:46:ff: 95:8c:c5:b9:9e:76:eb:b4:fa:ba:87:c9:a7:6e:24:37: 1d:df:3a:b8:26:98:e1:ae:ee:05:f5:67:fb:36:b8:e0: a4:c3:92:c8:a1:60:b1:83:a0:f3:66:7e:51:0a:7d:d2: 56:73:e9:b2:61:d5:ee:0a:ed:df:e1:54:5d:e6:dd:16 Fingerprint (SHA-256): 95:3B:52:70:1C:D6:50:01:69:05:7F:7C:9D:D9:88:2B:71:9E:D4:78:2B:F7:46:C6:09:27:4F:A7:9D:35:E8:72 Fingerprint (SHA1): 70:0E:56:10:C2:40:1C:37:0A:62:48:32:30:4C:DD:B7:02:F7:3A:1A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13813: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092662 (0x6715cf6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 14:31:12 2016 Not After : Fri Jan 08 14:31:12 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:03:9e:f6:67:dd:fe:00:cc:be:2b:db:79:3d:19:a7: 57:c7:ef:66:d5:60:fd:09:d7:9d:db:75:50:b9:60:38: a7:14:c1:e3:2a:eb:f8:ed:06:31:f1:96:18:aa:d0:d2: 66:a0:39:2a:b0:f2:b7:e5:bf:b7:32:b9:7e:99:c7:81: 5e:a2:3c:fe:30:09:47:5c:4e:2e:20:91:1f:fc:5d:31: e3:69:66:8f:13:fb:c7:41:1c:69:5f:01:32:00:8f:db: 1f:29:b7:a9:a0:8c:92:fc:be:c7:1e:17:72:29:6e:f2: 35:4d:16:39:27:b6:bb:46:20:96:46:72:91:d6:fe:10: 49:7f:2c:b3:2d:c4:9d:1f:8d:01:8b:02:d1:20:38:bf: 06:91:11:25:c2:85:d2:d2:ed:26:fb:93:69:25:87:5d: 58:b4:6e:56:d3:94:fa:e0:83:11:c9:60:a0:07:ea:d2: ac:f9:74:80:80:9f:59:30:d4:bd:f5:05:f2:c9:16:f2: 74:9e:df:d6:12:44:5f:c4:fa:a3:ba:90:2d:19:fd:62: d6:8b:4e:66:1d:75:ed:59:a9:7d:cb:e6:34:df:8c:54: 6d:49:cb:cc:4f:d5:fc:d0:ea:50:72:f2:b8:ed:b3:52: 1d:36:7c:04:3e:2c:02:90:59:36:d1:c4:43:bf:67:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:5a:38:45:00:a5:d3:c4:ca:66:e2:0b:ba:d4:1d:46: 81:62:08:13:e3:37:4c:c4:e6:f1:5f:15:ad:10:26:ed: 70:a2:34:9f:6c:00:3d:e5:f1:71:8c:67:64:de:63:0d: b1:8d:bc:40:56:7d:93:65:2f:a4:33:54:7a:e4:9d:ef: dd:63:2e:b4:99:fb:e1:df:05:b3:68:6c:6d:25:ff:c9: c2:32:d8:d4:1b:2e:08:d8:82:a4:b1:5e:c5:bb:e2:59: 97:6f:85:15:05:76:06:87:c5:c8:38:ca:a6:d1:12:f7: 65:da:89:db:78:39:e0:eb:ed:55:e3:be:ac:d1:c2:6c: 25:34:ac:c7:78:6c:ec:35:80:35:e0:c8:f9:59:a1:2c: 66:76:3b:8e:de:a0:1c:3e:4f:35:88:76:20:f0:ba:59: be:66:6f:c9:9a:a9:2d:a7:57:da:fe:b2:cc:1c:12:36: 3d:5d:61:49:81:10:c5:6f:d9:75:99:79:eb:ad:6d:d1: a7:2b:64:32:b4:38:39:73:29:0f:de:ee:48:91:7c:75: 29:fd:6d:e8:c0:94:a1:2a:15:7b:bc:8b:c1:38:16:8b: 34:c8:f8:7d:63:48:99:16:6a:b9:73:67:e7:42:d4:92: f2:1f:4d:22:2d:41:b2:45:4e:f6:48:8f:64:0a:2f:b5 Fingerprint (SHA-256): 52:12:F9:95:32:11:92:23:82:BF:22:7D:4C:D9:A9:BC:57:4C:8B:20:56:09:74:9D:45:7D:9C:1D:A7:A2:BA:3A Fingerprint (SHA1): DF:AE:90:00:92:7E:B1:96:E2:0B:4E:4D:5D:9C:C6:0D:66:34:86:59 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13814: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #13815: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #13816: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #13817: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #13818: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #13819: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092662 (0x6715cf6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 14:31:12 2016 Not After : Fri Jan 08 14:31:12 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:03:9e:f6:67:dd:fe:00:cc:be:2b:db:79:3d:19:a7: 57:c7:ef:66:d5:60:fd:09:d7:9d:db:75:50:b9:60:38: a7:14:c1:e3:2a:eb:f8:ed:06:31:f1:96:18:aa:d0:d2: 66:a0:39:2a:b0:f2:b7:e5:bf:b7:32:b9:7e:99:c7:81: 5e:a2:3c:fe:30:09:47:5c:4e:2e:20:91:1f:fc:5d:31: e3:69:66:8f:13:fb:c7:41:1c:69:5f:01:32:00:8f:db: 1f:29:b7:a9:a0:8c:92:fc:be:c7:1e:17:72:29:6e:f2: 35:4d:16:39:27:b6:bb:46:20:96:46:72:91:d6:fe:10: 49:7f:2c:b3:2d:c4:9d:1f:8d:01:8b:02:d1:20:38:bf: 06:91:11:25:c2:85:d2:d2:ed:26:fb:93:69:25:87:5d: 58:b4:6e:56:d3:94:fa:e0:83:11:c9:60:a0:07:ea:d2: ac:f9:74:80:80:9f:59:30:d4:bd:f5:05:f2:c9:16:f2: 74:9e:df:d6:12:44:5f:c4:fa:a3:ba:90:2d:19:fd:62: d6:8b:4e:66:1d:75:ed:59:a9:7d:cb:e6:34:df:8c:54: 6d:49:cb:cc:4f:d5:fc:d0:ea:50:72:f2:b8:ed:b3:52: 1d:36:7c:04:3e:2c:02:90:59:36:d1:c4:43:bf:67:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:5a:38:45:00:a5:d3:c4:ca:66:e2:0b:ba:d4:1d:46: 81:62:08:13:e3:37:4c:c4:e6:f1:5f:15:ad:10:26:ed: 70:a2:34:9f:6c:00:3d:e5:f1:71:8c:67:64:de:63:0d: b1:8d:bc:40:56:7d:93:65:2f:a4:33:54:7a:e4:9d:ef: dd:63:2e:b4:99:fb:e1:df:05:b3:68:6c:6d:25:ff:c9: c2:32:d8:d4:1b:2e:08:d8:82:a4:b1:5e:c5:bb:e2:59: 97:6f:85:15:05:76:06:87:c5:c8:38:ca:a6:d1:12:f7: 65:da:89:db:78:39:e0:eb:ed:55:e3:be:ac:d1:c2:6c: 25:34:ac:c7:78:6c:ec:35:80:35:e0:c8:f9:59:a1:2c: 66:76:3b:8e:de:a0:1c:3e:4f:35:88:76:20:f0:ba:59: be:66:6f:c9:9a:a9:2d:a7:57:da:fe:b2:cc:1c:12:36: 3d:5d:61:49:81:10:c5:6f:d9:75:99:79:eb:ad:6d:d1: a7:2b:64:32:b4:38:39:73:29:0f:de:ee:48:91:7c:75: 29:fd:6d:e8:c0:94:a1:2a:15:7b:bc:8b:c1:38:16:8b: 34:c8:f8:7d:63:48:99:16:6a:b9:73:67:e7:42:d4:92: f2:1f:4d:22:2d:41:b2:45:4e:f6:48:8f:64:0a:2f:b5 Fingerprint (SHA-256): 52:12:F9:95:32:11:92:23:82:BF:22:7D:4C:D9:A9:BC:57:4C:8B:20:56:09:74:9D:45:7D:9C:1D:A7:A2:BA:3A Fingerprint (SHA1): DF:AE:90:00:92:7E:B1:96:E2:0B:4E:4D:5D:9C:C6:0D:66:34:86:59 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13820: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092662 (0x6715cf6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 14:31:12 2016 Not After : Fri Jan 08 14:31:12 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:03:9e:f6:67:dd:fe:00:cc:be:2b:db:79:3d:19:a7: 57:c7:ef:66:d5:60:fd:09:d7:9d:db:75:50:b9:60:38: a7:14:c1:e3:2a:eb:f8:ed:06:31:f1:96:18:aa:d0:d2: 66:a0:39:2a:b0:f2:b7:e5:bf:b7:32:b9:7e:99:c7:81: 5e:a2:3c:fe:30:09:47:5c:4e:2e:20:91:1f:fc:5d:31: e3:69:66:8f:13:fb:c7:41:1c:69:5f:01:32:00:8f:db: 1f:29:b7:a9:a0:8c:92:fc:be:c7:1e:17:72:29:6e:f2: 35:4d:16:39:27:b6:bb:46:20:96:46:72:91:d6:fe:10: 49:7f:2c:b3:2d:c4:9d:1f:8d:01:8b:02:d1:20:38:bf: 06:91:11:25:c2:85:d2:d2:ed:26:fb:93:69:25:87:5d: 58:b4:6e:56:d3:94:fa:e0:83:11:c9:60:a0:07:ea:d2: ac:f9:74:80:80:9f:59:30:d4:bd:f5:05:f2:c9:16:f2: 74:9e:df:d6:12:44:5f:c4:fa:a3:ba:90:2d:19:fd:62: d6:8b:4e:66:1d:75:ed:59:a9:7d:cb:e6:34:df:8c:54: 6d:49:cb:cc:4f:d5:fc:d0:ea:50:72:f2:b8:ed:b3:52: 1d:36:7c:04:3e:2c:02:90:59:36:d1:c4:43:bf:67:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:5a:38:45:00:a5:d3:c4:ca:66:e2:0b:ba:d4:1d:46: 81:62:08:13:e3:37:4c:c4:e6:f1:5f:15:ad:10:26:ed: 70:a2:34:9f:6c:00:3d:e5:f1:71:8c:67:64:de:63:0d: b1:8d:bc:40:56:7d:93:65:2f:a4:33:54:7a:e4:9d:ef: dd:63:2e:b4:99:fb:e1:df:05:b3:68:6c:6d:25:ff:c9: c2:32:d8:d4:1b:2e:08:d8:82:a4:b1:5e:c5:bb:e2:59: 97:6f:85:15:05:76:06:87:c5:c8:38:ca:a6:d1:12:f7: 65:da:89:db:78:39:e0:eb:ed:55:e3:be:ac:d1:c2:6c: 25:34:ac:c7:78:6c:ec:35:80:35:e0:c8:f9:59:a1:2c: 66:76:3b:8e:de:a0:1c:3e:4f:35:88:76:20:f0:ba:59: be:66:6f:c9:9a:a9:2d:a7:57:da:fe:b2:cc:1c:12:36: 3d:5d:61:49:81:10:c5:6f:d9:75:99:79:eb:ad:6d:d1: a7:2b:64:32:b4:38:39:73:29:0f:de:ee:48:91:7c:75: 29:fd:6d:e8:c0:94:a1:2a:15:7b:bc:8b:c1:38:16:8b: 34:c8:f8:7d:63:48:99:16:6a:b9:73:67:e7:42:d4:92: f2:1f:4d:22:2d:41:b2:45:4e:f6:48:8f:64:0a:2f:b5 Fingerprint (SHA-256): 52:12:F9:95:32:11:92:23:82:BF:22:7D:4C:D9:A9:BC:57:4C:8B:20:56:09:74:9D:45:7D:9C:1D:A7:A2:BA:3A Fingerprint (SHA1): DF:AE:90:00:92:7E:B1:96:E2:0B:4E:4D:5D:9C:C6:0D:66:34:86:59 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13821: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #13822: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #13823: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #13824: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #13825: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #13826: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092661 (0x6715cf5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 14:31:03 2016 Not After : Fri Jan 08 14:31:03 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:2d:17:e8:67:76:86:c4:ce:e8:40:81:6d:a3:08:33: 78:92:30:40:c5:5c:f2:c7:65:4a:dd:b2:af:fb:87:72: f2:2a:67:fc:27:fc:39:7c:3d:38:b7:74:ac:f3:da:2e: 2f:67:f2:41:76:64:a4:0f:64:af:b1:25:8d:cc:71:d8: 51:74:ca:9a:84:03:fe:ff:91:7c:6a:8c:42:fc:03:17: 08:99:bd:19:af:2d:ec:04:28:42:3d:6d:7c:7f:fd:22: 2d:2f:11:55:7d:f9:68:6f:4b:48:88:47:ba:32:6d:55: 0d:c5:45:20:5c:20:a6:be:79:57:15:63:d1:51:99:40: 8e:95:4b:56:f8:1c:e9:ba:bd:85:2f:55:92:48:cb:32: a0:37:b3:31:55:68:80:78:86:a4:22:a6:5e:15:8b:0f: 20:68:7f:56:83:5d:33:75:6f:ca:40:64:2f:a7:96:db: 59:70:f8:e1:62:15:5b:ab:db:96:1f:8e:a7:5f:35:94: be:aa:32:fa:2c:fc:2e:3f:c2:d5:34:c6:d3:ec:65:20: a3:48:d7:71:9a:93:91:48:b1:f1:ed:06:bf:f3:54:d3: a2:c5:dc:e3:37:71:ec:d8:fd:70:44:71:52:c7:1f:a5: c8:6e:25:e9:eb:68:7b:ab:c3:8b:73:cb:9a:df:90:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:4c:8c:b1:c4:13:20:e8:a2:26:5d:1d:35:23:aa:0b: 30:d0:da:7c:75:a5:ac:11:77:db:91:25:d1:6d:50:94: d9:ed:1d:a3:5f:74:7c:75:61:1c:ef:af:d8:96:03:d5: 91:07:e7:db:2b:b3:57:b3:7b:49:b7:c1:2c:39:b2:f5: b1:0b:46:77:70:3e:1b:e9:03:9a:ec:92:ab:af:7b:15: 63:7f:a9:cb:b6:5c:42:bf:a4:dc:be:f4:35:99:7f:a3: 9a:c2:85:59:eb:4b:f0:67:ae:21:30:0f:3b:0b:bc:52: 5c:0e:fd:ab:f4:77:db:0d:1c:4e:17:00:5d:6c:16:43: 60:26:ad:53:4d:97:67:04:30:09:86:2a:c7:b9:79:1e: fa:76:4f:7a:4f:c7:51:e6:46:b2:0a:6f:16:e3:84:f7: 61:e0:9c:61:c3:49:60:33:af:bf:38:73:c1:b1:42:a1: 2f:ed:53:57:ea:08:78:14:26:8c:f8:5d:35:5b:46:ff: 95:8c:c5:b9:9e:76:eb:b4:fa:ba:87:c9:a7:6e:24:37: 1d:df:3a:b8:26:98:e1:ae:ee:05:f5:67:fb:36:b8:e0: a4:c3:92:c8:a1:60:b1:83:a0:f3:66:7e:51:0a:7d:d2: 56:73:e9:b2:61:d5:ee:0a:ed:df:e1:54:5d:e6:dd:16 Fingerprint (SHA-256): 95:3B:52:70:1C:D6:50:01:69:05:7F:7C:9D:D9:88:2B:71:9E:D4:78:2B:F7:46:C6:09:27:4F:A7:9D:35:E8:72 Fingerprint (SHA1): 70:0E:56:10:C2:40:1C:37:0A:62:48:32:30:4C:DD:B7:02:F7:3A:1A Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13827: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092661 (0x6715cf5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 14:31:03 2016 Not After : Fri Jan 08 14:31:03 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:2d:17:e8:67:76:86:c4:ce:e8:40:81:6d:a3:08:33: 78:92:30:40:c5:5c:f2:c7:65:4a:dd:b2:af:fb:87:72: f2:2a:67:fc:27:fc:39:7c:3d:38:b7:74:ac:f3:da:2e: 2f:67:f2:41:76:64:a4:0f:64:af:b1:25:8d:cc:71:d8: 51:74:ca:9a:84:03:fe:ff:91:7c:6a:8c:42:fc:03:17: 08:99:bd:19:af:2d:ec:04:28:42:3d:6d:7c:7f:fd:22: 2d:2f:11:55:7d:f9:68:6f:4b:48:88:47:ba:32:6d:55: 0d:c5:45:20:5c:20:a6:be:79:57:15:63:d1:51:99:40: 8e:95:4b:56:f8:1c:e9:ba:bd:85:2f:55:92:48:cb:32: a0:37:b3:31:55:68:80:78:86:a4:22:a6:5e:15:8b:0f: 20:68:7f:56:83:5d:33:75:6f:ca:40:64:2f:a7:96:db: 59:70:f8:e1:62:15:5b:ab:db:96:1f:8e:a7:5f:35:94: be:aa:32:fa:2c:fc:2e:3f:c2:d5:34:c6:d3:ec:65:20: a3:48:d7:71:9a:93:91:48:b1:f1:ed:06:bf:f3:54:d3: a2:c5:dc:e3:37:71:ec:d8:fd:70:44:71:52:c7:1f:a5: c8:6e:25:e9:eb:68:7b:ab:c3:8b:73:cb:9a:df:90:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:4c:8c:b1:c4:13:20:e8:a2:26:5d:1d:35:23:aa:0b: 30:d0:da:7c:75:a5:ac:11:77:db:91:25:d1:6d:50:94: d9:ed:1d:a3:5f:74:7c:75:61:1c:ef:af:d8:96:03:d5: 91:07:e7:db:2b:b3:57:b3:7b:49:b7:c1:2c:39:b2:f5: b1:0b:46:77:70:3e:1b:e9:03:9a:ec:92:ab:af:7b:15: 63:7f:a9:cb:b6:5c:42:bf:a4:dc:be:f4:35:99:7f:a3: 9a:c2:85:59:eb:4b:f0:67:ae:21:30:0f:3b:0b:bc:52: 5c:0e:fd:ab:f4:77:db:0d:1c:4e:17:00:5d:6c:16:43: 60:26:ad:53:4d:97:67:04:30:09:86:2a:c7:b9:79:1e: fa:76:4f:7a:4f:c7:51:e6:46:b2:0a:6f:16:e3:84:f7: 61:e0:9c:61:c3:49:60:33:af:bf:38:73:c1:b1:42:a1: 2f:ed:53:57:ea:08:78:14:26:8c:f8:5d:35:5b:46:ff: 95:8c:c5:b9:9e:76:eb:b4:fa:ba:87:c9:a7:6e:24:37: 1d:df:3a:b8:26:98:e1:ae:ee:05:f5:67:fb:36:b8:e0: a4:c3:92:c8:a1:60:b1:83:a0:f3:66:7e:51:0a:7d:d2: 56:73:e9:b2:61:d5:ee:0a:ed:df:e1:54:5d:e6:dd:16 Fingerprint (SHA-256): 95:3B:52:70:1C:D6:50:01:69:05:7F:7C:9D:D9:88:2B:71:9E:D4:78:2B:F7:46:C6:09:27:4F:A7:9D:35:E8:72 Fingerprint (SHA1): 70:0E:56:10:C2:40:1C:37:0A:62:48:32:30:4C:DD:B7:02:F7:3A:1A Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13828: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #13829: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092666 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13830: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #13831: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #13832: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092667 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13833: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #13834: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #13835: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092668 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13836: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #13837: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #13838: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092669 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13839: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #13840: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #13841: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092670 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13842: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #13843: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #13844: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092671 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13845: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #13846: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #13847: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092672 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13848: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #13849: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #13850: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092673 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13851: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #13852: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #13853: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092674 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13854: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #13855: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #13856: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13857: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 108092675 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13858: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13859: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 108092676 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13860: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13861: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 108092677 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13862: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13863: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #13864: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #13865: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13866: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 108092678 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13867: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13868: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 108092679 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13869: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13870: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 108092680 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13871: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13872: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #13873: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #13874: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13875: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 108092681 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13876: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13877: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 108092682 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13878: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13879: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 108092683 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13880: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13881: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #13882: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #13883: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13884: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 108092684 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13885: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13886: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 108092685 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13887: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13888: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 108092686 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13889: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13890: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #13891: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13892: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13893: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 108092687 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13894: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13895: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #13896: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13897: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108092688 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13898: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13899: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092666 (0x6715cfa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Jan 08 14:32:09 2016 Not After : Fri Jan 08 14:32:09 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:18:5f:7a:f6:9c:dc:87:3d:e5:e3:2c:fd:05:74:19: 52:21:f5:cf:fb:c7:cc:80:c9:cc:14:9f:b0:c1:1c:11: 3a:d6:29:8c:9f:95:fb:19:92:60:d4:9d:0d:de:ab:bd: e4:6c:10:8c:1c:b3:da:75:02:5e:0c:60:78:75:72:69: 51:3e:1a:dd:25:8c:9d:ee:6e:55:b3:96:e5:51:0c:00: bf:8c:ba:e5:cc:79:54:a5:65:a7:2d:aa:f0:4e:8a:e5: ee:ab:6f:25:30:a6:c1:de:9a:23:64:73:27:fe:f6:a3: fc:7c:b1:07:da:2a:7a:88:78:3d:06:92:30:f7:c2:af: 3b:dc:dd:a1:21:2d:f6:ab:98:c7:ed:ae:66:8e:fa:ee: a2:af:25:ee:4a:77:4d:ee:67:74:73:76:7b:bb:3a:ef: c7:7b:e9:29:da:f3:23:3f:1c:6d:8c:c6:2b:87:68:9c: 35:85:e8:95:99:3f:e7:b6:ae:ea:2c:49:fc:05:37:55: 94:97:6c:b7:e3:ca:a4:4f:9c:a2:55:f9:57:4c:cc:5d: 0a:13:86:45:fc:e6:b8:b6:17:55:c8:25:56:14:e2:9d: 99:81:32:7c:3d:86:78:2e:61:27:91:38:c5:8f:60:ae: 37:f2:7b:21:ee:48:7e:cb:14:55:85:58:c9:f6:4e:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:46:28:c4:32:4b:ac:4e:ad:bf:b6:07:5f:df:8a:52: e3:6a:d3:c4:f1:62:bf:ab:b3:01:10:fb:05:f0:c4:36: ca:8b:a9:bd:9a:c3:a1:1f:29:de:30:a8:f3:45:a1:11: fe:3c:89:29:d8:dc:9c:e7:73:6e:b0:2c:5b:a6:83:67: 60:9c:d8:3a:34:96:5f:9e:64:65:7b:60:e3:ec:ba:4f: d2:c2:97:bb:78:cb:25:46:21:19:8d:81:fc:c8:40:70: 32:6f:19:59:b8:e3:58:81:1b:1b:46:8d:f1:be:b7:13: 7e:a4:52:aa:4e:5e:07:18:f9:a8:4b:84:f9:19:9b:d9: 4a:0d:1f:1b:1a:24:d4:cc:78:68:3e:67:78:ad:88:e0: 02:37:f0:17:1c:e6:22:ac:e4:54:c0:9b:b8:b8:75:19: 72:a9:ae:ba:cd:89:20:fc:d8:f6:2b:1b:29:43:65:64: 19:8e:c0:d0:6c:92:17:fe:bb:13:c0:86:7b:59:4d:47: 80:bd:ff:78:b3:bf:8d:c4:49:0d:c1:d9:c1:12:4f:05: 82:40:19:b9:82:68:95:b3:43:88:03:10:5d:fe:49:7c: 4f:e9:93:75:84:44:18:47:7f:13:3d:ad:70:4d:45:e7: d1:78:10:6f:b0:5a:69:93:93:c8:cf:49:1b:7f:c0:e0 Fingerprint (SHA-256): 84:4F:62:64:7F:33:8B:CB:E9:37:2E:B2:0D:2C:9A:AC:68:2F:D4:15:11:EE:E8:61:2D:13:1A:FE:0E:6E:86:C2 Fingerprint (SHA1): 16:3E:8C:9A:6E:72:2A:82:72:DF:AF:02:4D:4F:42:B7:2B:23:A4:B3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #13900: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092667 (0x6715cfb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Jan 08 14:32:31 2016 Not After : Fri Jan 08 14:32:31 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:4b:0b:21:a6:40:19:1d:17:55:ff:e1:be:e8:8b:84: a3:27:e3:c8:9c:0f:43:eb:3a:10:10:47:7f:36:21:32: 5a:b5:9a:10:20:27:ea:7c:ee:16:de:84:b2:1f:44:93: 78:85:1e:12:39:37:d3:ed:be:68:4e:11:17:b0:01:ec: 9c:a1:96:39:2c:6e:3c:d1:0b:e9:55:c9:42:0b:31:e7: 44:06:e0:ce:3a:0e:07:f1:c8:f7:97:6b:db:d2:eb:13: 46:60:b4:d3:47:0e:f2:bf:71:76:67:ce:ce:d6:a1:ff: 1c:39:3a:19:56:70:16:57:6c:cb:ad:be:a3:eb:a9:fd: 7d:71:19:99:48:8a:f4:2a:1b:f1:f9:8a:80:e2:3a:44: 32:5a:b1:f8:88:8b:9b:47:d5:98:c1:96:5e:b8:99:3e: 1d:46:5f:0c:30:f7:34:4e:a5:64:64:04:64:a8:94:ae: a5:e2:5c:c4:95:a9:d9:33:a8:19:64:9e:6f:ef:ab:9b: b0:4a:d2:85:4b:5f:be:67:a7:75:d9:8e:1c:cd:f6:0d: 3b:b9:a8:49:24:41:1d:74:e0:79:cc:5b:1d:00:52:5d: c8:61:c4:48:5c:ad:f7:91:49:1e:87:20:8f:a2:70:cf: 99:75:88:53:09:49:b7:d6:bf:a6:4d:9a:17:90:2e:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:01:81:ee:98:0f:32:a3:cb:a1:c1:7c:13:08:6c:2e: 2b:9a:52:b1:35:f9:1b:b1:d8:b3:c8:bc:f6:4c:d0:15: 8c:75:a0:a9:fa:cb:52:22:00:2c:14:c6:b0:16:c5:65: 7f:e6:67:37:06:19:5e:81:c7:0f:86:16:90:02:76:3e: 8e:1e:42:81:ba:5c:7c:ab:13:d9:6a:1f:49:3a:db:60: cd:d2:cd:e7:ec:bf:07:72:89:87:82:30:08:36:66:e2: d0:b3:43:eb:1b:72:3b:6c:5e:1a:bc:23:96:e3:6e:d2: c7:51:0e:73:db:98:ff:f5:ed:32:82:07:05:e7:38:ce: 31:4d:67:c9:d9:05:d0:6f:04:38:2c:d9:70:a7:0e:a3: 47:41:bc:0b:da:c1:bb:46:8f:7d:f6:0b:40:90:cc:4e: 05:24:fe:ca:c5:5a:13:0b:96:5f:67:42:fa:e0:31:97: c0:a8:2a:4d:9b:02:8a:28:d1:f3:ba:55:b5:9a:d1:57: 0c:b2:63:cd:de:44:6d:2e:f5:76:6c:62:91:ac:fe:11: 23:e6:3e:b0:8e:20:67:a4:ec:59:e9:5a:ee:b1:d9:06: 2f:d8:6d:f8:fd:04:1a:01:80:9b:38:6d:b7:b9:35:22: 37:75:df:07:6d:1d:f0:e8:71:fa:7c:d5:5b:5a:53:af Fingerprint (SHA-256): 19:EC:2B:27:DE:A6:66:F4:3A:86:F2:52:B9:FB:90:67:D7:E3:FB:75:8A:5D:32:95:05:1C:1A:52:3B:E5:01:1F Fingerprint (SHA1): 24:9E:7E:D0:4A:E8:38:E7:AC:73:C8:F3:CD:4E:18:B1:35:26:20:B8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #13901: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092668 (0x6715cfc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Jan 08 14:32:42 2016 Not After : Fri Jan 08 14:32:42 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:cb:8c:b4:c4:15:89:ea:86:c7:6e:a2:ec:47:24:e4: e5:19:c9:0e:ec:6b:e7:c1:28:f9:a8:74:6b:5c:ba:e4: 0c:49:c8:d6:42:f8:3b:2d:97:73:f5:82:e6:f9:00:a0: fa:7a:fd:f2:10:6e:d1:f7:6b:4e:d0:5d:13:e2:b6:d0: 85:d9:79:8f:61:90:0f:5c:57:05:8f:35:af:a3:59:20: 71:18:bd:b2:13:1c:12:1b:d9:26:39:da:c2:89:0c:7e: 0a:f2:55:3d:70:1e:70:ff:60:83:72:1e:2d:a5:ea:0d: cb:cf:41:b5:2b:cf:47:72:e3:1c:15:f1:92:85:f1:90: 03:7f:04:db:99:8d:6d:02:ee:0e:a7:b2:34:b0:f5:1e: 24:b1:25:85:b0:63:b3:cb:8d:6e:4b:88:70:ce:6f:5e: bd:81:a3:a0:91:16:22:28:4c:0e:38:a4:2a:ef:97:98: 42:f8:4c:26:ea:7b:8c:cd:f1:01:9f:f8:66:8c:17:f6: e6:dd:e9:78:4b:e3:33:39:95:16:a8:3d:4d:6f:8e:b4: 0d:6e:57:0a:f0:9b:1f:d7:38:ca:2d:50:1a:2d:1d:07: b0:c7:bf:5a:53:22:b8:c7:f6:5e:75:8e:35:d7:6a:ad: 0f:0e:4e:7b:11:59:61:7b:75:09:d0:be:af:61:a0:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:4c:37:16:eb:2a:37:b0:ab:1d:9f:08:de:ff:46:4d: 2b:4d:7d:b9:29:51:27:f8:19:2e:80:ab:81:00:20:93: bb:9d:42:f3:c3:d5:6a:59:98:a8:0a:81:1e:4d:2b:69: 95:2b:bd:31:2e:ca:99:a3:55:0c:c1:37:78:8f:60:2f: 75:da:6d:d3:e6:af:63:d5:42:a7:e0:46:50:46:00:94: a3:33:c1:17:7d:77:62:81:e9:2b:ce:e6:85:03:4a:4d: 3d:c4:a6:37:ba:51:66:e5:bc:36:76:66:86:ce:34:a3: b7:77:c8:71:fa:1c:12:99:b2:7a:95:65:07:92:76:dd: 02:4f:4e:57:53:78:eb:85:e1:aa:e8:2f:ea:f2:79:a9: dd:db:b3:34:37:16:56:9a:57:34:47:df:03:c1:96:67: 60:fb:5b:cc:44:39:1e:51:2f:63:8a:3c:d0:9d:d0:46: a3:5a:3c:a3:61:af:1d:e1:53:25:bc:f1:28:c6:c7:57: f5:12:1d:91:b8:81:54:52:fd:43:d3:a3:fc:ee:df:f3: e3:91:85:bb:c7:a3:af:c7:fe:cc:5b:41:a1:42:c8:07: 43:67:92:04:d8:7d:38:39:76:8d:34:36:77:09:b7:bd: 0a:64:ec:1b:90:38:64:b8:90:f8:af:9a:1d:3c:b8:9c Fingerprint (SHA-256): 4A:23:66:45:7D:9C:F0:ED:8A:58:F8:A4:E2:BA:87:FB:E0:90:51:57:A4:4C:C4:44:FB:22:77:AD:2C:CF:F9:D3 Fingerprint (SHA1): E1:CB:4F:B2:F0:6A:BF:5A:32:C7:73:5F:F4:A9:B3:D7:AA:27:2A:AB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #13902: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092669 (0x6715cfd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Jan 08 14:32:56 2016 Not After : Fri Jan 08 14:32:56 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:60:3a:30:70:47:dd:a6:df:0c:c3:e6:06:85:04:6c: eb:fa:e4:e6:e7:9f:8f:fb:37:b5:1e:d5:4b:cf:91:88: 72:7a:ff:fa:3f:76:4e:4b:76:08:ad:5a:2d:4d:dd:a1: 2b:a2:e8:51:c6:4a:c6:5b:27:1f:80:ca:62:eb:4f:1f: 12:62:be:54:55:b4:01:98:fe:6f:e1:8b:45:8a:cc:c0: 9b:c3:62:d2:51:2f:46:f8:ff:05:92:ae:96:85:a9:4d: 52:fd:6a:42:e4:ed:c1:9a:26:a8:43:47:77:b5:d1:a6: d6:5f:50:60:8e:e2:0e:f5:dc:2a:71:92:1d:1a:27:68: 8c:a5:d5:15:e8:25:39:3e:96:2b:e0:46:75:dd:80:5b: 9d:ed:7e:b1:22:cb:44:9b:e1:2d:5d:9a:9b:52:0d:f6: c4:cc:dd:87:34:dc:23:2e:05:a2:94:3d:6e:75:48:83: d6:4f:c6:7e:dc:1c:55:0c:ff:a0:8c:c0:47:8e:fa:63: a9:26:ac:86:87:32:e9:f0:9f:c6:a0:f8:f4:b1:13:0f: 1c:02:d9:dd:a4:73:cb:50:b6:f3:99:fa:46:54:cf:e4: 78:e0:9c:ee:b0:8e:34:af:2b:0e:4b:8f:07:4e:5e:4b: 65:3b:7e:6a:b9:18:b6:e2:3b:d7:d0:66:77:03:cb:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:2a:04:db:fe:ec:54:1f:a9:ff:98:e8:8b:1c:09:40: 75:9d:d3:1b:d6:c3:42:54:7f:f9:a3:8b:5d:18:10:1f: d7:17:17:fc:cf:19:cf:e0:3b:5a:54:13:2c:65:7a:23: 63:01:e0:d7:6f:db:37:dc:0a:7d:35:e6:34:4f:09:ec: 6f:a2:92:47:8f:61:25:25:f8:2c:7b:e1:1d:45:36:7c: 73:48:81:7a:ac:2f:4b:f6:93:e8:82:03:cd:d1:04:7c: 07:64:89:50:ac:85:30:e7:c5:5a:65:2f:07:c5:ba:e7: 5b:85:73:ce:b4:e1:18:06:28:4e:12:13:1c:7f:1b:54: 65:78:7e:8c:2c:16:77:25:89:88:cf:b5:7e:84:e5:f7: 9e:9d:b1:40:3c:09:8e:dd:f1:ae:c1:09:c8:d8:01:91: b7:0c:b2:30:37:40:86:64:16:db:26:87:04:36:79:72: 76:ff:3f:ee:12:9e:e7:54:7a:13:79:42:a7:2f:9e:e2: 32:5b:38:57:42:a5:3f:49:ef:6e:2f:dd:07:bd:4d:88: bf:8b:74:f2:d9:22:94:e9:f1:65:4b:af:7e:21:77:bf: 01:c7:aa:f9:f8:f6:81:8c:74:f7:8f:2f:40:9f:92:64: 99:42:6f:a3:6e:87:9d:3e:ec:c9:78:11:34:6c:af:f9 Fingerprint (SHA-256): 94:7A:1B:4B:84:4B:D9:98:59:02:D4:CB:8E:C8:DC:38:2D:93:F9:91:20:E6:08:44:21:16:26:F5:88:D9:8F:0D Fingerprint (SHA1): 7A:76:74:BB:79:84:3D:76:90:06:C2:14:FD:92:26:68:92:32:F2:F4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #13903: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092670 (0x6715cfe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Jan 08 14:33:01 2016 Not After : Fri Jan 08 14:33:01 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:4d:a4:e4:b0:f4:d3:9f:96:d3:31:00:b9:7a:0f:43: 38:ea:1b:e0:49:26:76:a2:61:c7:64:10:42:09:34:5c: e9:ab:84:7e:fe:ad:96:d8:d4:50:80:6d:fc:c7:2f:c3: 38:93:7d:d0:d3:e4:63:24:70:51:a0:8d:3c:c4:73:c9: c9:0e:6d:a5:d1:b1:f0:c8:f3:82:9b:4b:2b:aa:a3:2d: 6a:85:17:22:e5:31:52:fd:a4:42:a7:92:d8:34:db:34: 24:6c:96:40:de:86:c1:e5:f6:bf:86:3c:18:5b:d5:90: f2:23:a1:d0:d8:af:cf:8b:08:65:1f:21:d9:98:08:3a: c2:84:bc:01:99:dc:b4:db:05:ee:0e:b7:52:5d:40:69: 2b:97:28:e4:f6:1f:18:fc:5e:e1:31:53:e4:b8:3f:79: 35:23:70:30:94:9a:33:85:27:7d:4b:6b:60:77:29:54: 93:63:72:2f:bd:13:3d:97:7f:00:21:45:05:15:46:9c: 1f:71:2e:8f:15:b0:31:33:3a:f9:57:ad:04:aa:3b:74: 15:9e:97:4e:14:50:48:28:e8:5b:d3:05:26:a4:e9:1e: d6:b9:39:51:ef:7d:16:1d:f0:5b:e0:e4:b3:75:12:fa: cf:02:8d:91:d4:b5:1b:e8:99:18:0a:f5:5b:58:fa:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:77:71:60:98:06:0d:d5:4e:31:54:dc:38:18:ba:0f: 62:70:51:6b:6a:45:55:47:01:0e:7b:42:15:8d:54:b7: 68:85:d5:12:6b:a2:bd:3a:96:95:bb:ea:fd:93:81:4f: 9f:95:8d:de:40:74:da:79:63:4e:a6:54:e5:80:46:67: b7:e6:7b:65:f4:f2:3d:69:c0:60:26:53:fa:ad:e9:4d: cb:d8:c2:74:b8:af:e0:20:97:59:a3:ff:2d:00:63:6e: bc:a1:da:9e:88:6c:be:4c:be:31:b1:a1:17:d6:b6:78: 2c:1a:7f:bc:ec:ca:5d:e1:b1:8f:3f:f7:75:4a:0e:af: 47:c7:8e:c2:5e:2c:fb:47:31:e6:57:3f:9c:d7:3e:b5: b1:1a:5f:b4:0f:e9:41:61:1d:96:f3:71:15:10:05:92: c9:a0:99:f4:30:73:0f:3d:e0:5d:c4:89:d1:cf:6a:e5: 6c:60:1d:e3:74:67:d4:fa:55:1b:f4:21:48:02:da:8c: 1b:d3:f3:58:ac:08:c1:4d:eb:b7:82:63:3e:a8:d6:96: c6:9d:61:c2:80:ba:20:9b:ef:23:a4:83:fd:af:a4:72: ab:b5:d1:66:f1:a6:ee:44:9c:82:62:c0:67:50:cb:f5: 9f:d2:cb:70:71:f0:72:f6:58:f0:d6:8d:b3:81:c9:a6 Fingerprint (SHA-256): E3:B0:3C:DF:03:50:8A:73:A7:43:C1:09:CE:3C:1C:8F:37:6E:34:3E:75:1A:8E:E5:3B:31:26:B6:13:F9:08:E4 Fingerprint (SHA1): FA:51:EB:ED:E8:13:B8:D6:5F:58:69:1A:49:84:77:35:8D:9E:43:C1 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #13904: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092671 (0x6715cff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Jan 08 14:33:12 2016 Not After : Fri Jan 08 14:33:12 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:54:45:45:73:90:eb:82:fe:e2:b4:19:6d:74:f6:d9: f4:d2:b7:10:cb:95:e7:98:0e:ce:a3:f1:eb:0d:b0:b2: d2:41:ee:d9:ea:f4:b4:d3:c1:b2:16:5c:c5:84:53:92: 96:3b:e0:39:0b:72:0a:33:81:40:fe:91:6f:9c:96:64: a7:6e:72:8b:60:71:ee:c1:1d:bd:ad:19:44:26:f4:99: c8:ad:9f:43:ba:94:5b:f2:6e:db:b8:2d:e6:43:1e:c3: aa:b7:8f:43:15:98:8c:57:38:90:e1:8b:0c:ab:17:d1: 25:6c:9d:51:3a:40:b2:e5:f4:36:59:76:e1:80:7b:17: 6e:cb:5d:d7:c7:7d:41:b7:7e:4c:42:f4:64:5e:4f:bb: 93:33:bd:38:88:d5:dc:17:b8:2b:70:47:05:f2:5e:fc: 85:19:b1:4e:21:80:d7:06:38:b0:4a:60:3c:24:3e:48: 12:48:e2:28:6e:ac:1b:72:cc:cc:af:14:41:e6:69:0f: b8:90:8a:91:8c:fb:a2:92:4d:8c:e9:2f:4c:02:70:fb: 47:49:3f:a9:b1:fc:21:4c:33:c3:68:de:6a:1d:ca:86: e9:d3:97:a6:27:49:61:a5:fa:dd:3d:23:c9:a1:4a:04: 9c:ed:aa:c9:91:f0:3f:f5:cf:e7:04:d5:97:a7:02:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:76:c8:61:b6:d1:eb:7c:9e:0b:fe:05:6e:b0:3d:13: f5:6c:e4:7b:62:92:8e:02:e4:0e:12:fd:4c:05:7d:f5: bf:a8:77:14:0b:16:0d:a3:34:5b:71:97:f9:e3:69:03: 27:48:43:5d:48:c7:94:52:18:93:b6:aa:ba:5f:4f:24: 6a:ae:a1:e0:ca:bd:38:93:bd:c1:91:f6:e5:99:09:fa: a1:64:e0:5f:f7:05:df:b2:e1:6f:47:d4:1a:54:e8:3e: e4:46:ea:f9:71:fc:2a:8a:44:a6:ec:36:4e:c5:11:f4: c8:f5:8c:b4:87:85:0d:75:d4:1e:b1:f5:6c:14:42:39: 98:16:86:be:8b:59:92:c1:93:4a:c6:52:c3:a4:0c:53: 06:75:14:cd:d2:15:73:90:51:3d:f3:76:51:6e:8b:47: 75:ac:3d:67:a2:28:b6:fe:b3:36:c6:ff:ed:e5:33:3a: 06:94:0b:1e:9f:06:d9:e2:40:d2:4c:01:5e:23:6d:1f: 55:01:73:9d:4c:76:da:91:a7:3d:f6:a3:ef:9e:82:ef: 73:64:ef:25:e5:e7:7e:48:53:92:c8:dd:d0:f3:39:25: ef:86:ac:01:cc:71:31:43:83:c4:b1:e4:e0:52:bd:12: 38:b2:d1:bf:fc:c8:1e:b8:19:92:df:6c:f6:03:9e:7a Fingerprint (SHA-256): A7:08:05:FD:13:DD:7A:3B:FF:A0:3C:51:07:0F:43:A8:9B:CC:39:6E:12:7C:51:46:05:E8:7B:16:46:5B:DA:3D Fingerprint (SHA1): 01:FC:BE:36:09:4F:5A:34:70:86:21:D6:93:C9:39:75:5F:5A:18:23 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #13905: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092672 (0x6715d00) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Jan 08 14:33:29 2016 Not After : Fri Jan 08 14:33:29 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:45:99:cc:e3:2d:a3:17:81:a4:f0:de:81:bb:d5:23: 64:61:50:af:bd:de:3b:82:c5:0b:c4:81:88:fd:bd:42: 91:84:c7:34:72:d4:2c:1b:b0:1d:ba:13:63:84:db:32: 51:1c:6b:c2:41:8f:e7:a6:95:09:16:5c:64:30:05:c2: 4d:40:92:92:2f:9e:2a:21:2d:5b:96:4e:ae:4b:dd:81: d4:a8:2c:8b:bc:ca:bc:b3:ea:64:09:b0:94:ae:9f:1d: d9:20:44:af:38:65:67:0e:e4:c6:6e:6b:5c:d5:14:e5: 02:b3:f5:fb:96:74:28:c2:b3:10:71:c6:9d:c6:56:56: ba:78:2e:d9:fd:5c:12:f7:34:6a:b5:5a:a9:5d:b4:da: dc:e1:41:03:a1:19:74:36:e9:88:fe:ad:da:38:21:04: bb:e4:f9:95:a5:cb:d5:27:4e:56:e2:f3:2c:51:5b:55: bc:53:3c:cb:72:e4:d9:93:2e:b0:64:5c:6e:d6:e3:ea: 81:d3:c8:fe:10:18:67:75:25:08:53:e1:dd:00:45:64: fc:f1:ff:bb:1f:39:6b:8f:ca:4e:62:5b:63:9a:29:3e: c2:83:c4:9f:d0:14:8c:24:1d:e6:c5:c6:42:c0:2a:03: 2e:7c:b7:78:e3:ed:a2:28:59:f9:19:f9:ac:a7:65:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:4c:80:b8:1a:93:1e:0c:92:01:c4:86:f3:40:22:06: 31:5a:05:08:f8:a2:3b:67:65:ec:4c:3c:66:cc:c9:e7: a6:85:43:c4:eb:c0:fa:7c:d5:9b:ce:3c:e7:4f:f6:ab: e3:68:ca:7f:80:46:cd:82:3a:37:2c:53:6a:2b:49:fb: ad:10:80:3e:8c:46:c4:30:14:18:4e:36:ab:1f:cf:8e: 97:e3:bd:60:aa:ab:65:01:e2:80:eb:4c:ba:ec:db:4b: 4f:b1:2e:92:82:23:a7:63:a4:19:7c:1a:4a:19:bc:d0: 95:4f:ee:c4:20:70:84:89:2c:e3:93:2b:9d:c7:60:c5: 11:4e:d6:6c:9e:2f:96:f7:8a:d8:ea:d3:22:bb:9d:b1: eb:17:e2:6b:82:d4:d3:9e:80:31:19:20:e5:d1:fe:4a: be:9c:d5:55:8b:ce:a3:ef:8c:8e:12:cb:ae:c3:58:a0: 8e:ac:2e:53:a2:eb:70:2b:49:fd:11:33:b7:d5:c8:3b: c0:3b:ec:53:e2:69:65:74:e6:b4:70:fc:57:7b:3b:b7: cf:69:d5:7a:01:42:7a:ea:0c:31:c3:c9:f4:48:46:bb: 9c:04:f8:31:33:5e:9d:50:ac:71:47:8a:07:e6:10:70: d1:cd:03:72:fe:aa:42:79:7f:8e:2d:91:ec:1c:1c:af Fingerprint (SHA-256): 0C:61:12:E9:A9:1B:33:4D:81:B0:9E:37:05:AA:A5:2B:2E:7C:6F:55:6D:8E:4D:67:54:A0:C6:9C:32:63:DA:48 Fingerprint (SHA1): DD:30:40:7E:56:74:8C:30:4C:4E:7A:24:C7:25:6C:36:16:4B:FF:62 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #13906: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092673 (0x6715d01) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Jan 08 14:33:43 2016 Not After : Fri Jan 08 14:33:43 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:23:11:ad:40:1d:0a:05:6a:c7:0d:4c:06:91:de:7b: f6:27:b4:9b:81:2d:66:76:a1:fa:c0:c7:a9:39:1d:eb: 19:c2:b7:00:93:ca:18:91:e3:7f:ed:6c:28:42:5a:7f: 80:30:94:9f:c7:7c:8b:2e:e0:60:13:15:d2:72:fa:a0: a1:2f:b7:23:c4:7f:49:f9:0a:cb:35:1c:c8:a0:ce:c3: 11:d2:78:56:06:59:b1:7e:69:f9:0f:04:d1:80:79:81: 3a:fa:5e:db:e3:57:f4:db:ac:7c:39:bd:64:cd:24:7d: 97:84:07:7f:f4:31:f5:fc:0a:41:0b:79:a9:da:7e:ca: e0:23:93:01:78:7c:c9:b1:6a:05:49:9d:5d:ab:15:46: 45:ee:b2:17:aa:4c:5f:81:d8:06:b8:60:77:97:25:a3: d5:4e:2c:95:0e:d5:79:3b:87:89:b6:de:e9:71:c5:76: 32:dd:f7:d0:67:a9:78:45:71:ef:20:bd:be:8f:6e:e1: cc:5a:9d:d1:47:9a:a5:0f:5e:66:bd:41:90:23:bd:ad: 29:24:26:f9:13:8a:8d:92:41:de:6d:36:59:da:e1:bc: 91:6a:49:ac:62:a4:65:ec:0f:60:7e:b4:90:d7:65:22: d5:4b:d7:e2:c3:d2:92:ee:8a:0e:b3:ad:23:e7:c5:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:30:b3:1b:c3:ab:ff:af:23:8f:76:00:69:f2:8c:4a: 1b:71:5f:0f:2f:a3:9b:5a:cc:cc:27:e7:a7:52:29:65: bf:d7:80:60:55:b1:7c:8a:bf:f3:a4:0d:19:90:a9:4b: 95:cb:a7:dd:fc:a9:1c:e7:d4:ad:56:ac:65:4e:01:32: 44:1b:96:7f:33:42:2b:07:c3:96:4f:8b:0b:ec:15:77: b8:3d:c5:0f:41:fd:dc:9e:b8:36:56:95:1d:2a:75:dc: 1c:a8:f2:35:a1:c2:46:0f:94:12:f0:d6:c2:ce:c0:60: 9b:6f:b5:79:68:04:05:a9:42:7a:b2:34:5e:12:8e:2f: 00:6e:9b:b2:18:27:11:cd:b9:02:70:e9:58:ca:56:84: 0e:ee:5f:c0:90:f4:07:6b:6a:40:e7:90:85:0e:3c:ac: 6e:7f:c4:e4:ca:ad:b6:e1:d7:fc:22:86:c0:e1:5c:d2: 94:1e:e1:fc:22:95:9f:1c:d7:79:69:47:31:42:8d:28: b2:dc:4c:82:7b:e9:a6:ad:c5:81:d0:c5:ce:39:c0:90: 21:c8:da:f5:10:7f:12:dc:eb:db:bb:ea:f9:a0:c7:2a: 72:1d:2c:04:ca:af:1a:57:d4:a7:79:fa:04:fe:19:60: eb:1d:a3:29:f2:2d:9d:da:c5:9f:e1:4d:8f:c0:37:a5 Fingerprint (SHA-256): 6E:79:2D:29:7A:B3:82:9C:B4:29:13:B5:7C:0D:39:52:A6:5A:33:B1:BA:8E:D1:A4:96:5D:7E:B2:97:EC:DE:B5 Fingerprint (SHA1): 3F:C4:A8:58:6C:DF:51:F3:89:A5:5D:CD:0B:00:E7:4A:30:11:96:EE Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #13907: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092674 (0x6715d02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Jan 08 14:33:52 2016 Not After : Fri Jan 08 14:33:52 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:8f:53:16:18:22:15:de:cc:84:dd:4d:26:0c:52:d3: 7d:3b:25:82:12:ee:b1:4d:b1:8a:ac:e8:a9:e7:b6:37: a8:86:a9:d1:af:6a:1c:96:b0:2f:f1:e5:99:9f:f3:54: c0:de:82:bb:8c:7e:d6:74:a4:a7:a4:52:48:e1:ef:fe: 43:6f:42:20:f0:88:56:65:71:57:f0:51:c1:07:86:71: a4:b1:f8:e6:51:08:04:d5:ad:8c:86:3b:08:14:e1:5c: 21:99:68:ae:8c:e2:94:c4:1d:d5:fb:8b:bb:f0:cb:92: ba:45:86:23:97:30:12:23:9b:78:eb:59:55:06:15:66: 5a:c6:47:1f:4a:ec:45:58:0d:a9:e5:72:fc:2f:2c:f5: 52:24:06:6f:7f:2c:f3:e9:a9:34:11:93:9d:c0:b0:05: 1a:f0:e5:8d:3b:b2:d9:3e:99:e7:cd:2d:da:75:7a:a2: 63:7d:38:98:36:e4:ef:8c:98:da:37:cf:41:f3:90:c3: 3a:9c:bf:04:3f:c9:64:26:18:55:a9:b9:c9:5f:00:e2: a3:89:d7:bb:e4:f8:23:4d:01:8f:7d:c7:00:6a:8a:eb: 48:40:50:32:1a:cf:ba:90:a3:bf:de:4c:36:98:1a:6f: e8:42:78:db:a6:5c:9c:bb:3e:e3:66:f0:23:84:49:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:21:9c:8f:37:ed:92:11:11:be:69:72:92:0d:95:82: fc:02:91:86:16:31:1f:3c:e1:53:e4:10:dd:99:da:13: 95:ea:2f:ad:f7:97:bd:5e:10:0b:83:66:c0:17:0e:ef: 14:b6:80:7c:c4:07:2a:f9:07:b8:50:be:50:f3:f1:50: 87:3c:1e:bd:40:19:55:9f:56:0e:3d:3b:93:73:ef:89: e2:72:25:ae:28:ec:33:c8:ec:96:cb:16:6e:a9:b3:57: 10:87:8a:90:3b:42:92:8f:a4:3f:77:64:8c:a0:a1:cc: 4a:32:58:6a:b9:ee:96:08:b0:40:23:af:57:c5:8d:79: 3f:37:ae:2c:2d:ab:2f:d9:c7:76:d9:60:b3:1c:1f:1f: b5:aa:d0:f8:e7:89:36:90:1a:80:1d:e1:e7:7b:58:dd: 4b:9e:ca:a1:43:64:97:e4:8e:99:57:17:42:01:8d:87: ac:0b:89:f1:a7:af:84:cf:ad:e3:cf:49:a3:3f:db:a3: c2:65:d9:8e:23:2a:ea:e1:a0:5b:fa:9c:90:b9:24:e7: cf:98:99:46:e6:9e:d8:bf:1c:64:a4:a7:ce:2a:0a:51: 1f:01:a8:69:80:cc:91:f6:98:4d:79:ac:68:fc:e4:77: 96:76:01:5d:47:cc:ee:7e:fd:5c:e1:ee:67:55:58:9b Fingerprint (SHA-256): CC:62:15:3F:4B:17:A2:1D:73:7E:91:09:B8:7B:EC:03:25:F0:C2:AB:FA:83:17:C7:1F:02:31:D8:90:5D:C8:B9 Fingerprint (SHA1): 08:F8:D0:32:45:95:93:33:3F:D6:56:93:B5:12:A8:C2:75:5D:03:F8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #13908: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #13909: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092689 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13910: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #13911: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13912: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13913: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108092690 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13914: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13915: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13916: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13917: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108092691 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13918: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13919: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #13920: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13921: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108092692 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13922: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13923: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13924: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092689 (0x6715d11) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:36:08 2016 Not After : Fri Jan 08 14:36:08 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:68:cd:ab:5f:83:ea:29:ae:16:0c:42:a4:cd:cd:e7: b0:5e:e1:c0:e8:b9:7f:f9:8c:f0:f5:1a:4a:2c:78:1f: 1f:9e:d7:14:88:1c:92:4d:1f:36:58:42:de:8f:f0:86: c0:1e:ad:45:43:e9:ce:3e:d4:1f:91:01:45:a7:49:76: 51:78:22:2c:51:ac:9f:6b:da:6e:b4:1b:2f:0f:6a:f6: 33:03:6f:75:4b:d0:9b:5b:69:dc:36:ad:24:e9:01:5b: f1:bb:a8:c3:af:34:de:e5:68:6a:69:1f:71:ff:67:29: 95:e1:12:fa:e5:04:1c:62:8f:6f:35:f1:94:83:58:e2: b3:73:73:ab:9e:21:3c:b8:af:c2:46:86:85:2c:14:35: 26:66:7c:63:4f:4e:56:e9:ce:06:16:29:30:e1:5f:f6: a3:3c:f0:ad:0a:36:bc:e7:35:d2:d8:51:90:8f:a6:81: 10:47:58:b8:e1:af:c8:0d:83:16:8b:44:0b:27:1d:aa: 33:d0:39:f4:e0:0f:35:4f:98:b5:9c:64:ef:7b:f7:93: 68:8c:ae:88:38:b9:19:7c:6e:4e:bb:e1:ed:54:70:e7: 90:38:4b:17:31:b3:2a:4f:ce:17:6a:36:27:af:52:93: 69:47:48:fe:d7:21:9c:0d:29:ba:87:b8:3d:e1:77:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:b8:c0:73:45:52:1f:a6:a3:ae:df:26:b7:05:da:4a: 85:c0:be:6b:31:7d:e2:ad:88:58:d8:61:ef:cd:9f:f6: 32:44:13:16:3c:0d:f5:1d:04:07:7e:df:fc:6c:cf:c4: 26:2a:16:cf:73:c5:2b:e5:84:f7:d8:89:0c:91:fb:57: 69:74:57:1d:bb:67:36:b0:46:eb:58:02:7c:08:12:40: 9d:f9:b8:ee:f6:c3:42:29:d9:f0:8f:4d:92:d7:5a:58: dd:b9:c7:ef:dc:21:ae:e8:00:1c:79:91:50:70:ab:fb: 1e:83:cf:13:f2:72:7d:2c:85:16:ed:2b:e0:df:1c:15: 92:72:84:c4:3c:82:8c:c9:9e:a6:57:d8:ff:66:1d:3d: 92:f3:12:02:15:4a:82:0d:ab:92:7c:73:f3:7e:97:03: e3:c3:34:90:13:7f:fc:14:57:45:67:07:10:3b:d1:b7: dc:d3:9a:c9:1f:44:ed:64:f7:86:4b:7b:eb:2a:67:17: 38:c3:5a:38:3f:ea:9d:cc:1b:98:cf:63:e7:6e:9e:5c: ee:97:d8:c1:2e:24:00:d8:75:f3:c3:7d:9a:cf:7f:b2: ed:81:93:00:2a:df:e8:e5:bc:04:df:ac:02:e6:b9:33: 13:94:7f:94:37:1d:bf:a2:b8:eb:77:91:aa:a7:77:21 Fingerprint (SHA-256): C8:49:9E:B3:96:EE:C8:6E:A2:42:11:20:2E:2D:B1:18:58:5D:F9:FC:64:94:56:17:A6:47:2E:DB:DE:1C:A1:09 Fingerprint (SHA1): 3E:1F:3B:A3:5C:DB:3E:FE:84:94:75:C3:51:65:8B:8D:AD:54:C9:22 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13925: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13926: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092690 (0x6715d12) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:36:16 2016 Not After : Fri Jan 08 14:36:16 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:f4:ed:50:84:38:41:18:ff:9b:7f:2d:18:cb:c5:83: 4d:d1:1f:90:ac:df:cf:6f:d6:5f:e2:11:6f:f6:f8:e2: c2:f2:ff:4d:f6:1b:a5:91:b5:34:35:50:7e:1a:13:31: fb:84:99:d9:7c:76:8a:9f:30:72:0d:b6:11:c6:6e:7c: 95:a8:16:ef:83:89:10:96:9f:47:07:6c:4e:95:6b:77: 60:0c:20:d2:84:ce:28:cf:18:40:15:3a:d0:c0:d5:09: 9e:6f:21:0b:73:77:1b:52:d6:b4:e7:84:ca:79:22:b3: f2:ee:9d:68:8f:bb:b1:a4:04:7d:cb:8c:70:b6:b1:e7: cc:6a:11:fc:59:5f:56:d9:4d:56:af:dc:a2:c5:58:11: 1e:81:2d:6c:cf:9e:ff:b9:9d:c2:33:c4:8d:b4:53:7f: 81:04:2d:85:94:ed:76:0b:54:cf:a3:de:35:10:9d:e6: fb:ec:73:2a:8d:58:6e:d9:c3:6e:b5:9f:15:31:f6:19: 12:a7:b6:1a:73:73:6a:f6:1a:bc:3c:43:82:7e:e4:cf: 07:11:7b:46:c9:88:d2:bf:5f:00:5f:f7:33:19:52:b1: 9a:93:e6:c0:e9:cc:9e:ce:09:0a:ab:eb:f7:f9:b2:7a: 03:c9:4b:92:50:06:b9:a6:a2:27:3e:2c:9e:d4:72:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:c8:b5:04:9c:c6:de:da:9e:83:4c:fe:17:df:2e:6e: 0c:f1:4a:d7:f7:81:f7:d6:06:b1:77:27:57:82:24:ce: 90:a3:e8:c9:c8:2f:9c:62:86:8e:2b:71:cb:de:2a:39: a0:5c:34:94:91:dc:c1:be:68:fb:96:7e:3b:26:80:28: 2c:fa:e2:d8:43:60:d7:46:fc:24:27:48:7a:9a:98:85: 86:88:b7:26:3c:d9:ab:b1:df:0a:17:b4:a8:04:aa:97: 37:98:1d:19:6d:bc:be:64:ed:f3:36:d6:98:b7:7f:61: 7c:68:ed:22:1c:79:0c:9d:60:4c:39:05:53:e4:16:b7: 46:0d:b3:67:61:67:1c:a2:8a:1d:c2:0f:0a:3c:ee:0f: 51:8a:ed:43:a9:0d:0f:b4:5f:74:6f:2e:6a:e5:d6:21: ca:02:f1:16:1d:87:63:88:b5:68:22:6b:3e:8a:03:67: 3a:42:1c:c2:06:2a:03:6c:44:4f:cb:94:ac:b4:ac:fd: 80:ac:e9:d9:ae:04:63:05:a3:7b:0e:a8:4f:03:77:04: 97:1d:71:c1:1c:75:e2:43:9c:91:c2:34:73:3d:bb:3f: 49:b2:f8:3f:4d:af:6b:c6:6b:a9:9f:86:9b:59:64:b1: 90:68:69:dc:2a:88:db:a0:f7:80:2d:ff:b0:6c:42:8e Fingerprint (SHA-256): 51:EF:09:02:23:98:3E:D2:2D:B3:6F:AA:3C:11:43:33:AC:45:3E:6B:10:ED:F6:36:C3:4F:EE:04:2B:3B:9F:B7 Fingerprint (SHA1): 02:A2:4D:E6:A6:4A:8F:B7:BD:D8:6E:BE:B9:E6:4D:CC:4C:35:73:48 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13927: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13928: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092691 (0x6715d13) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 14:36:22 2016 Not After : Fri Jan 08 14:36:22 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:d2:1f:30:65:f7:66:ab:82:ef:d4:72:ac:0f:70:c8: 24:da:b0:d8:f9:02:16:d7:c2:9a:99:72:fe:a8:ad:20: fe:fd:39:06:f3:c9:bf:5f:d9:4e:55:a9:b1:40:ae:7f: 58:21:27:75:79:dc:c8:c5:bf:e8:0a:6d:5e:a6:db:20: 68:71:67:77:24:65:be:fe:ac:0e:d0:24:84:48:ee:42: 86:c3:14:35:f0:11:0b:54:84:b6:57:68:5b:56:c7:46: 63:b4:fb:03:95:4a:03:30:32:7b:a5:91:49:09:28:d7: df:01:4f:5b:66:38:32:0e:8b:03:a9:96:b1:6a:8b:c1: 34:cd:fd:55:0a:7c:19:58:87:1c:93:b7:9b:d7:01:a5: 48:50:95:5a:1c:59:80:44:c4:5d:90:b6:fc:d3:f6:1d: fa:70:48:5a:62:5e:76:fe:5c:36:a3:19:b7:fc:d5:49: df:05:6d:24:ff:55:8a:d8:0e:be:3d:47:e3:44:72:8e: 83:7b:da:b3:be:c7:7d:ae:7a:70:ea:05:cf:9c:88:24: 32:c0:ea:44:28:c7:c6:a7:87:94:59:52:e6:32:77:d5: 5e:16:1d:c0:f5:8e:2c:24:95:98:43:1f:05:5d:14:87: cf:39:fd:a3:1a:32:8f:e1:44:22:45:ad:3f:94:7e:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:a9:60:d1:9e:56:1a:86:d2:c6:d6:ed:e2:b6:db:24: 17:53:5b:f8:98:81:21:ab:9b:34:5f:03:80:0e:a7:22: 85:57:1e:16:cc:cb:9b:a3:38:5c:21:71:9e:f3:00:19: 58:6f:c8:53:87:db:34:eb:b5:93:da:48:c7:ed:c0:5e: 58:1e:55:eb:01:0b:23:5c:56:88:eb:b0:7b:0e:a5:36: 77:34:11:11:8a:98:88:3d:12:e2:81:80:b3:db:56:65: c5:38:a5:6d:a5:a6:fc:02:5d:7b:3f:6c:22:06:d5:22: 39:72:60:b5:ed:a5:b6:3c:67:f3:f4:d0:bc:9d:7a:d9: 9d:92:12:c8:2b:1c:a9:ac:47:71:ef:6e:ec:ca:cf:56: e4:4e:e3:c7:1e:ef:80:dc:cf:20:47:e8:e1:46:30:0a: 12:ce:aa:a6:87:b2:e7:39:05:6f:a8:34:88:a7:0c:bb: 76:6f:c1:3b:46:af:bc:06:18:d9:9a:f4:61:5f:cc:c0: 2c:0e:3b:1a:b8:24:e0:03:e9:78:f8:4e:62:a5:4e:92: df:0f:ca:22:1e:8c:59:f7:3e:80:25:64:76:af:4b:d1: 00:70:e3:56:45:9f:7f:04:01:c1:0a:be:c0:f2:cb:58: e3:5d:ad:49:62:92:f5:31:8d:0f:f5:83:c7:0c:60:62 Fingerprint (SHA-256): F3:86:A8:33:03:46:0B:5A:A0:1D:2D:38:54:66:93:58:D2:B6:7A:94:D9:09:0A:2E:3E:0A:28:2D:20:A9:75:26 Fingerprint (SHA1): 47:07:51:04:D6:B7:4F:79:2D:1F:6B:85:95:18:3E:99:64:3D:5D:E1 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #13929: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13930: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #13931: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #13932: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #13933: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092689 (0x6715d11) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:36:08 2016 Not After : Fri Jan 08 14:36:08 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:68:cd:ab:5f:83:ea:29:ae:16:0c:42:a4:cd:cd:e7: b0:5e:e1:c0:e8:b9:7f:f9:8c:f0:f5:1a:4a:2c:78:1f: 1f:9e:d7:14:88:1c:92:4d:1f:36:58:42:de:8f:f0:86: c0:1e:ad:45:43:e9:ce:3e:d4:1f:91:01:45:a7:49:76: 51:78:22:2c:51:ac:9f:6b:da:6e:b4:1b:2f:0f:6a:f6: 33:03:6f:75:4b:d0:9b:5b:69:dc:36:ad:24:e9:01:5b: f1:bb:a8:c3:af:34:de:e5:68:6a:69:1f:71:ff:67:29: 95:e1:12:fa:e5:04:1c:62:8f:6f:35:f1:94:83:58:e2: b3:73:73:ab:9e:21:3c:b8:af:c2:46:86:85:2c:14:35: 26:66:7c:63:4f:4e:56:e9:ce:06:16:29:30:e1:5f:f6: a3:3c:f0:ad:0a:36:bc:e7:35:d2:d8:51:90:8f:a6:81: 10:47:58:b8:e1:af:c8:0d:83:16:8b:44:0b:27:1d:aa: 33:d0:39:f4:e0:0f:35:4f:98:b5:9c:64:ef:7b:f7:93: 68:8c:ae:88:38:b9:19:7c:6e:4e:bb:e1:ed:54:70:e7: 90:38:4b:17:31:b3:2a:4f:ce:17:6a:36:27:af:52:93: 69:47:48:fe:d7:21:9c:0d:29:ba:87:b8:3d:e1:77:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:b8:c0:73:45:52:1f:a6:a3:ae:df:26:b7:05:da:4a: 85:c0:be:6b:31:7d:e2:ad:88:58:d8:61:ef:cd:9f:f6: 32:44:13:16:3c:0d:f5:1d:04:07:7e:df:fc:6c:cf:c4: 26:2a:16:cf:73:c5:2b:e5:84:f7:d8:89:0c:91:fb:57: 69:74:57:1d:bb:67:36:b0:46:eb:58:02:7c:08:12:40: 9d:f9:b8:ee:f6:c3:42:29:d9:f0:8f:4d:92:d7:5a:58: dd:b9:c7:ef:dc:21:ae:e8:00:1c:79:91:50:70:ab:fb: 1e:83:cf:13:f2:72:7d:2c:85:16:ed:2b:e0:df:1c:15: 92:72:84:c4:3c:82:8c:c9:9e:a6:57:d8:ff:66:1d:3d: 92:f3:12:02:15:4a:82:0d:ab:92:7c:73:f3:7e:97:03: e3:c3:34:90:13:7f:fc:14:57:45:67:07:10:3b:d1:b7: dc:d3:9a:c9:1f:44:ed:64:f7:86:4b:7b:eb:2a:67:17: 38:c3:5a:38:3f:ea:9d:cc:1b:98:cf:63:e7:6e:9e:5c: ee:97:d8:c1:2e:24:00:d8:75:f3:c3:7d:9a:cf:7f:b2: ed:81:93:00:2a:df:e8:e5:bc:04:df:ac:02:e6:b9:33: 13:94:7f:94:37:1d:bf:a2:b8:eb:77:91:aa:a7:77:21 Fingerprint (SHA-256): C8:49:9E:B3:96:EE:C8:6E:A2:42:11:20:2E:2D:B1:18:58:5D:F9:FC:64:94:56:17:A6:47:2E:DB:DE:1C:A1:09 Fingerprint (SHA1): 3E:1F:3B:A3:5C:DB:3E:FE:84:94:75:C3:51:65:8B:8D:AD:54:C9:22 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13934: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13935: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092690 (0x6715d12) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:36:16 2016 Not After : Fri Jan 08 14:36:16 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:f4:ed:50:84:38:41:18:ff:9b:7f:2d:18:cb:c5:83: 4d:d1:1f:90:ac:df:cf:6f:d6:5f:e2:11:6f:f6:f8:e2: c2:f2:ff:4d:f6:1b:a5:91:b5:34:35:50:7e:1a:13:31: fb:84:99:d9:7c:76:8a:9f:30:72:0d:b6:11:c6:6e:7c: 95:a8:16:ef:83:89:10:96:9f:47:07:6c:4e:95:6b:77: 60:0c:20:d2:84:ce:28:cf:18:40:15:3a:d0:c0:d5:09: 9e:6f:21:0b:73:77:1b:52:d6:b4:e7:84:ca:79:22:b3: f2:ee:9d:68:8f:bb:b1:a4:04:7d:cb:8c:70:b6:b1:e7: cc:6a:11:fc:59:5f:56:d9:4d:56:af:dc:a2:c5:58:11: 1e:81:2d:6c:cf:9e:ff:b9:9d:c2:33:c4:8d:b4:53:7f: 81:04:2d:85:94:ed:76:0b:54:cf:a3:de:35:10:9d:e6: fb:ec:73:2a:8d:58:6e:d9:c3:6e:b5:9f:15:31:f6:19: 12:a7:b6:1a:73:73:6a:f6:1a:bc:3c:43:82:7e:e4:cf: 07:11:7b:46:c9:88:d2:bf:5f:00:5f:f7:33:19:52:b1: 9a:93:e6:c0:e9:cc:9e:ce:09:0a:ab:eb:f7:f9:b2:7a: 03:c9:4b:92:50:06:b9:a6:a2:27:3e:2c:9e:d4:72:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:c8:b5:04:9c:c6:de:da:9e:83:4c:fe:17:df:2e:6e: 0c:f1:4a:d7:f7:81:f7:d6:06:b1:77:27:57:82:24:ce: 90:a3:e8:c9:c8:2f:9c:62:86:8e:2b:71:cb:de:2a:39: a0:5c:34:94:91:dc:c1:be:68:fb:96:7e:3b:26:80:28: 2c:fa:e2:d8:43:60:d7:46:fc:24:27:48:7a:9a:98:85: 86:88:b7:26:3c:d9:ab:b1:df:0a:17:b4:a8:04:aa:97: 37:98:1d:19:6d:bc:be:64:ed:f3:36:d6:98:b7:7f:61: 7c:68:ed:22:1c:79:0c:9d:60:4c:39:05:53:e4:16:b7: 46:0d:b3:67:61:67:1c:a2:8a:1d:c2:0f:0a:3c:ee:0f: 51:8a:ed:43:a9:0d:0f:b4:5f:74:6f:2e:6a:e5:d6:21: ca:02:f1:16:1d:87:63:88:b5:68:22:6b:3e:8a:03:67: 3a:42:1c:c2:06:2a:03:6c:44:4f:cb:94:ac:b4:ac:fd: 80:ac:e9:d9:ae:04:63:05:a3:7b:0e:a8:4f:03:77:04: 97:1d:71:c1:1c:75:e2:43:9c:91:c2:34:73:3d:bb:3f: 49:b2:f8:3f:4d:af:6b:c6:6b:a9:9f:86:9b:59:64:b1: 90:68:69:dc:2a:88:db:a0:f7:80:2d:ff:b0:6c:42:8e Fingerprint (SHA-256): 51:EF:09:02:23:98:3E:D2:2D:B3:6F:AA:3C:11:43:33:AC:45:3E:6B:10:ED:F6:36:C3:4F:EE:04:2B:3B:9F:B7 Fingerprint (SHA1): 02:A2:4D:E6:A6:4A:8F:B7:BD:D8:6E:BE:B9:E6:4D:CC:4C:35:73:48 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13936: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13937: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092691 (0x6715d13) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 14:36:22 2016 Not After : Fri Jan 08 14:36:22 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:d2:1f:30:65:f7:66:ab:82:ef:d4:72:ac:0f:70:c8: 24:da:b0:d8:f9:02:16:d7:c2:9a:99:72:fe:a8:ad:20: fe:fd:39:06:f3:c9:bf:5f:d9:4e:55:a9:b1:40:ae:7f: 58:21:27:75:79:dc:c8:c5:bf:e8:0a:6d:5e:a6:db:20: 68:71:67:77:24:65:be:fe:ac:0e:d0:24:84:48:ee:42: 86:c3:14:35:f0:11:0b:54:84:b6:57:68:5b:56:c7:46: 63:b4:fb:03:95:4a:03:30:32:7b:a5:91:49:09:28:d7: df:01:4f:5b:66:38:32:0e:8b:03:a9:96:b1:6a:8b:c1: 34:cd:fd:55:0a:7c:19:58:87:1c:93:b7:9b:d7:01:a5: 48:50:95:5a:1c:59:80:44:c4:5d:90:b6:fc:d3:f6:1d: fa:70:48:5a:62:5e:76:fe:5c:36:a3:19:b7:fc:d5:49: df:05:6d:24:ff:55:8a:d8:0e:be:3d:47:e3:44:72:8e: 83:7b:da:b3:be:c7:7d:ae:7a:70:ea:05:cf:9c:88:24: 32:c0:ea:44:28:c7:c6:a7:87:94:59:52:e6:32:77:d5: 5e:16:1d:c0:f5:8e:2c:24:95:98:43:1f:05:5d:14:87: cf:39:fd:a3:1a:32:8f:e1:44:22:45:ad:3f:94:7e:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:a9:60:d1:9e:56:1a:86:d2:c6:d6:ed:e2:b6:db:24: 17:53:5b:f8:98:81:21:ab:9b:34:5f:03:80:0e:a7:22: 85:57:1e:16:cc:cb:9b:a3:38:5c:21:71:9e:f3:00:19: 58:6f:c8:53:87:db:34:eb:b5:93:da:48:c7:ed:c0:5e: 58:1e:55:eb:01:0b:23:5c:56:88:eb:b0:7b:0e:a5:36: 77:34:11:11:8a:98:88:3d:12:e2:81:80:b3:db:56:65: c5:38:a5:6d:a5:a6:fc:02:5d:7b:3f:6c:22:06:d5:22: 39:72:60:b5:ed:a5:b6:3c:67:f3:f4:d0:bc:9d:7a:d9: 9d:92:12:c8:2b:1c:a9:ac:47:71:ef:6e:ec:ca:cf:56: e4:4e:e3:c7:1e:ef:80:dc:cf:20:47:e8:e1:46:30:0a: 12:ce:aa:a6:87:b2:e7:39:05:6f:a8:34:88:a7:0c:bb: 76:6f:c1:3b:46:af:bc:06:18:d9:9a:f4:61:5f:cc:c0: 2c:0e:3b:1a:b8:24:e0:03:e9:78:f8:4e:62:a5:4e:92: df:0f:ca:22:1e:8c:59:f7:3e:80:25:64:76:af:4b:d1: 00:70:e3:56:45:9f:7f:04:01:c1:0a:be:c0:f2:cb:58: e3:5d:ad:49:62:92:f5:31:8d:0f:f5:83:c7:0c:60:62 Fingerprint (SHA-256): F3:86:A8:33:03:46:0B:5A:A0:1D:2D:38:54:66:93:58:D2:B6:7A:94:D9:09:0A:2E:3E:0A:28:2D:20:A9:75:26 Fingerprint (SHA1): 47:07:51:04:D6:B7:4F:79:2D:1F:6B:85:95:18:3E:99:64:3D:5D:E1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #13938: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13939: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #13940: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092693 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13941: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #13942: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13943: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13944: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108092694 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13945: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13946: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13947: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13948: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108092695 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13949: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13950: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #13951: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13952: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108092696 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13953: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13954: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #13955: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13956: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108092697 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13957: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13958: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13959: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092693 (0x6715d15) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:36:58 2016 Not After : Fri Jan 08 14:36:58 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:5e:0d:61:87:bb:cb:31:e9:7f:74:d5:66:a0:fc:a5: 28:96:10:e3:cf:d6:03:3f:14:3f:9a:5a:f1:40:c5:a8: 73:2a:0a:a5:6a:79:93:71:49:ec:65:6e:ca:bf:6d:5e: 06:c6:3c:db:0b:a7:3f:66:dd:bf:22:80:f7:79:77:13: fb:d7:c1:bb:35:29:0a:b0:36:8b:2c:a7:bd:25:bd:04: 82:7e:8a:bc:16:00:51:ff:32:5b:5f:75:3d:62:f7:f8: 7e:2d:be:cc:57:59:cb:c9:37:a1:01:c6:70:a7:37:48: bc:d8:37:cd:33:4c:09:39:79:93:4b:aa:88:f2:aa:81: d2:2e:b7:f9:2f:d5:21:73:47:59:92:38:53:8e:4e:29: d8:46:f0:dd:37:de:ff:1b:a1:31:60:d9:df:60:72:b2: 9c:66:ed:ca:4d:a8:02:a1:f6:9a:4b:a5:59:fe:d7:83: b2:e9:26:4a:8a:4b:ca:b6:93:6f:6c:7f:7b:c6:bc:6d: 7f:b5:cd:92:e2:bb:49:33:82:a6:9b:0f:3b:43:d5:8d: 32:57:62:a8:1e:f7:9e:c6:d3:83:a1:1f:b8:26:5f:92: fc:95:e3:bc:7d:50:ce:b2:cf:dd:a3:48:79:a0:e6:4b: af:a0:a9:36:15:a5:2b:a8:c2:21:6e:6d:6c:13:85:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:03:5f:4e:93:d5:5a:44:b2:03:94:13:9f:47:86:90: 2c:48:d3:90:20:34:23:8d:94:2f:18:46:9c:42:06:e8: e3:7f:a3:88:2b:55:5e:1c:06:41:cb:b4:61:0e:ff:a2: 67:9f:13:48:1b:23:9d:8c:2e:6e:51:d1:6c:22:48:dc: ee:d2:1e:6c:ef:09:ed:e5:2f:53:6c:9b:8d:6f:a3:40: 0e:81:23:c1:3b:7e:99:d3:da:7c:cf:43:25:08:10:1d: 76:d2:54:8a:e6:5a:8f:13:38:cc:1c:01:04:b6:ca:97: cb:f0:97:c3:bb:e0:01:e3:03:58:c7:d7:b9:f8:33:81: 06:59:de:2b:0f:8b:c0:85:d0:22:f9:5f:40:61:16:98: bc:25:99:6d:8d:d8:b9:39:ef:63:7e:4f:67:dc:d4:9e: a4:5f:6e:42:8d:ad:4c:92:8f:a2:c3:43:63:64:ab:48: f7:87:28:ef:4f:3c:49:d1:28:d1:90:15:e1:9d:b7:22: 94:2b:82:c6:4f:5f:dd:4b:8a:03:ba:b5:52:a1:cd:fb: c9:38:d5:3b:f9:de:ff:16:20:8b:09:a6:6f:54:46:bb: 67:4a:70:a7:fc:f4:c9:2c:1e:5b:a5:3e:6e:eb:81:05: 58:e2:c6:08:b3:0a:b9:6d:98:61:00:8b:ac:a6:4c:0d Fingerprint (SHA-256): 1A:E9:42:BA:AA:03:68:43:B5:AD:40:A8:7E:8E:EE:F8:64:CF:27:D0:6F:1C:3A:5B:7D:D9:04:E3:56:A3:E0:9D Fingerprint (SHA1): 11:8F:78:67:01:F2:FB:1B:A4:F5:8F:0A:4C:E3:66:0C:DD:A5:43:8B Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13960: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13961: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092694 (0x6715d16) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:37:03 2016 Not After : Fri Jan 08 14:37:03 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:ca:4c:2e:c0:92:55:aa:73:7e:4e:4d:31:1a:a4:66: 96:21:e1:c1:19:a2:39:5d:8f:fc:92:80:9d:01:f7:6c: 1e:a2:f4:12:3e:c0:8e:9e:0e:8e:e3:b2:46:35:e0:56: 62:dd:4e:b5:84:5c:96:63:ed:03:fb:a1:10:55:7a:72: fe:c9:64:9f:be:e6:b0:ec:90:e3:97:ec:b5:2c:f0:18: c8:ce:26:1b:b3:dd:1a:7a:1f:39:ff:a6:96:3d:a5:d8: 33:ba:29:30:60:4d:45:63:c6:86:09:cc:c3:18:8e:13: 55:bc:68:fc:be:da:a6:c5:34:ff:6d:35:33:0e:bc:54: e7:16:42:a8:e8:d3:d2:52:eb:42:55:20:a7:ec:cf:9f: 87:a9:48:89:5b:a1:31:55:39:69:57:d8:b4:21:cd:4d: cb:62:0d:be:b9:0e:ff:60:fb:d6:fc:52:c9:4b:3d:ff: c6:55:a0:17:9d:83:aa:2b:63:a8:2f:66:a2:c1:55:ad: 43:7a:cd:dc:34:bd:6e:dc:15:e9:39:fc:ff:51:3f:5b: 44:55:35:72:93:6a:99:d8:88:ea:fe:b4:e6:70:13:db: b7:7d:70:4a:41:a0:cd:8a:f4:9d:c7:54:1d:2e:a7:01: 54:c4:37:b5:0d:1e:fd:0a:75:78:3a:a1:1c:9b:9e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:3d:0f:71:73:37:2b:1b:1b:0d:3e:c4:1d:ee:b5:80: 94:5b:eb:dd:54:13:5f:f6:38:bf:55:3e:22:71:9a:a5: 92:01:62:19:6b:a4:24:d5:e1:35:e5:bc:82:8b:f6:22: 3e:0d:d0:b8:95:fa:c6:a0:c6:73:73:f1:b1:f4:81:cd: 74:23:0e:89:28:5d:b4:66:6f:3d:87:a6:27:7c:33:df: d0:ac:c3:5e:dd:ad:6d:4a:47:47:77:04:32:e3:b8:b7: 9a:c1:16:22:d6:44:84:b5:61:23:01:9b:7c:df:c9:8b: c9:c2:7e:b0:c6:8c:d3:40:7f:c9:50:84:98:b1:09:45: f3:be:f8:51:e1:14:0c:64:62:1e:22:c3:ea:75:f8:a5: d9:cb:0a:cd:ba:c6:0d:f6:29:b2:d7:3d:d9:56:ce:31: 63:f5:37:89:08:70:38:af:da:bd:86:e0:e9:93:52:56: 2b:45:c3:ce:5d:a6:8c:d4:1d:89:7d:09:7f:18:48:e0: f9:eb:be:c6:7f:a2:0b:64:8b:65:ac:10:6c:78:a3:72: a1:bd:91:b9:7a:0e:41:0c:44:c1:67:ba:2a:18:ad:43: 1a:54:a4:97:21:17:e8:05:87:e6:b9:33:69:cf:a3:77: 8c:47:3f:cb:7b:34:c3:de:3f:af:65:cb:4f:a8:46:ab Fingerprint (SHA-256): E0:90:5F:4B:99:5B:91:E3:5F:2A:40:79:12:85:33:2F:5A:6F:E3:85:B9:32:F6:6C:27:9D:15:6B:E5:02:AB:9B Fingerprint (SHA1): 04:80:40:D7:9C:F6:30:19:42:AB:47:18:CF:00:92:EC:38:CC:B2:BC Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13962: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13963: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092695 (0x6715d17) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 14:37:11 2016 Not After : Fri Jan 08 14:37:11 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:78:55:d0:d6:6a:90:7d:fb:59:1e:e0:c7:ad:f8:a7: 6d:38:a2:32:4b:ee:89:13:6d:63:0d:19:35:ef:2d:ef: 7f:8a:09:32:a1:12:17:f6:fb:c3:14:7d:b0:84:b0:a8: f3:2e:eb:41:ed:fe:2e:36:e1:e4:76:3b:03:67:32:dd: 44:c2:61:c1:23:8c:fc:bc:41:1e:a8:d8:f2:74:d3:bc: b3:1d:45:78:46:b4:d6:b9:2a:a7:4f:4f:2e:d6:22:d3: 54:f3:a9:86:43:e2:27:ce:b2:70:68:97:fc:54:a1:8c: 79:dd:29:6d:b6:7d:28:df:03:83:46:f5:65:12:28:bb: d4:1c:c4:7f:26:26:9e:a5:c8:3a:24:23:2e:23:8d:67: 1e:f5:49:77:37:20:f6:e9:4d:f8:25:d3:36:43:36:c8: 3d:31:f0:20:bb:6f:d1:ae:28:5d:d8:c5:2c:60:0a:b4: 2a:82:be:ea:f2:6f:9d:ea:6e:2b:8c:6e:1a:0c:51:46: fd:ea:19:00:f4:2e:7c:e7:f9:f2:70:26:9a:d7:56:c5: ef:ed:0b:46:56:1b:3c:1b:bf:55:91:f8:5b:8f:10:cb: 50:41:4b:8f:c4:e9:49:bf:ac:6d:11:ef:45:d3:50:14: 45:1c:38:6d:c7:be:33:a6:7f:18:46:b6:ae:92:78:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:91:f2:77:7e:b8:05:c7:49:28:5f:98:ef:48:46:4b: f0:58:01:89:da:6e:70:bc:ad:bd:50:dd:1e:9b:77:5c: 54:93:dc:05:23:d5:ac:c2:1c:ab:a8:04:f0:a2:a1:88: 2b:47:5b:7a:2f:c0:83:d8:55:fd:31:e8:b8:84:0c:48: 9c:20:14:ae:3c:8c:25:e8:59:78:c7:de:54:30:a8:f0: 8f:57:07:58:e2:5f:1d:ea:fa:e5:a7:c6:8d:9a:63:5f: 5e:e3:18:ca:b2:1a:88:57:10:b9:4b:0a:29:0e:a3:da: c7:2b:6b:26:8f:54:17:f2:7c:35:53:48:f7:d5:1c:a1: 7d:6f:88:10:61:53:46:12:76:40:3d:a9:b0:52:bd:16: e5:0e:ed:4c:05:01:cb:e0:55:10:48:b4:4b:85:13:0b: d2:b1:3c:96:0d:7b:d5:82:80:fa:b1:bb:dd:1d:95:f5: 0c:50:9f:43:c4:9b:78:e0:1a:a7:02:4f:97:a7:2a:46: 30:cf:e7:9f:94:93:f0:d6:53:c9:3d:76:0d:25:7b:0e: a6:11:53:52:75:ed:4f:f1:9b:48:e7:3e:8d:d0:b2:75: 2e:97:dc:4c:23:2e:72:9a:15:11:5f:d1:08:66:c7:a0: a0:9f:3c:08:06:0c:e1:65:7d:fb:12:cc:fd:71:2a:23 Fingerprint (SHA-256): 17:1C:B9:A4:6B:29:76:BB:01:4E:0B:08:F9:02:74:3F:64:42:74:EA:DA:48:7D:ED:E7:12:0F:CB:EB:68:95:B9 Fingerprint (SHA1): FF:12:3A:C6:BD:5A:0E:E2:9A:EF:F9:B7:1F:2E:30:0C:0A:BE:B8:DB Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #13964: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13965: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #13966: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #13967: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #13968: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092693 (0x6715d15) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:36:58 2016 Not After : Fri Jan 08 14:36:58 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:5e:0d:61:87:bb:cb:31:e9:7f:74:d5:66:a0:fc:a5: 28:96:10:e3:cf:d6:03:3f:14:3f:9a:5a:f1:40:c5:a8: 73:2a:0a:a5:6a:79:93:71:49:ec:65:6e:ca:bf:6d:5e: 06:c6:3c:db:0b:a7:3f:66:dd:bf:22:80:f7:79:77:13: fb:d7:c1:bb:35:29:0a:b0:36:8b:2c:a7:bd:25:bd:04: 82:7e:8a:bc:16:00:51:ff:32:5b:5f:75:3d:62:f7:f8: 7e:2d:be:cc:57:59:cb:c9:37:a1:01:c6:70:a7:37:48: bc:d8:37:cd:33:4c:09:39:79:93:4b:aa:88:f2:aa:81: d2:2e:b7:f9:2f:d5:21:73:47:59:92:38:53:8e:4e:29: d8:46:f0:dd:37:de:ff:1b:a1:31:60:d9:df:60:72:b2: 9c:66:ed:ca:4d:a8:02:a1:f6:9a:4b:a5:59:fe:d7:83: b2:e9:26:4a:8a:4b:ca:b6:93:6f:6c:7f:7b:c6:bc:6d: 7f:b5:cd:92:e2:bb:49:33:82:a6:9b:0f:3b:43:d5:8d: 32:57:62:a8:1e:f7:9e:c6:d3:83:a1:1f:b8:26:5f:92: fc:95:e3:bc:7d:50:ce:b2:cf:dd:a3:48:79:a0:e6:4b: af:a0:a9:36:15:a5:2b:a8:c2:21:6e:6d:6c:13:85:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:03:5f:4e:93:d5:5a:44:b2:03:94:13:9f:47:86:90: 2c:48:d3:90:20:34:23:8d:94:2f:18:46:9c:42:06:e8: e3:7f:a3:88:2b:55:5e:1c:06:41:cb:b4:61:0e:ff:a2: 67:9f:13:48:1b:23:9d:8c:2e:6e:51:d1:6c:22:48:dc: ee:d2:1e:6c:ef:09:ed:e5:2f:53:6c:9b:8d:6f:a3:40: 0e:81:23:c1:3b:7e:99:d3:da:7c:cf:43:25:08:10:1d: 76:d2:54:8a:e6:5a:8f:13:38:cc:1c:01:04:b6:ca:97: cb:f0:97:c3:bb:e0:01:e3:03:58:c7:d7:b9:f8:33:81: 06:59:de:2b:0f:8b:c0:85:d0:22:f9:5f:40:61:16:98: bc:25:99:6d:8d:d8:b9:39:ef:63:7e:4f:67:dc:d4:9e: a4:5f:6e:42:8d:ad:4c:92:8f:a2:c3:43:63:64:ab:48: f7:87:28:ef:4f:3c:49:d1:28:d1:90:15:e1:9d:b7:22: 94:2b:82:c6:4f:5f:dd:4b:8a:03:ba:b5:52:a1:cd:fb: c9:38:d5:3b:f9:de:ff:16:20:8b:09:a6:6f:54:46:bb: 67:4a:70:a7:fc:f4:c9:2c:1e:5b:a5:3e:6e:eb:81:05: 58:e2:c6:08:b3:0a:b9:6d:98:61:00:8b:ac:a6:4c:0d Fingerprint (SHA-256): 1A:E9:42:BA:AA:03:68:43:B5:AD:40:A8:7E:8E:EE:F8:64:CF:27:D0:6F:1C:3A:5B:7D:D9:04:E3:56:A3:E0:9D Fingerprint (SHA1): 11:8F:78:67:01:F2:FB:1B:A4:F5:8F:0A:4C:E3:66:0C:DD:A5:43:8B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13969: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13970: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092694 (0x6715d16) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:37:03 2016 Not After : Fri Jan 08 14:37:03 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:ca:4c:2e:c0:92:55:aa:73:7e:4e:4d:31:1a:a4:66: 96:21:e1:c1:19:a2:39:5d:8f:fc:92:80:9d:01:f7:6c: 1e:a2:f4:12:3e:c0:8e:9e:0e:8e:e3:b2:46:35:e0:56: 62:dd:4e:b5:84:5c:96:63:ed:03:fb:a1:10:55:7a:72: fe:c9:64:9f:be:e6:b0:ec:90:e3:97:ec:b5:2c:f0:18: c8:ce:26:1b:b3:dd:1a:7a:1f:39:ff:a6:96:3d:a5:d8: 33:ba:29:30:60:4d:45:63:c6:86:09:cc:c3:18:8e:13: 55:bc:68:fc:be:da:a6:c5:34:ff:6d:35:33:0e:bc:54: e7:16:42:a8:e8:d3:d2:52:eb:42:55:20:a7:ec:cf:9f: 87:a9:48:89:5b:a1:31:55:39:69:57:d8:b4:21:cd:4d: cb:62:0d:be:b9:0e:ff:60:fb:d6:fc:52:c9:4b:3d:ff: c6:55:a0:17:9d:83:aa:2b:63:a8:2f:66:a2:c1:55:ad: 43:7a:cd:dc:34:bd:6e:dc:15:e9:39:fc:ff:51:3f:5b: 44:55:35:72:93:6a:99:d8:88:ea:fe:b4:e6:70:13:db: b7:7d:70:4a:41:a0:cd:8a:f4:9d:c7:54:1d:2e:a7:01: 54:c4:37:b5:0d:1e:fd:0a:75:78:3a:a1:1c:9b:9e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:3d:0f:71:73:37:2b:1b:1b:0d:3e:c4:1d:ee:b5:80: 94:5b:eb:dd:54:13:5f:f6:38:bf:55:3e:22:71:9a:a5: 92:01:62:19:6b:a4:24:d5:e1:35:e5:bc:82:8b:f6:22: 3e:0d:d0:b8:95:fa:c6:a0:c6:73:73:f1:b1:f4:81:cd: 74:23:0e:89:28:5d:b4:66:6f:3d:87:a6:27:7c:33:df: d0:ac:c3:5e:dd:ad:6d:4a:47:47:77:04:32:e3:b8:b7: 9a:c1:16:22:d6:44:84:b5:61:23:01:9b:7c:df:c9:8b: c9:c2:7e:b0:c6:8c:d3:40:7f:c9:50:84:98:b1:09:45: f3:be:f8:51:e1:14:0c:64:62:1e:22:c3:ea:75:f8:a5: d9:cb:0a:cd:ba:c6:0d:f6:29:b2:d7:3d:d9:56:ce:31: 63:f5:37:89:08:70:38:af:da:bd:86:e0:e9:93:52:56: 2b:45:c3:ce:5d:a6:8c:d4:1d:89:7d:09:7f:18:48:e0: f9:eb:be:c6:7f:a2:0b:64:8b:65:ac:10:6c:78:a3:72: a1:bd:91:b9:7a:0e:41:0c:44:c1:67:ba:2a:18:ad:43: 1a:54:a4:97:21:17:e8:05:87:e6:b9:33:69:cf:a3:77: 8c:47:3f:cb:7b:34:c3:de:3f:af:65:cb:4f:a8:46:ab Fingerprint (SHA-256): E0:90:5F:4B:99:5B:91:E3:5F:2A:40:79:12:85:33:2F:5A:6F:E3:85:B9:32:F6:6C:27:9D:15:6B:E5:02:AB:9B Fingerprint (SHA1): 04:80:40:D7:9C:F6:30:19:42:AB:47:18:CF:00:92:EC:38:CC:B2:BC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13971: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13972: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092695 (0x6715d17) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 14:37:11 2016 Not After : Fri Jan 08 14:37:11 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:78:55:d0:d6:6a:90:7d:fb:59:1e:e0:c7:ad:f8:a7: 6d:38:a2:32:4b:ee:89:13:6d:63:0d:19:35:ef:2d:ef: 7f:8a:09:32:a1:12:17:f6:fb:c3:14:7d:b0:84:b0:a8: f3:2e:eb:41:ed:fe:2e:36:e1:e4:76:3b:03:67:32:dd: 44:c2:61:c1:23:8c:fc:bc:41:1e:a8:d8:f2:74:d3:bc: b3:1d:45:78:46:b4:d6:b9:2a:a7:4f:4f:2e:d6:22:d3: 54:f3:a9:86:43:e2:27:ce:b2:70:68:97:fc:54:a1:8c: 79:dd:29:6d:b6:7d:28:df:03:83:46:f5:65:12:28:bb: d4:1c:c4:7f:26:26:9e:a5:c8:3a:24:23:2e:23:8d:67: 1e:f5:49:77:37:20:f6:e9:4d:f8:25:d3:36:43:36:c8: 3d:31:f0:20:bb:6f:d1:ae:28:5d:d8:c5:2c:60:0a:b4: 2a:82:be:ea:f2:6f:9d:ea:6e:2b:8c:6e:1a:0c:51:46: fd:ea:19:00:f4:2e:7c:e7:f9:f2:70:26:9a:d7:56:c5: ef:ed:0b:46:56:1b:3c:1b:bf:55:91:f8:5b:8f:10:cb: 50:41:4b:8f:c4:e9:49:bf:ac:6d:11:ef:45:d3:50:14: 45:1c:38:6d:c7:be:33:a6:7f:18:46:b6:ae:92:78:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:91:f2:77:7e:b8:05:c7:49:28:5f:98:ef:48:46:4b: f0:58:01:89:da:6e:70:bc:ad:bd:50:dd:1e:9b:77:5c: 54:93:dc:05:23:d5:ac:c2:1c:ab:a8:04:f0:a2:a1:88: 2b:47:5b:7a:2f:c0:83:d8:55:fd:31:e8:b8:84:0c:48: 9c:20:14:ae:3c:8c:25:e8:59:78:c7:de:54:30:a8:f0: 8f:57:07:58:e2:5f:1d:ea:fa:e5:a7:c6:8d:9a:63:5f: 5e:e3:18:ca:b2:1a:88:57:10:b9:4b:0a:29:0e:a3:da: c7:2b:6b:26:8f:54:17:f2:7c:35:53:48:f7:d5:1c:a1: 7d:6f:88:10:61:53:46:12:76:40:3d:a9:b0:52:bd:16: e5:0e:ed:4c:05:01:cb:e0:55:10:48:b4:4b:85:13:0b: d2:b1:3c:96:0d:7b:d5:82:80:fa:b1:bb:dd:1d:95:f5: 0c:50:9f:43:c4:9b:78:e0:1a:a7:02:4f:97:a7:2a:46: 30:cf:e7:9f:94:93:f0:d6:53:c9:3d:76:0d:25:7b:0e: a6:11:53:52:75:ed:4f:f1:9b:48:e7:3e:8d:d0:b2:75: 2e:97:dc:4c:23:2e:72:9a:15:11:5f:d1:08:66:c7:a0: a0:9f:3c:08:06:0c:e1:65:7d:fb:12:cc:fd:71:2a:23 Fingerprint (SHA-256): 17:1C:B9:A4:6B:29:76:BB:01:4E:0B:08:F9:02:74:3F:64:42:74:EA:DA:48:7D:ED:E7:12:0F:CB:EB:68:95:B9 Fingerprint (SHA1): FF:12:3A:C6:BD:5A:0E:E2:9A:EF:F9:B7:1F:2E:30:0C:0A:BE:B8:DB Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #13973: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13974: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092693 (0x6715d15) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:36:58 2016 Not After : Fri Jan 08 14:36:58 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:5e:0d:61:87:bb:cb:31:e9:7f:74:d5:66:a0:fc:a5: 28:96:10:e3:cf:d6:03:3f:14:3f:9a:5a:f1:40:c5:a8: 73:2a:0a:a5:6a:79:93:71:49:ec:65:6e:ca:bf:6d:5e: 06:c6:3c:db:0b:a7:3f:66:dd:bf:22:80:f7:79:77:13: fb:d7:c1:bb:35:29:0a:b0:36:8b:2c:a7:bd:25:bd:04: 82:7e:8a:bc:16:00:51:ff:32:5b:5f:75:3d:62:f7:f8: 7e:2d:be:cc:57:59:cb:c9:37:a1:01:c6:70:a7:37:48: bc:d8:37:cd:33:4c:09:39:79:93:4b:aa:88:f2:aa:81: d2:2e:b7:f9:2f:d5:21:73:47:59:92:38:53:8e:4e:29: d8:46:f0:dd:37:de:ff:1b:a1:31:60:d9:df:60:72:b2: 9c:66:ed:ca:4d:a8:02:a1:f6:9a:4b:a5:59:fe:d7:83: b2:e9:26:4a:8a:4b:ca:b6:93:6f:6c:7f:7b:c6:bc:6d: 7f:b5:cd:92:e2:bb:49:33:82:a6:9b:0f:3b:43:d5:8d: 32:57:62:a8:1e:f7:9e:c6:d3:83:a1:1f:b8:26:5f:92: fc:95:e3:bc:7d:50:ce:b2:cf:dd:a3:48:79:a0:e6:4b: af:a0:a9:36:15:a5:2b:a8:c2:21:6e:6d:6c:13:85:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:03:5f:4e:93:d5:5a:44:b2:03:94:13:9f:47:86:90: 2c:48:d3:90:20:34:23:8d:94:2f:18:46:9c:42:06:e8: e3:7f:a3:88:2b:55:5e:1c:06:41:cb:b4:61:0e:ff:a2: 67:9f:13:48:1b:23:9d:8c:2e:6e:51:d1:6c:22:48:dc: ee:d2:1e:6c:ef:09:ed:e5:2f:53:6c:9b:8d:6f:a3:40: 0e:81:23:c1:3b:7e:99:d3:da:7c:cf:43:25:08:10:1d: 76:d2:54:8a:e6:5a:8f:13:38:cc:1c:01:04:b6:ca:97: cb:f0:97:c3:bb:e0:01:e3:03:58:c7:d7:b9:f8:33:81: 06:59:de:2b:0f:8b:c0:85:d0:22:f9:5f:40:61:16:98: bc:25:99:6d:8d:d8:b9:39:ef:63:7e:4f:67:dc:d4:9e: a4:5f:6e:42:8d:ad:4c:92:8f:a2:c3:43:63:64:ab:48: f7:87:28:ef:4f:3c:49:d1:28:d1:90:15:e1:9d:b7:22: 94:2b:82:c6:4f:5f:dd:4b:8a:03:ba:b5:52:a1:cd:fb: c9:38:d5:3b:f9:de:ff:16:20:8b:09:a6:6f:54:46:bb: 67:4a:70:a7:fc:f4:c9:2c:1e:5b:a5:3e:6e:eb:81:05: 58:e2:c6:08:b3:0a:b9:6d:98:61:00:8b:ac:a6:4c:0d Fingerprint (SHA-256): 1A:E9:42:BA:AA:03:68:43:B5:AD:40:A8:7E:8E:EE:F8:64:CF:27:D0:6F:1C:3A:5B:7D:D9:04:E3:56:A3:E0:9D Fingerprint (SHA1): 11:8F:78:67:01:F2:FB:1B:A4:F5:8F:0A:4C:E3:66:0C:DD:A5:43:8B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13975: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092693 (0x6715d15) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:36:58 2016 Not After : Fri Jan 08 14:36:58 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:5e:0d:61:87:bb:cb:31:e9:7f:74:d5:66:a0:fc:a5: 28:96:10:e3:cf:d6:03:3f:14:3f:9a:5a:f1:40:c5:a8: 73:2a:0a:a5:6a:79:93:71:49:ec:65:6e:ca:bf:6d:5e: 06:c6:3c:db:0b:a7:3f:66:dd:bf:22:80:f7:79:77:13: fb:d7:c1:bb:35:29:0a:b0:36:8b:2c:a7:bd:25:bd:04: 82:7e:8a:bc:16:00:51:ff:32:5b:5f:75:3d:62:f7:f8: 7e:2d:be:cc:57:59:cb:c9:37:a1:01:c6:70:a7:37:48: bc:d8:37:cd:33:4c:09:39:79:93:4b:aa:88:f2:aa:81: d2:2e:b7:f9:2f:d5:21:73:47:59:92:38:53:8e:4e:29: d8:46:f0:dd:37:de:ff:1b:a1:31:60:d9:df:60:72:b2: 9c:66:ed:ca:4d:a8:02:a1:f6:9a:4b:a5:59:fe:d7:83: b2:e9:26:4a:8a:4b:ca:b6:93:6f:6c:7f:7b:c6:bc:6d: 7f:b5:cd:92:e2:bb:49:33:82:a6:9b:0f:3b:43:d5:8d: 32:57:62:a8:1e:f7:9e:c6:d3:83:a1:1f:b8:26:5f:92: fc:95:e3:bc:7d:50:ce:b2:cf:dd:a3:48:79:a0:e6:4b: af:a0:a9:36:15:a5:2b:a8:c2:21:6e:6d:6c:13:85:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:03:5f:4e:93:d5:5a:44:b2:03:94:13:9f:47:86:90: 2c:48:d3:90:20:34:23:8d:94:2f:18:46:9c:42:06:e8: e3:7f:a3:88:2b:55:5e:1c:06:41:cb:b4:61:0e:ff:a2: 67:9f:13:48:1b:23:9d:8c:2e:6e:51:d1:6c:22:48:dc: ee:d2:1e:6c:ef:09:ed:e5:2f:53:6c:9b:8d:6f:a3:40: 0e:81:23:c1:3b:7e:99:d3:da:7c:cf:43:25:08:10:1d: 76:d2:54:8a:e6:5a:8f:13:38:cc:1c:01:04:b6:ca:97: cb:f0:97:c3:bb:e0:01:e3:03:58:c7:d7:b9:f8:33:81: 06:59:de:2b:0f:8b:c0:85:d0:22:f9:5f:40:61:16:98: bc:25:99:6d:8d:d8:b9:39:ef:63:7e:4f:67:dc:d4:9e: a4:5f:6e:42:8d:ad:4c:92:8f:a2:c3:43:63:64:ab:48: f7:87:28:ef:4f:3c:49:d1:28:d1:90:15:e1:9d:b7:22: 94:2b:82:c6:4f:5f:dd:4b:8a:03:ba:b5:52:a1:cd:fb: c9:38:d5:3b:f9:de:ff:16:20:8b:09:a6:6f:54:46:bb: 67:4a:70:a7:fc:f4:c9:2c:1e:5b:a5:3e:6e:eb:81:05: 58:e2:c6:08:b3:0a:b9:6d:98:61:00:8b:ac:a6:4c:0d Fingerprint (SHA-256): 1A:E9:42:BA:AA:03:68:43:B5:AD:40:A8:7E:8E:EE:F8:64:CF:27:D0:6F:1C:3A:5B:7D:D9:04:E3:56:A3:E0:9D Fingerprint (SHA1): 11:8F:78:67:01:F2:FB:1B:A4:F5:8F:0A:4C:E3:66:0C:DD:A5:43:8B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13976: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092694 (0x6715d16) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:37:03 2016 Not After : Fri Jan 08 14:37:03 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:ca:4c:2e:c0:92:55:aa:73:7e:4e:4d:31:1a:a4:66: 96:21:e1:c1:19:a2:39:5d:8f:fc:92:80:9d:01:f7:6c: 1e:a2:f4:12:3e:c0:8e:9e:0e:8e:e3:b2:46:35:e0:56: 62:dd:4e:b5:84:5c:96:63:ed:03:fb:a1:10:55:7a:72: fe:c9:64:9f:be:e6:b0:ec:90:e3:97:ec:b5:2c:f0:18: c8:ce:26:1b:b3:dd:1a:7a:1f:39:ff:a6:96:3d:a5:d8: 33:ba:29:30:60:4d:45:63:c6:86:09:cc:c3:18:8e:13: 55:bc:68:fc:be:da:a6:c5:34:ff:6d:35:33:0e:bc:54: e7:16:42:a8:e8:d3:d2:52:eb:42:55:20:a7:ec:cf:9f: 87:a9:48:89:5b:a1:31:55:39:69:57:d8:b4:21:cd:4d: cb:62:0d:be:b9:0e:ff:60:fb:d6:fc:52:c9:4b:3d:ff: c6:55:a0:17:9d:83:aa:2b:63:a8:2f:66:a2:c1:55:ad: 43:7a:cd:dc:34:bd:6e:dc:15:e9:39:fc:ff:51:3f:5b: 44:55:35:72:93:6a:99:d8:88:ea:fe:b4:e6:70:13:db: b7:7d:70:4a:41:a0:cd:8a:f4:9d:c7:54:1d:2e:a7:01: 54:c4:37:b5:0d:1e:fd:0a:75:78:3a:a1:1c:9b:9e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:3d:0f:71:73:37:2b:1b:1b:0d:3e:c4:1d:ee:b5:80: 94:5b:eb:dd:54:13:5f:f6:38:bf:55:3e:22:71:9a:a5: 92:01:62:19:6b:a4:24:d5:e1:35:e5:bc:82:8b:f6:22: 3e:0d:d0:b8:95:fa:c6:a0:c6:73:73:f1:b1:f4:81:cd: 74:23:0e:89:28:5d:b4:66:6f:3d:87:a6:27:7c:33:df: d0:ac:c3:5e:dd:ad:6d:4a:47:47:77:04:32:e3:b8:b7: 9a:c1:16:22:d6:44:84:b5:61:23:01:9b:7c:df:c9:8b: c9:c2:7e:b0:c6:8c:d3:40:7f:c9:50:84:98:b1:09:45: f3:be:f8:51:e1:14:0c:64:62:1e:22:c3:ea:75:f8:a5: d9:cb:0a:cd:ba:c6:0d:f6:29:b2:d7:3d:d9:56:ce:31: 63:f5:37:89:08:70:38:af:da:bd:86:e0:e9:93:52:56: 2b:45:c3:ce:5d:a6:8c:d4:1d:89:7d:09:7f:18:48:e0: f9:eb:be:c6:7f:a2:0b:64:8b:65:ac:10:6c:78:a3:72: a1:bd:91:b9:7a:0e:41:0c:44:c1:67:ba:2a:18:ad:43: 1a:54:a4:97:21:17:e8:05:87:e6:b9:33:69:cf:a3:77: 8c:47:3f:cb:7b:34:c3:de:3f:af:65:cb:4f:a8:46:ab Fingerprint (SHA-256): E0:90:5F:4B:99:5B:91:E3:5F:2A:40:79:12:85:33:2F:5A:6F:E3:85:B9:32:F6:6C:27:9D:15:6B:E5:02:AB:9B Fingerprint (SHA1): 04:80:40:D7:9C:F6:30:19:42:AB:47:18:CF:00:92:EC:38:CC:B2:BC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13977: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092694 (0x6715d16) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:37:03 2016 Not After : Fri Jan 08 14:37:03 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:ca:4c:2e:c0:92:55:aa:73:7e:4e:4d:31:1a:a4:66: 96:21:e1:c1:19:a2:39:5d:8f:fc:92:80:9d:01:f7:6c: 1e:a2:f4:12:3e:c0:8e:9e:0e:8e:e3:b2:46:35:e0:56: 62:dd:4e:b5:84:5c:96:63:ed:03:fb:a1:10:55:7a:72: fe:c9:64:9f:be:e6:b0:ec:90:e3:97:ec:b5:2c:f0:18: c8:ce:26:1b:b3:dd:1a:7a:1f:39:ff:a6:96:3d:a5:d8: 33:ba:29:30:60:4d:45:63:c6:86:09:cc:c3:18:8e:13: 55:bc:68:fc:be:da:a6:c5:34:ff:6d:35:33:0e:bc:54: e7:16:42:a8:e8:d3:d2:52:eb:42:55:20:a7:ec:cf:9f: 87:a9:48:89:5b:a1:31:55:39:69:57:d8:b4:21:cd:4d: cb:62:0d:be:b9:0e:ff:60:fb:d6:fc:52:c9:4b:3d:ff: c6:55:a0:17:9d:83:aa:2b:63:a8:2f:66:a2:c1:55:ad: 43:7a:cd:dc:34:bd:6e:dc:15:e9:39:fc:ff:51:3f:5b: 44:55:35:72:93:6a:99:d8:88:ea:fe:b4:e6:70:13:db: b7:7d:70:4a:41:a0:cd:8a:f4:9d:c7:54:1d:2e:a7:01: 54:c4:37:b5:0d:1e:fd:0a:75:78:3a:a1:1c:9b:9e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:3d:0f:71:73:37:2b:1b:1b:0d:3e:c4:1d:ee:b5:80: 94:5b:eb:dd:54:13:5f:f6:38:bf:55:3e:22:71:9a:a5: 92:01:62:19:6b:a4:24:d5:e1:35:e5:bc:82:8b:f6:22: 3e:0d:d0:b8:95:fa:c6:a0:c6:73:73:f1:b1:f4:81:cd: 74:23:0e:89:28:5d:b4:66:6f:3d:87:a6:27:7c:33:df: d0:ac:c3:5e:dd:ad:6d:4a:47:47:77:04:32:e3:b8:b7: 9a:c1:16:22:d6:44:84:b5:61:23:01:9b:7c:df:c9:8b: c9:c2:7e:b0:c6:8c:d3:40:7f:c9:50:84:98:b1:09:45: f3:be:f8:51:e1:14:0c:64:62:1e:22:c3:ea:75:f8:a5: d9:cb:0a:cd:ba:c6:0d:f6:29:b2:d7:3d:d9:56:ce:31: 63:f5:37:89:08:70:38:af:da:bd:86:e0:e9:93:52:56: 2b:45:c3:ce:5d:a6:8c:d4:1d:89:7d:09:7f:18:48:e0: f9:eb:be:c6:7f:a2:0b:64:8b:65:ac:10:6c:78:a3:72: a1:bd:91:b9:7a:0e:41:0c:44:c1:67:ba:2a:18:ad:43: 1a:54:a4:97:21:17:e8:05:87:e6:b9:33:69:cf:a3:77: 8c:47:3f:cb:7b:34:c3:de:3f:af:65:cb:4f:a8:46:ab Fingerprint (SHA-256): E0:90:5F:4B:99:5B:91:E3:5F:2A:40:79:12:85:33:2F:5A:6F:E3:85:B9:32:F6:6C:27:9D:15:6B:E5:02:AB:9B Fingerprint (SHA1): 04:80:40:D7:9C:F6:30:19:42:AB:47:18:CF:00:92:EC:38:CC:B2:BC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13978: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092695 (0x6715d17) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 14:37:11 2016 Not After : Fri Jan 08 14:37:11 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:78:55:d0:d6:6a:90:7d:fb:59:1e:e0:c7:ad:f8:a7: 6d:38:a2:32:4b:ee:89:13:6d:63:0d:19:35:ef:2d:ef: 7f:8a:09:32:a1:12:17:f6:fb:c3:14:7d:b0:84:b0:a8: f3:2e:eb:41:ed:fe:2e:36:e1:e4:76:3b:03:67:32:dd: 44:c2:61:c1:23:8c:fc:bc:41:1e:a8:d8:f2:74:d3:bc: b3:1d:45:78:46:b4:d6:b9:2a:a7:4f:4f:2e:d6:22:d3: 54:f3:a9:86:43:e2:27:ce:b2:70:68:97:fc:54:a1:8c: 79:dd:29:6d:b6:7d:28:df:03:83:46:f5:65:12:28:bb: d4:1c:c4:7f:26:26:9e:a5:c8:3a:24:23:2e:23:8d:67: 1e:f5:49:77:37:20:f6:e9:4d:f8:25:d3:36:43:36:c8: 3d:31:f0:20:bb:6f:d1:ae:28:5d:d8:c5:2c:60:0a:b4: 2a:82:be:ea:f2:6f:9d:ea:6e:2b:8c:6e:1a:0c:51:46: fd:ea:19:00:f4:2e:7c:e7:f9:f2:70:26:9a:d7:56:c5: ef:ed:0b:46:56:1b:3c:1b:bf:55:91:f8:5b:8f:10:cb: 50:41:4b:8f:c4:e9:49:bf:ac:6d:11:ef:45:d3:50:14: 45:1c:38:6d:c7:be:33:a6:7f:18:46:b6:ae:92:78:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:91:f2:77:7e:b8:05:c7:49:28:5f:98:ef:48:46:4b: f0:58:01:89:da:6e:70:bc:ad:bd:50:dd:1e:9b:77:5c: 54:93:dc:05:23:d5:ac:c2:1c:ab:a8:04:f0:a2:a1:88: 2b:47:5b:7a:2f:c0:83:d8:55:fd:31:e8:b8:84:0c:48: 9c:20:14:ae:3c:8c:25:e8:59:78:c7:de:54:30:a8:f0: 8f:57:07:58:e2:5f:1d:ea:fa:e5:a7:c6:8d:9a:63:5f: 5e:e3:18:ca:b2:1a:88:57:10:b9:4b:0a:29:0e:a3:da: c7:2b:6b:26:8f:54:17:f2:7c:35:53:48:f7:d5:1c:a1: 7d:6f:88:10:61:53:46:12:76:40:3d:a9:b0:52:bd:16: e5:0e:ed:4c:05:01:cb:e0:55:10:48:b4:4b:85:13:0b: d2:b1:3c:96:0d:7b:d5:82:80:fa:b1:bb:dd:1d:95:f5: 0c:50:9f:43:c4:9b:78:e0:1a:a7:02:4f:97:a7:2a:46: 30:cf:e7:9f:94:93:f0:d6:53:c9:3d:76:0d:25:7b:0e: a6:11:53:52:75:ed:4f:f1:9b:48:e7:3e:8d:d0:b2:75: 2e:97:dc:4c:23:2e:72:9a:15:11:5f:d1:08:66:c7:a0: a0:9f:3c:08:06:0c:e1:65:7d:fb:12:cc:fd:71:2a:23 Fingerprint (SHA-256): 17:1C:B9:A4:6B:29:76:BB:01:4E:0B:08:F9:02:74:3F:64:42:74:EA:DA:48:7D:ED:E7:12:0F:CB:EB:68:95:B9 Fingerprint (SHA1): FF:12:3A:C6:BD:5A:0E:E2:9A:EF:F9:B7:1F:2E:30:0C:0A:BE:B8:DB Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #13979: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092695 (0x6715d17) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 14:37:11 2016 Not After : Fri Jan 08 14:37:11 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:78:55:d0:d6:6a:90:7d:fb:59:1e:e0:c7:ad:f8:a7: 6d:38:a2:32:4b:ee:89:13:6d:63:0d:19:35:ef:2d:ef: 7f:8a:09:32:a1:12:17:f6:fb:c3:14:7d:b0:84:b0:a8: f3:2e:eb:41:ed:fe:2e:36:e1:e4:76:3b:03:67:32:dd: 44:c2:61:c1:23:8c:fc:bc:41:1e:a8:d8:f2:74:d3:bc: b3:1d:45:78:46:b4:d6:b9:2a:a7:4f:4f:2e:d6:22:d3: 54:f3:a9:86:43:e2:27:ce:b2:70:68:97:fc:54:a1:8c: 79:dd:29:6d:b6:7d:28:df:03:83:46:f5:65:12:28:bb: d4:1c:c4:7f:26:26:9e:a5:c8:3a:24:23:2e:23:8d:67: 1e:f5:49:77:37:20:f6:e9:4d:f8:25:d3:36:43:36:c8: 3d:31:f0:20:bb:6f:d1:ae:28:5d:d8:c5:2c:60:0a:b4: 2a:82:be:ea:f2:6f:9d:ea:6e:2b:8c:6e:1a:0c:51:46: fd:ea:19:00:f4:2e:7c:e7:f9:f2:70:26:9a:d7:56:c5: ef:ed:0b:46:56:1b:3c:1b:bf:55:91:f8:5b:8f:10:cb: 50:41:4b:8f:c4:e9:49:bf:ac:6d:11:ef:45:d3:50:14: 45:1c:38:6d:c7:be:33:a6:7f:18:46:b6:ae:92:78:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:91:f2:77:7e:b8:05:c7:49:28:5f:98:ef:48:46:4b: f0:58:01:89:da:6e:70:bc:ad:bd:50:dd:1e:9b:77:5c: 54:93:dc:05:23:d5:ac:c2:1c:ab:a8:04:f0:a2:a1:88: 2b:47:5b:7a:2f:c0:83:d8:55:fd:31:e8:b8:84:0c:48: 9c:20:14:ae:3c:8c:25:e8:59:78:c7:de:54:30:a8:f0: 8f:57:07:58:e2:5f:1d:ea:fa:e5:a7:c6:8d:9a:63:5f: 5e:e3:18:ca:b2:1a:88:57:10:b9:4b:0a:29:0e:a3:da: c7:2b:6b:26:8f:54:17:f2:7c:35:53:48:f7:d5:1c:a1: 7d:6f:88:10:61:53:46:12:76:40:3d:a9:b0:52:bd:16: e5:0e:ed:4c:05:01:cb:e0:55:10:48:b4:4b:85:13:0b: d2:b1:3c:96:0d:7b:d5:82:80:fa:b1:bb:dd:1d:95:f5: 0c:50:9f:43:c4:9b:78:e0:1a:a7:02:4f:97:a7:2a:46: 30:cf:e7:9f:94:93:f0:d6:53:c9:3d:76:0d:25:7b:0e: a6:11:53:52:75:ed:4f:f1:9b:48:e7:3e:8d:d0:b2:75: 2e:97:dc:4c:23:2e:72:9a:15:11:5f:d1:08:66:c7:a0: a0:9f:3c:08:06:0c:e1:65:7d:fb:12:cc:fd:71:2a:23 Fingerprint (SHA-256): 17:1C:B9:A4:6B:29:76:BB:01:4E:0B:08:F9:02:74:3F:64:42:74:EA:DA:48:7D:ED:E7:12:0F:CB:EB:68:95:B9 Fingerprint (SHA1): FF:12:3A:C6:BD:5A:0E:E2:9A:EF:F9:B7:1F:2E:30:0C:0A:BE:B8:DB Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #13980: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #13981: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092698 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13982: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #13983: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13984: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13985: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108092699 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13986: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13987: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13988: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13989: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108092700 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #13990: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13991: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #13992: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13993: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 108092701 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13994: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13995: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #13996: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13997: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108092702 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13998: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13999: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #14000: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14001: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108092703 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14002: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14003: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #14004: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14005: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 108092704 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14006: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14007: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14008: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #14009: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #14010: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14011: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #14012: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092698 (0x6715d1a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 14:38:08 2016 Not After : Fri Jan 08 14:38:08 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:71:95:85:3a:82:af:25:a9:ca:98:02:c0:88:81:99: 1b:fd:96:2f:55:32:4e:eb:a5:16:40:8f:ca:04:fd:8e: bb:14:ec:79:36:41:09:87:92:a3:38:a3:39:f0:ee:04: 48:95:e8:78:5a:56:52:ac:b2:03:5e:ff:b6:fa:bb:2e: 55:26:ee:96:14:00:cf:28:e0:ef:b2:e4:a8:32:d6:bf: 4a:0f:f6:72:2b:63:c0:f2:82:1b:5d:39:75:c1:88:bf: 2c:0c:53:35:25:05:96:60:6d:64:4e:bf:42:e0:88:98: 31:82:e5:24:c0:b5:d4:72:4c:9f:c4:4b:36:52:4a:69: 5b:83:3e:f4:bc:e8:dd:12:a1:5b:66:04:e4:d4:fe:4f: 3c:35:00:19:87:66:69:f6:f7:6b:17:2c:51:2f:c9:b1: e9:05:2f:57:bb:8d:d8:09:81:a4:34:f4:1e:05:74:7f: 06:91:51:18:a6:e8:95:93:0e:4f:a8:36:72:c7:0f:35: 10:f2:40:24:51:1c:74:02:5b:9b:9c:36:54:b7:c0:3a: 37:f5:26:64:92:d5:53:5a:e8:78:0f:b6:dc:d7:e8:a4: 39:1f:b0:43:c4:d2:a6:0d:c6:5f:5e:a2:0c:35:a6:f6: bd:62:43:62:fd:6b:a7:ee:e6:1c:ce:04:7e:b2:1c:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:4b:5b:f7:c3:60:62:83:9a:fa:b7:7d:d8:66:be:1c: 00:ca:d1:c4:fa:00:02:fc:92:ec:5f:71:a2:21:9f:5c: 4b:30:1d:92:9d:c9:b3:a8:bd:fe:b1:f1:51:2a:2b:c1: 15:41:59:35:da:62:24:84:e3:39:24:ca:0d:4f:9b:5c: 17:fd:11:28:4f:ca:2e:ac:47:0d:d4:8d:bd:1d:e6:06: fc:10:d9:5d:5b:66:8c:44:08:c4:56:12:19:e1:b5:95: 12:fc:2c:c6:4d:b2:62:dc:ef:bd:e1:88:c5:81:73:e3: 14:e0:44:a8:f8:e5:dd:bc:60:ed:05:d8:0f:e1:ba:8d: 70:f8:fe:cb:32:b7:a0:6a:27:54:75:47:5c:31:ed:61: 1f:f1:ff:84:16:ac:82:a1:b3:29:0b:7d:2c:a7:29:db: ab:6a:de:88:56:9e:0f:f3:aa:38:c7:b3:12:97:92:2b: b7:04:c3:6b:a9:1f:48:8d:49:24:73:c3:db:3d:8f:44: 1b:cf:f4:cf:aa:ae:ad:d9:2b:0c:cd:1d:e9:bd:16:ad: 87:34:1b:b0:a0:71:9f:45:27:c2:b7:0c:f9:b2:ef:80: c6:d9:c9:29:5f:43:25:14:81:f6:26:76:b0:87:27:5e: a2:e3:48:83:b2:22:5f:52:10:69:03:05:77:ff:4a:76 Fingerprint (SHA-256): 81:23:08:E8:30:4D:5D:14:96:5A:2C:2E:EA:EA:71:46:64:3C:12:6E:E1:72:1A:FC:67:40:69:D1:38:C3:49:72 Fingerprint (SHA1): 06:48:DB:42:C8:FA:76:F3:20:FC:20:65:47:E9:51:30:5B:08:F4:9A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14013: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14014: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14015: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14016: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092698 (0x6715d1a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 14:38:08 2016 Not After : Fri Jan 08 14:38:08 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:71:95:85:3a:82:af:25:a9:ca:98:02:c0:88:81:99: 1b:fd:96:2f:55:32:4e:eb:a5:16:40:8f:ca:04:fd:8e: bb:14:ec:79:36:41:09:87:92:a3:38:a3:39:f0:ee:04: 48:95:e8:78:5a:56:52:ac:b2:03:5e:ff:b6:fa:bb:2e: 55:26:ee:96:14:00:cf:28:e0:ef:b2:e4:a8:32:d6:bf: 4a:0f:f6:72:2b:63:c0:f2:82:1b:5d:39:75:c1:88:bf: 2c:0c:53:35:25:05:96:60:6d:64:4e:bf:42:e0:88:98: 31:82:e5:24:c0:b5:d4:72:4c:9f:c4:4b:36:52:4a:69: 5b:83:3e:f4:bc:e8:dd:12:a1:5b:66:04:e4:d4:fe:4f: 3c:35:00:19:87:66:69:f6:f7:6b:17:2c:51:2f:c9:b1: e9:05:2f:57:bb:8d:d8:09:81:a4:34:f4:1e:05:74:7f: 06:91:51:18:a6:e8:95:93:0e:4f:a8:36:72:c7:0f:35: 10:f2:40:24:51:1c:74:02:5b:9b:9c:36:54:b7:c0:3a: 37:f5:26:64:92:d5:53:5a:e8:78:0f:b6:dc:d7:e8:a4: 39:1f:b0:43:c4:d2:a6:0d:c6:5f:5e:a2:0c:35:a6:f6: bd:62:43:62:fd:6b:a7:ee:e6:1c:ce:04:7e:b2:1c:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:4b:5b:f7:c3:60:62:83:9a:fa:b7:7d:d8:66:be:1c: 00:ca:d1:c4:fa:00:02:fc:92:ec:5f:71:a2:21:9f:5c: 4b:30:1d:92:9d:c9:b3:a8:bd:fe:b1:f1:51:2a:2b:c1: 15:41:59:35:da:62:24:84:e3:39:24:ca:0d:4f:9b:5c: 17:fd:11:28:4f:ca:2e:ac:47:0d:d4:8d:bd:1d:e6:06: fc:10:d9:5d:5b:66:8c:44:08:c4:56:12:19:e1:b5:95: 12:fc:2c:c6:4d:b2:62:dc:ef:bd:e1:88:c5:81:73:e3: 14:e0:44:a8:f8:e5:dd:bc:60:ed:05:d8:0f:e1:ba:8d: 70:f8:fe:cb:32:b7:a0:6a:27:54:75:47:5c:31:ed:61: 1f:f1:ff:84:16:ac:82:a1:b3:29:0b:7d:2c:a7:29:db: ab:6a:de:88:56:9e:0f:f3:aa:38:c7:b3:12:97:92:2b: b7:04:c3:6b:a9:1f:48:8d:49:24:73:c3:db:3d:8f:44: 1b:cf:f4:cf:aa:ae:ad:d9:2b:0c:cd:1d:e9:bd:16:ad: 87:34:1b:b0:a0:71:9f:45:27:c2:b7:0c:f9:b2:ef:80: c6:d9:c9:29:5f:43:25:14:81:f6:26:76:b0:87:27:5e: a2:e3:48:83:b2:22:5f:52:10:69:03:05:77:ff:4a:76 Fingerprint (SHA-256): 81:23:08:E8:30:4D:5D:14:96:5A:2C:2E:EA:EA:71:46:64:3C:12:6E:E1:72:1A:FC:67:40:69:D1:38:C3:49:72 Fingerprint (SHA1): 06:48:DB:42:C8:FA:76:F3:20:FC:20:65:47:E9:51:30:5B:08:F4:9A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14017: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14018: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #14019: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092705 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14020: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #14021: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14022: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14023: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108092706 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14024: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14025: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #14026: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14027: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 108092707 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14028: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14029: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #14030: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14031: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 108092708 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14032: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14033: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14034: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14035: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 108092709 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14036: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14037: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #14038: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14039: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 108092710 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14040: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14041: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #14042: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14043: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 108092711 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14044: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14045: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14046: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14047: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 108092712 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14048: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14049: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #14050: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14051: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 108092713 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14052: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14053: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #14054: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14055: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 108092714 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14056: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14057: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #14058: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14059: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 108092715 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14060: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14061: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #14062: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14063: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 108092716 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14064: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14065: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #14066: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14067: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 108092717 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14068: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14069: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #14070: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14071: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 108092718 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14072: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14073: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #14074: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14075: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 108092719 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14076: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14077: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #14078: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14079: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 108092720 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14080: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14081: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #14082: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14083: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 108092721 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14084: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14085: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #14086: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14087: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 108092722 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14088: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14089: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #14090: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14091: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 108092723 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14092: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14093: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #14094: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14095: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 108092724 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14096: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14097: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #14098: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14099: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 108092725 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14100: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14101: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #14102: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14103: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 108092726 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14104: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14105: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #14106: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14107: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 108092727 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14108: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14109: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #14110: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14111: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 108092728 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14112: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14113: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #14114: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14115: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 108092729 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14116: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14117: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #14118: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14119: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 108092730 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14120: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14121: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #14122: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14123: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 108092731 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14124: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14125: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #14126: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14127: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 108092732 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14128: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14129: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #14130: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14131: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 108092733 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14132: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14133: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #14134: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14135: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 108092734 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14136: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14137: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14138: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092705 (0x6715d21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 14:40:23 2016 Not After : Fri Jan 08 14:40:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:68:62:2e:b4:5b:b1:84:a8:30:02:9e:c2:df:88:5d: 3b:ac:a2:66:14:07:d0:9d:9e:93:92:ba:d7:3d:bd:75: 51:2c:a8:60:eb:99:1e:9c:96:a7:8d:2e:3e:d1:25:95: 89:84:a1:10:c3:19:2a:a5:de:4d:1e:61:5c:13:a2:96: 88:4f:35:11:18:83:f0:18:5d:90:68:1b:58:9a:39:8a: 35:d0:f8:4d:87:34:9f:4a:86:5d:f4:df:c7:ac:93:da: ca:af:f7:7e:97:21:76:59:51:81:3d:d7:fc:f5:bd:55: b9:34:08:01:3c:15:f8:33:f9:ca:b4:2b:30:8e:eb:46: 07:b7:31:75:84:ea:f0:4b:c2:40:ce:15:5e:04:89:5c: 42:f9:cf:ed:77:fe:37:69:33:64:f6:0a:49:07:11:f9: 6e:07:58:b2:9a:7a:e9:9b:d5:d7:51:1f:77:cf:66:c5: f7:e8:fb:f6:d8:3d:cc:7a:c5:36:a5:64:3b:a5:09:a1: d1:4e:cf:7b:c0:30:37:f5:4b:8d:ee:e7:82:91:05:2c: e9:a5:f5:54:61:bd:e1:a1:9f:1e:38:27:76:02:ec:ce: 67:60:04:b8:17:d2:ce:a5:0d:c2:71:6c:4a:c8:a3:4b: f9:c8:3f:95:cf:bd:db:cc:eb:3a:e6:03:0d:63:8f:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:9b:26:c0:95:09:50:a3:7e:ba:49:6f:5b:f8:2a:a9: f3:30:a4:79:be:68:e9:a4:35:ed:3e:5f:88:43:a1:f1: 23:a3:3e:a2:2e:66:7b:4f:c5:0f:ae:64:f9:0d:6d:cd: 29:7e:a9:30:8c:47:2a:2d:78:62:00:ea:9c:c3:06:1d: 03:42:32:27:c2:12:80:83:c5:a1:dd:80:b0:72:73:56: 53:11:2c:f8:49:a5:2f:da:14:47:49:b5:8c:7a:53:04: 09:40:e4:e3:26:a3:24:fa:13:e3:23:00:8a:d6:8a:17: e6:2e:26:be:ea:2d:84:74:e0:b3:bf:f8:bf:fc:32:b6: b4:4f:c8:52:b4:b7:1c:fe:cf:f8:76:4b:cc:a9:e0:2b: 6d:40:dd:b4:91:f5:a5:1c:13:a0:69:df:be:52:92:67: e2:b5:94:e6:e3:91:66:b9:29:da:43:2f:90:04:9e:44: cc:2a:07:62:91:43:47:0b:97:38:71:c1:94:52:7b:51: df:af:f7:ee:24:71:58:c3:f2:d9:e1:5b:d2:ba:3b:f5: 7d:3a:92:20:84:d4:47:6e:6a:7c:9b:8d:de:ce:f1:ab: b1:87:8e:76:05:a6:53:80:b1:3a:07:8a:da:e0:07:f0: 30:31:55:bf:02:94:fc:73:be:74:59:84:b6:dc:5f:d3 Fingerprint (SHA-256): FE:4A:1F:30:1C:64:79:93:BF:0F:56:5C:0C:1E:24:C6:F9:92:72:8B:AB:43:D5:8F:06:78:E2:29:CB:7C:81:2B Fingerprint (SHA1): 5A:A2:B0:4A:2B:C8:4E:5A:22:A9:EC:C4:14:B5:7D:CF:2A:20:D8:C5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14139: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14140: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092705 (0x6715d21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 14:40:23 2016 Not After : Fri Jan 08 14:40:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:68:62:2e:b4:5b:b1:84:a8:30:02:9e:c2:df:88:5d: 3b:ac:a2:66:14:07:d0:9d:9e:93:92:ba:d7:3d:bd:75: 51:2c:a8:60:eb:99:1e:9c:96:a7:8d:2e:3e:d1:25:95: 89:84:a1:10:c3:19:2a:a5:de:4d:1e:61:5c:13:a2:96: 88:4f:35:11:18:83:f0:18:5d:90:68:1b:58:9a:39:8a: 35:d0:f8:4d:87:34:9f:4a:86:5d:f4:df:c7:ac:93:da: ca:af:f7:7e:97:21:76:59:51:81:3d:d7:fc:f5:bd:55: b9:34:08:01:3c:15:f8:33:f9:ca:b4:2b:30:8e:eb:46: 07:b7:31:75:84:ea:f0:4b:c2:40:ce:15:5e:04:89:5c: 42:f9:cf:ed:77:fe:37:69:33:64:f6:0a:49:07:11:f9: 6e:07:58:b2:9a:7a:e9:9b:d5:d7:51:1f:77:cf:66:c5: f7:e8:fb:f6:d8:3d:cc:7a:c5:36:a5:64:3b:a5:09:a1: d1:4e:cf:7b:c0:30:37:f5:4b:8d:ee:e7:82:91:05:2c: e9:a5:f5:54:61:bd:e1:a1:9f:1e:38:27:76:02:ec:ce: 67:60:04:b8:17:d2:ce:a5:0d:c2:71:6c:4a:c8:a3:4b: f9:c8:3f:95:cf:bd:db:cc:eb:3a:e6:03:0d:63:8f:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:9b:26:c0:95:09:50:a3:7e:ba:49:6f:5b:f8:2a:a9: f3:30:a4:79:be:68:e9:a4:35:ed:3e:5f:88:43:a1:f1: 23:a3:3e:a2:2e:66:7b:4f:c5:0f:ae:64:f9:0d:6d:cd: 29:7e:a9:30:8c:47:2a:2d:78:62:00:ea:9c:c3:06:1d: 03:42:32:27:c2:12:80:83:c5:a1:dd:80:b0:72:73:56: 53:11:2c:f8:49:a5:2f:da:14:47:49:b5:8c:7a:53:04: 09:40:e4:e3:26:a3:24:fa:13:e3:23:00:8a:d6:8a:17: e6:2e:26:be:ea:2d:84:74:e0:b3:bf:f8:bf:fc:32:b6: b4:4f:c8:52:b4:b7:1c:fe:cf:f8:76:4b:cc:a9:e0:2b: 6d:40:dd:b4:91:f5:a5:1c:13:a0:69:df:be:52:92:67: e2:b5:94:e6:e3:91:66:b9:29:da:43:2f:90:04:9e:44: cc:2a:07:62:91:43:47:0b:97:38:71:c1:94:52:7b:51: df:af:f7:ee:24:71:58:c3:f2:d9:e1:5b:d2:ba:3b:f5: 7d:3a:92:20:84:d4:47:6e:6a:7c:9b:8d:de:ce:f1:ab: b1:87:8e:76:05:a6:53:80:b1:3a:07:8a:da:e0:07:f0: 30:31:55:bf:02:94:fc:73:be:74:59:84:b6:dc:5f:d3 Fingerprint (SHA-256): FE:4A:1F:30:1C:64:79:93:BF:0F:56:5C:0C:1E:24:C6:F9:92:72:8B:AB:43:D5:8F:06:78:E2:29:CB:7C:81:2B Fingerprint (SHA1): 5A:A2:B0:4A:2B:C8:4E:5A:22:A9:EC:C4:14:B5:7D:CF:2A:20:D8:C5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14141: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14142: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14143: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14144: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092705 (0x6715d21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 14:40:23 2016 Not After : Fri Jan 08 14:40:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:68:62:2e:b4:5b:b1:84:a8:30:02:9e:c2:df:88:5d: 3b:ac:a2:66:14:07:d0:9d:9e:93:92:ba:d7:3d:bd:75: 51:2c:a8:60:eb:99:1e:9c:96:a7:8d:2e:3e:d1:25:95: 89:84:a1:10:c3:19:2a:a5:de:4d:1e:61:5c:13:a2:96: 88:4f:35:11:18:83:f0:18:5d:90:68:1b:58:9a:39:8a: 35:d0:f8:4d:87:34:9f:4a:86:5d:f4:df:c7:ac:93:da: ca:af:f7:7e:97:21:76:59:51:81:3d:d7:fc:f5:bd:55: b9:34:08:01:3c:15:f8:33:f9:ca:b4:2b:30:8e:eb:46: 07:b7:31:75:84:ea:f0:4b:c2:40:ce:15:5e:04:89:5c: 42:f9:cf:ed:77:fe:37:69:33:64:f6:0a:49:07:11:f9: 6e:07:58:b2:9a:7a:e9:9b:d5:d7:51:1f:77:cf:66:c5: f7:e8:fb:f6:d8:3d:cc:7a:c5:36:a5:64:3b:a5:09:a1: d1:4e:cf:7b:c0:30:37:f5:4b:8d:ee:e7:82:91:05:2c: e9:a5:f5:54:61:bd:e1:a1:9f:1e:38:27:76:02:ec:ce: 67:60:04:b8:17:d2:ce:a5:0d:c2:71:6c:4a:c8:a3:4b: f9:c8:3f:95:cf:bd:db:cc:eb:3a:e6:03:0d:63:8f:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:9b:26:c0:95:09:50:a3:7e:ba:49:6f:5b:f8:2a:a9: f3:30:a4:79:be:68:e9:a4:35:ed:3e:5f:88:43:a1:f1: 23:a3:3e:a2:2e:66:7b:4f:c5:0f:ae:64:f9:0d:6d:cd: 29:7e:a9:30:8c:47:2a:2d:78:62:00:ea:9c:c3:06:1d: 03:42:32:27:c2:12:80:83:c5:a1:dd:80:b0:72:73:56: 53:11:2c:f8:49:a5:2f:da:14:47:49:b5:8c:7a:53:04: 09:40:e4:e3:26:a3:24:fa:13:e3:23:00:8a:d6:8a:17: e6:2e:26:be:ea:2d:84:74:e0:b3:bf:f8:bf:fc:32:b6: b4:4f:c8:52:b4:b7:1c:fe:cf:f8:76:4b:cc:a9:e0:2b: 6d:40:dd:b4:91:f5:a5:1c:13:a0:69:df:be:52:92:67: e2:b5:94:e6:e3:91:66:b9:29:da:43:2f:90:04:9e:44: cc:2a:07:62:91:43:47:0b:97:38:71:c1:94:52:7b:51: df:af:f7:ee:24:71:58:c3:f2:d9:e1:5b:d2:ba:3b:f5: 7d:3a:92:20:84:d4:47:6e:6a:7c:9b:8d:de:ce:f1:ab: b1:87:8e:76:05:a6:53:80:b1:3a:07:8a:da:e0:07:f0: 30:31:55:bf:02:94:fc:73:be:74:59:84:b6:dc:5f:d3 Fingerprint (SHA-256): FE:4A:1F:30:1C:64:79:93:BF:0F:56:5C:0C:1E:24:C6:F9:92:72:8B:AB:43:D5:8F:06:78:E2:29:CB:7C:81:2B Fingerprint (SHA1): 5A:A2:B0:4A:2B:C8:4E:5A:22:A9:EC:C4:14:B5:7D:CF:2A:20:D8:C5 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14145: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14146: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14147: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14148: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092705 (0x6715d21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 14:40:23 2016 Not After : Fri Jan 08 14:40:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:68:62:2e:b4:5b:b1:84:a8:30:02:9e:c2:df:88:5d: 3b:ac:a2:66:14:07:d0:9d:9e:93:92:ba:d7:3d:bd:75: 51:2c:a8:60:eb:99:1e:9c:96:a7:8d:2e:3e:d1:25:95: 89:84:a1:10:c3:19:2a:a5:de:4d:1e:61:5c:13:a2:96: 88:4f:35:11:18:83:f0:18:5d:90:68:1b:58:9a:39:8a: 35:d0:f8:4d:87:34:9f:4a:86:5d:f4:df:c7:ac:93:da: ca:af:f7:7e:97:21:76:59:51:81:3d:d7:fc:f5:bd:55: b9:34:08:01:3c:15:f8:33:f9:ca:b4:2b:30:8e:eb:46: 07:b7:31:75:84:ea:f0:4b:c2:40:ce:15:5e:04:89:5c: 42:f9:cf:ed:77:fe:37:69:33:64:f6:0a:49:07:11:f9: 6e:07:58:b2:9a:7a:e9:9b:d5:d7:51:1f:77:cf:66:c5: f7:e8:fb:f6:d8:3d:cc:7a:c5:36:a5:64:3b:a5:09:a1: d1:4e:cf:7b:c0:30:37:f5:4b:8d:ee:e7:82:91:05:2c: e9:a5:f5:54:61:bd:e1:a1:9f:1e:38:27:76:02:ec:ce: 67:60:04:b8:17:d2:ce:a5:0d:c2:71:6c:4a:c8:a3:4b: f9:c8:3f:95:cf:bd:db:cc:eb:3a:e6:03:0d:63:8f:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:9b:26:c0:95:09:50:a3:7e:ba:49:6f:5b:f8:2a:a9: f3:30:a4:79:be:68:e9:a4:35:ed:3e:5f:88:43:a1:f1: 23:a3:3e:a2:2e:66:7b:4f:c5:0f:ae:64:f9:0d:6d:cd: 29:7e:a9:30:8c:47:2a:2d:78:62:00:ea:9c:c3:06:1d: 03:42:32:27:c2:12:80:83:c5:a1:dd:80:b0:72:73:56: 53:11:2c:f8:49:a5:2f:da:14:47:49:b5:8c:7a:53:04: 09:40:e4:e3:26:a3:24:fa:13:e3:23:00:8a:d6:8a:17: e6:2e:26:be:ea:2d:84:74:e0:b3:bf:f8:bf:fc:32:b6: b4:4f:c8:52:b4:b7:1c:fe:cf:f8:76:4b:cc:a9:e0:2b: 6d:40:dd:b4:91:f5:a5:1c:13:a0:69:df:be:52:92:67: e2:b5:94:e6:e3:91:66:b9:29:da:43:2f:90:04:9e:44: cc:2a:07:62:91:43:47:0b:97:38:71:c1:94:52:7b:51: df:af:f7:ee:24:71:58:c3:f2:d9:e1:5b:d2:ba:3b:f5: 7d:3a:92:20:84:d4:47:6e:6a:7c:9b:8d:de:ce:f1:ab: b1:87:8e:76:05:a6:53:80:b1:3a:07:8a:da:e0:07:f0: 30:31:55:bf:02:94:fc:73:be:74:59:84:b6:dc:5f:d3 Fingerprint (SHA-256): FE:4A:1F:30:1C:64:79:93:BF:0F:56:5C:0C:1E:24:C6:F9:92:72:8B:AB:43:D5:8F:06:78:E2:29:CB:7C:81:2B Fingerprint (SHA1): 5A:A2:B0:4A:2B:C8:4E:5A:22:A9:EC:C4:14:B5:7D:CF:2A:20:D8:C5 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14149: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092705 (0x6715d21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 14:40:23 2016 Not After : Fri Jan 08 14:40:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:68:62:2e:b4:5b:b1:84:a8:30:02:9e:c2:df:88:5d: 3b:ac:a2:66:14:07:d0:9d:9e:93:92:ba:d7:3d:bd:75: 51:2c:a8:60:eb:99:1e:9c:96:a7:8d:2e:3e:d1:25:95: 89:84:a1:10:c3:19:2a:a5:de:4d:1e:61:5c:13:a2:96: 88:4f:35:11:18:83:f0:18:5d:90:68:1b:58:9a:39:8a: 35:d0:f8:4d:87:34:9f:4a:86:5d:f4:df:c7:ac:93:da: ca:af:f7:7e:97:21:76:59:51:81:3d:d7:fc:f5:bd:55: b9:34:08:01:3c:15:f8:33:f9:ca:b4:2b:30:8e:eb:46: 07:b7:31:75:84:ea:f0:4b:c2:40:ce:15:5e:04:89:5c: 42:f9:cf:ed:77:fe:37:69:33:64:f6:0a:49:07:11:f9: 6e:07:58:b2:9a:7a:e9:9b:d5:d7:51:1f:77:cf:66:c5: f7:e8:fb:f6:d8:3d:cc:7a:c5:36:a5:64:3b:a5:09:a1: d1:4e:cf:7b:c0:30:37:f5:4b:8d:ee:e7:82:91:05:2c: e9:a5:f5:54:61:bd:e1:a1:9f:1e:38:27:76:02:ec:ce: 67:60:04:b8:17:d2:ce:a5:0d:c2:71:6c:4a:c8:a3:4b: f9:c8:3f:95:cf:bd:db:cc:eb:3a:e6:03:0d:63:8f:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:9b:26:c0:95:09:50:a3:7e:ba:49:6f:5b:f8:2a:a9: f3:30:a4:79:be:68:e9:a4:35:ed:3e:5f:88:43:a1:f1: 23:a3:3e:a2:2e:66:7b:4f:c5:0f:ae:64:f9:0d:6d:cd: 29:7e:a9:30:8c:47:2a:2d:78:62:00:ea:9c:c3:06:1d: 03:42:32:27:c2:12:80:83:c5:a1:dd:80:b0:72:73:56: 53:11:2c:f8:49:a5:2f:da:14:47:49:b5:8c:7a:53:04: 09:40:e4:e3:26:a3:24:fa:13:e3:23:00:8a:d6:8a:17: e6:2e:26:be:ea:2d:84:74:e0:b3:bf:f8:bf:fc:32:b6: b4:4f:c8:52:b4:b7:1c:fe:cf:f8:76:4b:cc:a9:e0:2b: 6d:40:dd:b4:91:f5:a5:1c:13:a0:69:df:be:52:92:67: e2:b5:94:e6:e3:91:66:b9:29:da:43:2f:90:04:9e:44: cc:2a:07:62:91:43:47:0b:97:38:71:c1:94:52:7b:51: df:af:f7:ee:24:71:58:c3:f2:d9:e1:5b:d2:ba:3b:f5: 7d:3a:92:20:84:d4:47:6e:6a:7c:9b:8d:de:ce:f1:ab: b1:87:8e:76:05:a6:53:80:b1:3a:07:8a:da:e0:07:f0: 30:31:55:bf:02:94:fc:73:be:74:59:84:b6:dc:5f:d3 Fingerprint (SHA-256): FE:4A:1F:30:1C:64:79:93:BF:0F:56:5C:0C:1E:24:C6:F9:92:72:8B:AB:43:D5:8F:06:78:E2:29:CB:7C:81:2B Fingerprint (SHA1): 5A:A2:B0:4A:2B:C8:4E:5A:22:A9:EC:C4:14:B5:7D:CF:2A:20:D8:C5 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14150: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14151: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092705 (0x6715d21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 14:40:23 2016 Not After : Fri Jan 08 14:40:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:68:62:2e:b4:5b:b1:84:a8:30:02:9e:c2:df:88:5d: 3b:ac:a2:66:14:07:d0:9d:9e:93:92:ba:d7:3d:bd:75: 51:2c:a8:60:eb:99:1e:9c:96:a7:8d:2e:3e:d1:25:95: 89:84:a1:10:c3:19:2a:a5:de:4d:1e:61:5c:13:a2:96: 88:4f:35:11:18:83:f0:18:5d:90:68:1b:58:9a:39:8a: 35:d0:f8:4d:87:34:9f:4a:86:5d:f4:df:c7:ac:93:da: ca:af:f7:7e:97:21:76:59:51:81:3d:d7:fc:f5:bd:55: b9:34:08:01:3c:15:f8:33:f9:ca:b4:2b:30:8e:eb:46: 07:b7:31:75:84:ea:f0:4b:c2:40:ce:15:5e:04:89:5c: 42:f9:cf:ed:77:fe:37:69:33:64:f6:0a:49:07:11:f9: 6e:07:58:b2:9a:7a:e9:9b:d5:d7:51:1f:77:cf:66:c5: f7:e8:fb:f6:d8:3d:cc:7a:c5:36:a5:64:3b:a5:09:a1: d1:4e:cf:7b:c0:30:37:f5:4b:8d:ee:e7:82:91:05:2c: e9:a5:f5:54:61:bd:e1:a1:9f:1e:38:27:76:02:ec:ce: 67:60:04:b8:17:d2:ce:a5:0d:c2:71:6c:4a:c8:a3:4b: f9:c8:3f:95:cf:bd:db:cc:eb:3a:e6:03:0d:63:8f:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:9b:26:c0:95:09:50:a3:7e:ba:49:6f:5b:f8:2a:a9: f3:30:a4:79:be:68:e9:a4:35:ed:3e:5f:88:43:a1:f1: 23:a3:3e:a2:2e:66:7b:4f:c5:0f:ae:64:f9:0d:6d:cd: 29:7e:a9:30:8c:47:2a:2d:78:62:00:ea:9c:c3:06:1d: 03:42:32:27:c2:12:80:83:c5:a1:dd:80:b0:72:73:56: 53:11:2c:f8:49:a5:2f:da:14:47:49:b5:8c:7a:53:04: 09:40:e4:e3:26:a3:24:fa:13:e3:23:00:8a:d6:8a:17: e6:2e:26:be:ea:2d:84:74:e0:b3:bf:f8:bf:fc:32:b6: b4:4f:c8:52:b4:b7:1c:fe:cf:f8:76:4b:cc:a9:e0:2b: 6d:40:dd:b4:91:f5:a5:1c:13:a0:69:df:be:52:92:67: e2:b5:94:e6:e3:91:66:b9:29:da:43:2f:90:04:9e:44: cc:2a:07:62:91:43:47:0b:97:38:71:c1:94:52:7b:51: df:af:f7:ee:24:71:58:c3:f2:d9:e1:5b:d2:ba:3b:f5: 7d:3a:92:20:84:d4:47:6e:6a:7c:9b:8d:de:ce:f1:ab: b1:87:8e:76:05:a6:53:80:b1:3a:07:8a:da:e0:07:f0: 30:31:55:bf:02:94:fc:73:be:74:59:84:b6:dc:5f:d3 Fingerprint (SHA-256): FE:4A:1F:30:1C:64:79:93:BF:0F:56:5C:0C:1E:24:C6:F9:92:72:8B:AB:43:D5:8F:06:78:E2:29:CB:7C:81:2B Fingerprint (SHA1): 5A:A2:B0:4A:2B:C8:4E:5A:22:A9:EC:C4:14:B5:7D:CF:2A:20:D8:C5 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14152: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14153: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14154: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14155: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092705 (0x6715d21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 14:40:23 2016 Not After : Fri Jan 08 14:40:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:68:62:2e:b4:5b:b1:84:a8:30:02:9e:c2:df:88:5d: 3b:ac:a2:66:14:07:d0:9d:9e:93:92:ba:d7:3d:bd:75: 51:2c:a8:60:eb:99:1e:9c:96:a7:8d:2e:3e:d1:25:95: 89:84:a1:10:c3:19:2a:a5:de:4d:1e:61:5c:13:a2:96: 88:4f:35:11:18:83:f0:18:5d:90:68:1b:58:9a:39:8a: 35:d0:f8:4d:87:34:9f:4a:86:5d:f4:df:c7:ac:93:da: ca:af:f7:7e:97:21:76:59:51:81:3d:d7:fc:f5:bd:55: b9:34:08:01:3c:15:f8:33:f9:ca:b4:2b:30:8e:eb:46: 07:b7:31:75:84:ea:f0:4b:c2:40:ce:15:5e:04:89:5c: 42:f9:cf:ed:77:fe:37:69:33:64:f6:0a:49:07:11:f9: 6e:07:58:b2:9a:7a:e9:9b:d5:d7:51:1f:77:cf:66:c5: f7:e8:fb:f6:d8:3d:cc:7a:c5:36:a5:64:3b:a5:09:a1: d1:4e:cf:7b:c0:30:37:f5:4b:8d:ee:e7:82:91:05:2c: e9:a5:f5:54:61:bd:e1:a1:9f:1e:38:27:76:02:ec:ce: 67:60:04:b8:17:d2:ce:a5:0d:c2:71:6c:4a:c8:a3:4b: f9:c8:3f:95:cf:bd:db:cc:eb:3a:e6:03:0d:63:8f:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:9b:26:c0:95:09:50:a3:7e:ba:49:6f:5b:f8:2a:a9: f3:30:a4:79:be:68:e9:a4:35:ed:3e:5f:88:43:a1:f1: 23:a3:3e:a2:2e:66:7b:4f:c5:0f:ae:64:f9:0d:6d:cd: 29:7e:a9:30:8c:47:2a:2d:78:62:00:ea:9c:c3:06:1d: 03:42:32:27:c2:12:80:83:c5:a1:dd:80:b0:72:73:56: 53:11:2c:f8:49:a5:2f:da:14:47:49:b5:8c:7a:53:04: 09:40:e4:e3:26:a3:24:fa:13:e3:23:00:8a:d6:8a:17: e6:2e:26:be:ea:2d:84:74:e0:b3:bf:f8:bf:fc:32:b6: b4:4f:c8:52:b4:b7:1c:fe:cf:f8:76:4b:cc:a9:e0:2b: 6d:40:dd:b4:91:f5:a5:1c:13:a0:69:df:be:52:92:67: e2:b5:94:e6:e3:91:66:b9:29:da:43:2f:90:04:9e:44: cc:2a:07:62:91:43:47:0b:97:38:71:c1:94:52:7b:51: df:af:f7:ee:24:71:58:c3:f2:d9:e1:5b:d2:ba:3b:f5: 7d:3a:92:20:84:d4:47:6e:6a:7c:9b:8d:de:ce:f1:ab: b1:87:8e:76:05:a6:53:80:b1:3a:07:8a:da:e0:07:f0: 30:31:55:bf:02:94:fc:73:be:74:59:84:b6:dc:5f:d3 Fingerprint (SHA-256): FE:4A:1F:30:1C:64:79:93:BF:0F:56:5C:0C:1E:24:C6:F9:92:72:8B:AB:43:D5:8F:06:78:E2:29:CB:7C:81:2B Fingerprint (SHA1): 5A:A2:B0:4A:2B:C8:4E:5A:22:A9:EC:C4:14:B5:7D:CF:2A:20:D8:C5 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14156: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092705 (0x6715d21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 14:40:23 2016 Not After : Fri Jan 08 14:40:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:68:62:2e:b4:5b:b1:84:a8:30:02:9e:c2:df:88:5d: 3b:ac:a2:66:14:07:d0:9d:9e:93:92:ba:d7:3d:bd:75: 51:2c:a8:60:eb:99:1e:9c:96:a7:8d:2e:3e:d1:25:95: 89:84:a1:10:c3:19:2a:a5:de:4d:1e:61:5c:13:a2:96: 88:4f:35:11:18:83:f0:18:5d:90:68:1b:58:9a:39:8a: 35:d0:f8:4d:87:34:9f:4a:86:5d:f4:df:c7:ac:93:da: ca:af:f7:7e:97:21:76:59:51:81:3d:d7:fc:f5:bd:55: b9:34:08:01:3c:15:f8:33:f9:ca:b4:2b:30:8e:eb:46: 07:b7:31:75:84:ea:f0:4b:c2:40:ce:15:5e:04:89:5c: 42:f9:cf:ed:77:fe:37:69:33:64:f6:0a:49:07:11:f9: 6e:07:58:b2:9a:7a:e9:9b:d5:d7:51:1f:77:cf:66:c5: f7:e8:fb:f6:d8:3d:cc:7a:c5:36:a5:64:3b:a5:09:a1: d1:4e:cf:7b:c0:30:37:f5:4b:8d:ee:e7:82:91:05:2c: e9:a5:f5:54:61:bd:e1:a1:9f:1e:38:27:76:02:ec:ce: 67:60:04:b8:17:d2:ce:a5:0d:c2:71:6c:4a:c8:a3:4b: f9:c8:3f:95:cf:bd:db:cc:eb:3a:e6:03:0d:63:8f:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:9b:26:c0:95:09:50:a3:7e:ba:49:6f:5b:f8:2a:a9: f3:30:a4:79:be:68:e9:a4:35:ed:3e:5f:88:43:a1:f1: 23:a3:3e:a2:2e:66:7b:4f:c5:0f:ae:64:f9:0d:6d:cd: 29:7e:a9:30:8c:47:2a:2d:78:62:00:ea:9c:c3:06:1d: 03:42:32:27:c2:12:80:83:c5:a1:dd:80:b0:72:73:56: 53:11:2c:f8:49:a5:2f:da:14:47:49:b5:8c:7a:53:04: 09:40:e4:e3:26:a3:24:fa:13:e3:23:00:8a:d6:8a:17: e6:2e:26:be:ea:2d:84:74:e0:b3:bf:f8:bf:fc:32:b6: b4:4f:c8:52:b4:b7:1c:fe:cf:f8:76:4b:cc:a9:e0:2b: 6d:40:dd:b4:91:f5:a5:1c:13:a0:69:df:be:52:92:67: e2:b5:94:e6:e3:91:66:b9:29:da:43:2f:90:04:9e:44: cc:2a:07:62:91:43:47:0b:97:38:71:c1:94:52:7b:51: df:af:f7:ee:24:71:58:c3:f2:d9:e1:5b:d2:ba:3b:f5: 7d:3a:92:20:84:d4:47:6e:6a:7c:9b:8d:de:ce:f1:ab: b1:87:8e:76:05:a6:53:80:b1:3a:07:8a:da:e0:07:f0: 30:31:55:bf:02:94:fc:73:be:74:59:84:b6:dc:5f:d3 Fingerprint (SHA-256): FE:4A:1F:30:1C:64:79:93:BF:0F:56:5C:0C:1E:24:C6:F9:92:72:8B:AB:43:D5:8F:06:78:E2:29:CB:7C:81:2B Fingerprint (SHA1): 5A:A2:B0:4A:2B:C8:4E:5A:22:A9:EC:C4:14:B5:7D:CF:2A:20:D8:C5 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14157: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092705 (0x6715d21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 14:40:23 2016 Not After : Fri Jan 08 14:40:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:68:62:2e:b4:5b:b1:84:a8:30:02:9e:c2:df:88:5d: 3b:ac:a2:66:14:07:d0:9d:9e:93:92:ba:d7:3d:bd:75: 51:2c:a8:60:eb:99:1e:9c:96:a7:8d:2e:3e:d1:25:95: 89:84:a1:10:c3:19:2a:a5:de:4d:1e:61:5c:13:a2:96: 88:4f:35:11:18:83:f0:18:5d:90:68:1b:58:9a:39:8a: 35:d0:f8:4d:87:34:9f:4a:86:5d:f4:df:c7:ac:93:da: ca:af:f7:7e:97:21:76:59:51:81:3d:d7:fc:f5:bd:55: b9:34:08:01:3c:15:f8:33:f9:ca:b4:2b:30:8e:eb:46: 07:b7:31:75:84:ea:f0:4b:c2:40:ce:15:5e:04:89:5c: 42:f9:cf:ed:77:fe:37:69:33:64:f6:0a:49:07:11:f9: 6e:07:58:b2:9a:7a:e9:9b:d5:d7:51:1f:77:cf:66:c5: f7:e8:fb:f6:d8:3d:cc:7a:c5:36:a5:64:3b:a5:09:a1: d1:4e:cf:7b:c0:30:37:f5:4b:8d:ee:e7:82:91:05:2c: e9:a5:f5:54:61:bd:e1:a1:9f:1e:38:27:76:02:ec:ce: 67:60:04:b8:17:d2:ce:a5:0d:c2:71:6c:4a:c8:a3:4b: f9:c8:3f:95:cf:bd:db:cc:eb:3a:e6:03:0d:63:8f:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:9b:26:c0:95:09:50:a3:7e:ba:49:6f:5b:f8:2a:a9: f3:30:a4:79:be:68:e9:a4:35:ed:3e:5f:88:43:a1:f1: 23:a3:3e:a2:2e:66:7b:4f:c5:0f:ae:64:f9:0d:6d:cd: 29:7e:a9:30:8c:47:2a:2d:78:62:00:ea:9c:c3:06:1d: 03:42:32:27:c2:12:80:83:c5:a1:dd:80:b0:72:73:56: 53:11:2c:f8:49:a5:2f:da:14:47:49:b5:8c:7a:53:04: 09:40:e4:e3:26:a3:24:fa:13:e3:23:00:8a:d6:8a:17: e6:2e:26:be:ea:2d:84:74:e0:b3:bf:f8:bf:fc:32:b6: b4:4f:c8:52:b4:b7:1c:fe:cf:f8:76:4b:cc:a9:e0:2b: 6d:40:dd:b4:91:f5:a5:1c:13:a0:69:df:be:52:92:67: e2:b5:94:e6:e3:91:66:b9:29:da:43:2f:90:04:9e:44: cc:2a:07:62:91:43:47:0b:97:38:71:c1:94:52:7b:51: df:af:f7:ee:24:71:58:c3:f2:d9:e1:5b:d2:ba:3b:f5: 7d:3a:92:20:84:d4:47:6e:6a:7c:9b:8d:de:ce:f1:ab: b1:87:8e:76:05:a6:53:80:b1:3a:07:8a:da:e0:07:f0: 30:31:55:bf:02:94:fc:73:be:74:59:84:b6:dc:5f:d3 Fingerprint (SHA-256): FE:4A:1F:30:1C:64:79:93:BF:0F:56:5C:0C:1E:24:C6:F9:92:72:8B:AB:43:D5:8F:06:78:E2:29:CB:7C:81:2B Fingerprint (SHA1): 5A:A2:B0:4A:2B:C8:4E:5A:22:A9:EC:C4:14:B5:7D:CF:2A:20:D8:C5 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14158: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092705 (0x6715d21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 14:40:23 2016 Not After : Fri Jan 08 14:40:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:68:62:2e:b4:5b:b1:84:a8:30:02:9e:c2:df:88:5d: 3b:ac:a2:66:14:07:d0:9d:9e:93:92:ba:d7:3d:bd:75: 51:2c:a8:60:eb:99:1e:9c:96:a7:8d:2e:3e:d1:25:95: 89:84:a1:10:c3:19:2a:a5:de:4d:1e:61:5c:13:a2:96: 88:4f:35:11:18:83:f0:18:5d:90:68:1b:58:9a:39:8a: 35:d0:f8:4d:87:34:9f:4a:86:5d:f4:df:c7:ac:93:da: ca:af:f7:7e:97:21:76:59:51:81:3d:d7:fc:f5:bd:55: b9:34:08:01:3c:15:f8:33:f9:ca:b4:2b:30:8e:eb:46: 07:b7:31:75:84:ea:f0:4b:c2:40:ce:15:5e:04:89:5c: 42:f9:cf:ed:77:fe:37:69:33:64:f6:0a:49:07:11:f9: 6e:07:58:b2:9a:7a:e9:9b:d5:d7:51:1f:77:cf:66:c5: f7:e8:fb:f6:d8:3d:cc:7a:c5:36:a5:64:3b:a5:09:a1: d1:4e:cf:7b:c0:30:37:f5:4b:8d:ee:e7:82:91:05:2c: e9:a5:f5:54:61:bd:e1:a1:9f:1e:38:27:76:02:ec:ce: 67:60:04:b8:17:d2:ce:a5:0d:c2:71:6c:4a:c8:a3:4b: f9:c8:3f:95:cf:bd:db:cc:eb:3a:e6:03:0d:63:8f:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:9b:26:c0:95:09:50:a3:7e:ba:49:6f:5b:f8:2a:a9: f3:30:a4:79:be:68:e9:a4:35:ed:3e:5f:88:43:a1:f1: 23:a3:3e:a2:2e:66:7b:4f:c5:0f:ae:64:f9:0d:6d:cd: 29:7e:a9:30:8c:47:2a:2d:78:62:00:ea:9c:c3:06:1d: 03:42:32:27:c2:12:80:83:c5:a1:dd:80:b0:72:73:56: 53:11:2c:f8:49:a5:2f:da:14:47:49:b5:8c:7a:53:04: 09:40:e4:e3:26:a3:24:fa:13:e3:23:00:8a:d6:8a:17: e6:2e:26:be:ea:2d:84:74:e0:b3:bf:f8:bf:fc:32:b6: b4:4f:c8:52:b4:b7:1c:fe:cf:f8:76:4b:cc:a9:e0:2b: 6d:40:dd:b4:91:f5:a5:1c:13:a0:69:df:be:52:92:67: e2:b5:94:e6:e3:91:66:b9:29:da:43:2f:90:04:9e:44: cc:2a:07:62:91:43:47:0b:97:38:71:c1:94:52:7b:51: df:af:f7:ee:24:71:58:c3:f2:d9:e1:5b:d2:ba:3b:f5: 7d:3a:92:20:84:d4:47:6e:6a:7c:9b:8d:de:ce:f1:ab: b1:87:8e:76:05:a6:53:80:b1:3a:07:8a:da:e0:07:f0: 30:31:55:bf:02:94:fc:73:be:74:59:84:b6:dc:5f:d3 Fingerprint (SHA-256): FE:4A:1F:30:1C:64:79:93:BF:0F:56:5C:0C:1E:24:C6:F9:92:72:8B:AB:43:D5:8F:06:78:E2:29:CB:7C:81:2B Fingerprint (SHA1): 5A:A2:B0:4A:2B:C8:4E:5A:22:A9:EC:C4:14:B5:7D:CF:2A:20:D8:C5 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14159: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092705 (0x6715d21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 14:40:23 2016 Not After : Fri Jan 08 14:40:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:68:62:2e:b4:5b:b1:84:a8:30:02:9e:c2:df:88:5d: 3b:ac:a2:66:14:07:d0:9d:9e:93:92:ba:d7:3d:bd:75: 51:2c:a8:60:eb:99:1e:9c:96:a7:8d:2e:3e:d1:25:95: 89:84:a1:10:c3:19:2a:a5:de:4d:1e:61:5c:13:a2:96: 88:4f:35:11:18:83:f0:18:5d:90:68:1b:58:9a:39:8a: 35:d0:f8:4d:87:34:9f:4a:86:5d:f4:df:c7:ac:93:da: ca:af:f7:7e:97:21:76:59:51:81:3d:d7:fc:f5:bd:55: b9:34:08:01:3c:15:f8:33:f9:ca:b4:2b:30:8e:eb:46: 07:b7:31:75:84:ea:f0:4b:c2:40:ce:15:5e:04:89:5c: 42:f9:cf:ed:77:fe:37:69:33:64:f6:0a:49:07:11:f9: 6e:07:58:b2:9a:7a:e9:9b:d5:d7:51:1f:77:cf:66:c5: f7:e8:fb:f6:d8:3d:cc:7a:c5:36:a5:64:3b:a5:09:a1: d1:4e:cf:7b:c0:30:37:f5:4b:8d:ee:e7:82:91:05:2c: e9:a5:f5:54:61:bd:e1:a1:9f:1e:38:27:76:02:ec:ce: 67:60:04:b8:17:d2:ce:a5:0d:c2:71:6c:4a:c8:a3:4b: f9:c8:3f:95:cf:bd:db:cc:eb:3a:e6:03:0d:63:8f:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:9b:26:c0:95:09:50:a3:7e:ba:49:6f:5b:f8:2a:a9: f3:30:a4:79:be:68:e9:a4:35:ed:3e:5f:88:43:a1:f1: 23:a3:3e:a2:2e:66:7b:4f:c5:0f:ae:64:f9:0d:6d:cd: 29:7e:a9:30:8c:47:2a:2d:78:62:00:ea:9c:c3:06:1d: 03:42:32:27:c2:12:80:83:c5:a1:dd:80:b0:72:73:56: 53:11:2c:f8:49:a5:2f:da:14:47:49:b5:8c:7a:53:04: 09:40:e4:e3:26:a3:24:fa:13:e3:23:00:8a:d6:8a:17: e6:2e:26:be:ea:2d:84:74:e0:b3:bf:f8:bf:fc:32:b6: b4:4f:c8:52:b4:b7:1c:fe:cf:f8:76:4b:cc:a9:e0:2b: 6d:40:dd:b4:91:f5:a5:1c:13:a0:69:df:be:52:92:67: e2:b5:94:e6:e3:91:66:b9:29:da:43:2f:90:04:9e:44: cc:2a:07:62:91:43:47:0b:97:38:71:c1:94:52:7b:51: df:af:f7:ee:24:71:58:c3:f2:d9:e1:5b:d2:ba:3b:f5: 7d:3a:92:20:84:d4:47:6e:6a:7c:9b:8d:de:ce:f1:ab: b1:87:8e:76:05:a6:53:80:b1:3a:07:8a:da:e0:07:f0: 30:31:55:bf:02:94:fc:73:be:74:59:84:b6:dc:5f:d3 Fingerprint (SHA-256): FE:4A:1F:30:1C:64:79:93:BF:0F:56:5C:0C:1E:24:C6:F9:92:72:8B:AB:43:D5:8F:06:78:E2:29:CB:7C:81:2B Fingerprint (SHA1): 5A:A2:B0:4A:2B:C8:4E:5A:22:A9:EC:C4:14:B5:7D:CF:2A:20:D8:C5 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14160: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092705 (0x6715d21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 14:40:23 2016 Not After : Fri Jan 08 14:40:23 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:68:62:2e:b4:5b:b1:84:a8:30:02:9e:c2:df:88:5d: 3b:ac:a2:66:14:07:d0:9d:9e:93:92:ba:d7:3d:bd:75: 51:2c:a8:60:eb:99:1e:9c:96:a7:8d:2e:3e:d1:25:95: 89:84:a1:10:c3:19:2a:a5:de:4d:1e:61:5c:13:a2:96: 88:4f:35:11:18:83:f0:18:5d:90:68:1b:58:9a:39:8a: 35:d0:f8:4d:87:34:9f:4a:86:5d:f4:df:c7:ac:93:da: ca:af:f7:7e:97:21:76:59:51:81:3d:d7:fc:f5:bd:55: b9:34:08:01:3c:15:f8:33:f9:ca:b4:2b:30:8e:eb:46: 07:b7:31:75:84:ea:f0:4b:c2:40:ce:15:5e:04:89:5c: 42:f9:cf:ed:77:fe:37:69:33:64:f6:0a:49:07:11:f9: 6e:07:58:b2:9a:7a:e9:9b:d5:d7:51:1f:77:cf:66:c5: f7:e8:fb:f6:d8:3d:cc:7a:c5:36:a5:64:3b:a5:09:a1: d1:4e:cf:7b:c0:30:37:f5:4b:8d:ee:e7:82:91:05:2c: e9:a5:f5:54:61:bd:e1:a1:9f:1e:38:27:76:02:ec:ce: 67:60:04:b8:17:d2:ce:a5:0d:c2:71:6c:4a:c8:a3:4b: f9:c8:3f:95:cf:bd:db:cc:eb:3a:e6:03:0d:63:8f:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:9b:26:c0:95:09:50:a3:7e:ba:49:6f:5b:f8:2a:a9: f3:30:a4:79:be:68:e9:a4:35:ed:3e:5f:88:43:a1:f1: 23:a3:3e:a2:2e:66:7b:4f:c5:0f:ae:64:f9:0d:6d:cd: 29:7e:a9:30:8c:47:2a:2d:78:62:00:ea:9c:c3:06:1d: 03:42:32:27:c2:12:80:83:c5:a1:dd:80:b0:72:73:56: 53:11:2c:f8:49:a5:2f:da:14:47:49:b5:8c:7a:53:04: 09:40:e4:e3:26:a3:24:fa:13:e3:23:00:8a:d6:8a:17: e6:2e:26:be:ea:2d:84:74:e0:b3:bf:f8:bf:fc:32:b6: b4:4f:c8:52:b4:b7:1c:fe:cf:f8:76:4b:cc:a9:e0:2b: 6d:40:dd:b4:91:f5:a5:1c:13:a0:69:df:be:52:92:67: e2:b5:94:e6:e3:91:66:b9:29:da:43:2f:90:04:9e:44: cc:2a:07:62:91:43:47:0b:97:38:71:c1:94:52:7b:51: df:af:f7:ee:24:71:58:c3:f2:d9:e1:5b:d2:ba:3b:f5: 7d:3a:92:20:84:d4:47:6e:6a:7c:9b:8d:de:ce:f1:ab: b1:87:8e:76:05:a6:53:80:b1:3a:07:8a:da:e0:07:f0: 30:31:55:bf:02:94:fc:73:be:74:59:84:b6:dc:5f:d3 Fingerprint (SHA-256): FE:4A:1F:30:1C:64:79:93:BF:0F:56:5C:0C:1E:24:C6:F9:92:72:8B:AB:43:D5:8F:06:78:E2:29:CB:7C:81:2B Fingerprint (SHA1): 5A:A2:B0:4A:2B:C8:4E:5A:22:A9:EC:C4:14:B5:7D:CF:2A:20:D8:C5 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14161: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14162: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14163: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092735 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14164: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14165: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #14166: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14167: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 108092736 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14168: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14169: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #14170: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14171: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 108092737 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14172: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14173: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #14174: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14175: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 108092738 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14176: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14177: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #14178: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14179: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 108092739 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14180: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14181: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #14182: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14183: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 108092740 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14184: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14185: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #14186: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14187: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 108092741 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14188: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14189: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14190: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092735 (0x6715d3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:46:55 2016 Not After : Fri Jan 08 14:46:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:c3:75:30:bb:28:b7:d3:db:70:f7:f1:df:ba:4a:1f: 8f:b2:5e:53:38:d6:2b:f3:1c:45:99:5a:80:44:1c:5d: cd:b8:ed:37:4e:af:c7:39:a4:f2:cc:a7:17:91:df:d3: 15:94:17:32:64:83:f9:44:0c:49:91:7c:6a:99:1d:eb: 67:5a:6e:b9:7f:30:2b:4f:c9:3a:6d:ac:5d:73:36:65: 4a:d4:26:37:13:91:0d:f4:e1:6f:90:99:17:0b:4a:ec: 8a:15:8a:2a:56:18:80:14:23:04:d6:54:0b:fa:cf:6b: 7b:a9:1f:4a:d8:a9:18:36:43:f5:bb:79:4d:30:d4:00: c1:cc:58:f0:ed:82:21:86:4a:c4:ec:cb:8d:d0:65:66: 84:ec:e0:c4:f8:52:9e:06:82:42:ae:1b:e0:27:01:23: 65:fc:db:24:52:2e:39:c1:8f:e9:1e:4e:df:40:d4:a0: b3:ae:45:a3:0e:04:b1:d3:15:b1:b8:f4:a4:5d:78:c3: b8:cc:7e:45:ff:e6:de:01:a1:96:ac:7a:41:f2:67:86: 9c:a0:c2:99:4e:61:03:09:3c:c9:b6:22:c2:df:50:43: c9:d9:dc:68:40:22:ba:4b:bc:33:58:f4:74:ed:4f:86: 6a:84:f7:c0:6a:14:06:97:77:eb:6c:d6:62:3a:06:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:ab:79:af:15:07:36:ac:4e:84:a2:1c:0e:af:6f:96: 52:b9:b3:c3:ae:71:c1:86:97:5d:aa:c3:0b:2b:96:f2: 96:06:01:ee:00:50:cf:8a:d1:15:b5:e0:e6:8f:97:cc: 28:4c:fc:e8:5f:05:2e:d5:5c:94:a8:52:7d:05:fa:17: 07:49:6f:03:a2:45:1b:91:4a:5d:c3:70:6f:f8:a9:6c: 17:33:79:b2:91:96:7a:cc:7c:90:61:ff:41:97:15:59: 80:d6:06:5d:d4:95:7f:c3:b4:02:3a:01:35:7e:25:0e: 32:e0:6c:ae:5f:52:b6:e1:bb:9e:4f:80:4b:f5:f0:82: 8d:93:d8:c2:73:af:a4:de:e4:e4:6f:ab:6c:88:25:7e: 7e:7f:ed:4f:b9:20:a0:a5:0c:49:75:30:09:62:ba:8e: 9e:e8:26:fb:d7:62:03:d7:0f:66:ef:b5:b0:52:3f:b3: 13:4a:00:fd:4a:06:16:89:0a:b0:9d:de:34:87:c3:d6: 24:e1:d9:d8:c1:38:ce:79:30:3d:09:f0:f5:37:8e:74: 7e:11:b5:e3:10:8a:24:c8:82:f2:76:30:0f:25:03:f7: 69:13:85:ba:02:07:fd:0b:21:95:3d:34:c9:70:64:9e: 9c:e5:f8:29:53:27:17:5f:59:18:cf:37:b8:16:8f:55 Fingerprint (SHA-256): 76:3D:A0:9C:46:99:55:A1:B7:10:8B:9B:5B:82:ED:4A:E0:71:43:53:B3:68:50:00:16:50:DC:8A:32:74:3C:8B Fingerprint (SHA1): C1:4D:C6:A9:D4:D9:DD:C4:60:59:09:5F:57:D3:99:62:15:45:FE:C8 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #14191: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14192: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14193: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14194: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092735 (0x6715d3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:46:55 2016 Not After : Fri Jan 08 14:46:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:c3:75:30:bb:28:b7:d3:db:70:f7:f1:df:ba:4a:1f: 8f:b2:5e:53:38:d6:2b:f3:1c:45:99:5a:80:44:1c:5d: cd:b8:ed:37:4e:af:c7:39:a4:f2:cc:a7:17:91:df:d3: 15:94:17:32:64:83:f9:44:0c:49:91:7c:6a:99:1d:eb: 67:5a:6e:b9:7f:30:2b:4f:c9:3a:6d:ac:5d:73:36:65: 4a:d4:26:37:13:91:0d:f4:e1:6f:90:99:17:0b:4a:ec: 8a:15:8a:2a:56:18:80:14:23:04:d6:54:0b:fa:cf:6b: 7b:a9:1f:4a:d8:a9:18:36:43:f5:bb:79:4d:30:d4:00: c1:cc:58:f0:ed:82:21:86:4a:c4:ec:cb:8d:d0:65:66: 84:ec:e0:c4:f8:52:9e:06:82:42:ae:1b:e0:27:01:23: 65:fc:db:24:52:2e:39:c1:8f:e9:1e:4e:df:40:d4:a0: b3:ae:45:a3:0e:04:b1:d3:15:b1:b8:f4:a4:5d:78:c3: b8:cc:7e:45:ff:e6:de:01:a1:96:ac:7a:41:f2:67:86: 9c:a0:c2:99:4e:61:03:09:3c:c9:b6:22:c2:df:50:43: c9:d9:dc:68:40:22:ba:4b:bc:33:58:f4:74:ed:4f:86: 6a:84:f7:c0:6a:14:06:97:77:eb:6c:d6:62:3a:06:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:ab:79:af:15:07:36:ac:4e:84:a2:1c:0e:af:6f:96: 52:b9:b3:c3:ae:71:c1:86:97:5d:aa:c3:0b:2b:96:f2: 96:06:01:ee:00:50:cf:8a:d1:15:b5:e0:e6:8f:97:cc: 28:4c:fc:e8:5f:05:2e:d5:5c:94:a8:52:7d:05:fa:17: 07:49:6f:03:a2:45:1b:91:4a:5d:c3:70:6f:f8:a9:6c: 17:33:79:b2:91:96:7a:cc:7c:90:61:ff:41:97:15:59: 80:d6:06:5d:d4:95:7f:c3:b4:02:3a:01:35:7e:25:0e: 32:e0:6c:ae:5f:52:b6:e1:bb:9e:4f:80:4b:f5:f0:82: 8d:93:d8:c2:73:af:a4:de:e4:e4:6f:ab:6c:88:25:7e: 7e:7f:ed:4f:b9:20:a0:a5:0c:49:75:30:09:62:ba:8e: 9e:e8:26:fb:d7:62:03:d7:0f:66:ef:b5:b0:52:3f:b3: 13:4a:00:fd:4a:06:16:89:0a:b0:9d:de:34:87:c3:d6: 24:e1:d9:d8:c1:38:ce:79:30:3d:09:f0:f5:37:8e:74: 7e:11:b5:e3:10:8a:24:c8:82:f2:76:30:0f:25:03:f7: 69:13:85:ba:02:07:fd:0b:21:95:3d:34:c9:70:64:9e: 9c:e5:f8:29:53:27:17:5f:59:18:cf:37:b8:16:8f:55 Fingerprint (SHA-256): 76:3D:A0:9C:46:99:55:A1:B7:10:8B:9B:5B:82:ED:4A:E0:71:43:53:B3:68:50:00:16:50:DC:8A:32:74:3C:8B Fingerprint (SHA1): C1:4D:C6:A9:D4:D9:DD:C4:60:59:09:5F:57:D3:99:62:15:45:FE:C8 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #14195: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14196: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14197: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14198: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092742 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14199: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14200: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14201: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14202: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108092743 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #14203: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14204: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14205: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14206: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108092744 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14207: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14208: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14209: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14210: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108092745 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14211: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14212: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14213: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14214: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #14215: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14216: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092742 (0x6715d46) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:48:24 2016 Not After : Fri Jan 08 14:48:24 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:25:2f:03:3b:06:e2:7c:4f:8a:bd:9b:d0:e8:ea:d0: f8:63:ab:cf:da:88:4d:c4:2c:f6:1b:57:a5:e5:8d:4f: 06:84:02:1f:98:0c:29:b0:6b:ed:d5:06:fe:82:5f:13: 88:64:ec:55:dd:41:cc:4e:dd:3f:a9:45:2c:c5:da:9f: 49:fc:ce:bf:dc:9e:2a:17:58:72:0b:1a:b5:03:0f:d2: 48:7d:fe:8d:72:20:4f:7c:cd:7e:07:5e:fc:ca:7d:28: 20:2f:83:fc:66:92:a8:9d:35:6b:43:62:35:10:12:1e: e4:c1:e1:90:7f:83:84:50:3c:cf:f3:73:87:08:52:97: 24:d7:2a:eb:cf:a5:c8:ad:ca:50:a2:71:30:79:3f:e3: 94:eb:20:34:6f:f4:d0:1c:f9:78:48:11:e4:8e:de:aa: c4:fa:10:3a:47:65:47:19:0a:b2:6b:0a:d6:0d:6f:92: 20:e0:0e:67:2f:89:4e:2a:de:b3:83:50:c4:39:0f:3f: 99:c9:d1:40:7b:fd:a3:9e:be:0c:9c:5a:52:7d:b0:50: b1:af:6a:92:ea:15:bc:fe:c1:c4:71:b4:78:21:fe:19: 1a:76:12:42:9e:55:43:e7:ca:45:f1:52:0c:62:a4:4e: f7:fb:ff:34:1f:c2:33:ad:6b:69:86:68:a6:46:f1:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:3d:90:25:cc:29:17:d5:ca:36:3f:90:e5:96:a7:5d: 90:0e:1f:33:27:28:c5:27:3d:b3:6b:28:e0:59:59:61: bd:48:55:de:b6:90:b7:14:58:86:a4:3a:34:4f:0a:2a: 29:cc:42:de:e5:99:34:f0:72:0f:ec:6d:10:e3:88:9f: 67:ef:f7:df:c4:1b:c4:d3:c0:03:6f:f6:66:97:58:f8: 17:c9:bc:d5:83:78:6d:99:6f:bb:c1:4b:07:8c:da:4e: 3b:7e:95:b0:f4:6d:dd:5c:69:77:ca:e6:f7:fd:b5:c9: af:de:36:a6:f5:54:8e:f9:bb:ea:b6:be:ac:1b:8a:08: d1:f8:51:0e:4f:71:98:be:bd:bf:96:14:9d:d0:b5:d5: de:d4:91:f6:89:9c:98:bb:d7:dd:4c:3a:2e:b0:a4:b4: ed:ff:2a:42:e5:80:b4:e4:55:f1:b1:06:64:fe:f2:20: da:aa:bf:31:a1:c4:56:16:40:20:a1:63:ab:2b:6b:81: 0b:98:35:9d:fd:b9:fc:62:33:da:a3:97:1a:2f:dc:43: 67:a4:d0:6a:f8:17:ca:37:86:ce:3d:3e:97:ce:f6:0e: 79:65:fb:9c:87:1a:ff:91:20:f0:bb:b4:46:28:e7:af: 8a:6e:b1:05:00:67:32:4a:ec:8f:6c:e5:78:de:09:74 Fingerprint (SHA-256): 24:50:A3:40:A9:B4:B0:0E:A1:3D:1D:96:5F:27:25:C2:59:86:D8:FE:68:3F:27:98:47:58:A1:F2:F6:E6:C9:A3 Fingerprint (SHA1): 0A:4A:B0:33:C6:DE:87:ED:5E:AF:13:BD:BE:8C:03:51:2E:7D:E6:D8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14217: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14218: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14219: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092743 (0x6715d47) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:48:39 2016 Not After : Fri Jan 08 14:48:39 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:67:4f:62:9d:ee:99:7d:d2:6b:9c:e6:74:3e:a4:ed: bd:a7:66:f6:74:85:9f:83:9f:dd:06:c6:51:86:f2:06: 83:21:fd:2c:d5:ac:c5:98:ef:6a:44:72:8b:0a:b1:9a: 7d:50:49:5d:13:47:07:32:7a:c3:c6:70:fc:99:cb:86: 78:cd:92:ab:67:ad:73:09:04:79:0f:24:48:e2:02:57: ec:0b:77:0f:fd:ba:fb:9d:2f:be:63:73:f0:f9:03:a7: a8:02:cf:f6:93:82:12:63:27:fe:38:5b:bc:b7:c3:20: c8:a0:93:12:fe:2b:94:c7:48:25:d1:1f:53:83:25:37: bd:f1:86:ed:ab:f2:31:34:8c:4c:8e:da:7e:15:71:dd: 25:e2:b2:19:13:54:e3:9e:c8:a6:08:b5:37:48:e1:1b: 4b:16:ec:cf:c4:c0:58:d0:cd:34:e1:c6:3b:d6:0f:c6: 2b:58:d2:7e:fe:8b:b7:94:e2:05:f4:b7:07:3c:f0:54: 67:49:d0:6e:ea:6a:a2:cc:15:ef:b3:1a:56:c1:e8:ab: ee:94:53:61:71:2e:52:b6:8d:2f:ef:76:46:63:e3:69: 2b:11:95:8d:6c:7f:35:af:b9:48:a0:09:b4:1c:2f:84: 18:37:a3:ee:41:e9:9e:ee:ba:00:89:ca:3f:10:fd:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:5b:84:75:e8:b6:f5:64:99:6c:34:d0:4e:6d:a1:86: 60:35:79:7e:5f:7f:b1:92:99:04:3e:79:1b:1e:5b:90: b3:e7:36:14:e6:58:89:56:27:19:2b:50:3d:b0:f2:b0: 25:b4:59:42:42:11:4d:7e:a8:b3:6c:87:0b:d4:7e:62: e2:e4:c0:8d:e8:5f:33:34:ec:bb:1a:3d:c4:1a:0d:5e: 54:a1:63:6f:1f:d1:7f:0e:b4:b2:cf:38:7a:ec:26:c9: 38:4f:1b:bc:c1:52:37:a4:ed:4d:93:93:2f:22:13:f9: f1:98:c0:f4:c4:76:c8:ac:79:cd:e4:94:83:a7:18:f4: 48:57:f9:40:f9:9e:36:31:56:45:32:e7:9e:b2:80:e8: 9c:c7:2f:91:e4:41:11:40:e0:d0:ed:6b:56:24:8f:ba: 72:10:ae:1f:35:eb:fa:a6:60:b9:57:21:9a:2f:b0:3d: 9d:dc:cb:6c:bc:c8:f6:28:45:5a:30:be:d5:02:e7:f2: a4:17:80:3f:43:30:6f:12:2d:e5:b7:cd:f8:e2:f1:2e: 3a:04:95:34:da:83:a3:dc:e3:be:ec:eb:c4:3f:5c:9f: b4:48:74:45:4e:16:92:27:14:f2:63:67:9a:d3:cc:7d: ab:dc:81:71:9a:f2:35:fb:be:33:8c:97:d9:a1:cc:4c Fingerprint (SHA-256): 5B:B6:6F:13:EA:7F:BC:5D:C0:60:87:A9:8C:7A:FE:0A:F4:9D:FB:4F:7C:03:65:08:47:72:B9:88:38:28:5D:1B Fingerprint (SHA1): E1:6B:8E:28:94:5D:56:E9:58:0C:D4:F7:63:AC:80:7F:1F:61:D8:9F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14220: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14221: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092744 (0x6715d48) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 14:49:06 2016 Not After : Fri Jan 08 14:49:06 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:2c:79:f5:7c:2c:91:7e:74:bf:1b:ae:d7:11:35:b0: a4:47:8a:86:94:cf:84:5d:2a:d6:69:22:0d:b0:30:21: f2:c6:a6:3e:bf:99:01:54:55:14:b3:2d:23:0c:d8:c3: a4:7a:88:52:a7:c5:82:bd:7a:9c:41:e5:99:1c:b9:1b: 09:5f:04:b2:94:b7:cd:47:25:83:0a:5d:83:6e:b4:e4: ee:7d:49:f0:90:cc:1e:f3:40:fb:d6:d6:df:5c:b9:c8: 48:a4:3b:16:b1:b7:da:ef:d6:84:1c:16:29:39:04:8d: 72:f8:7f:16:a7:ee:39:86:01:b9:93:72:a4:19:3e:9c: de:b8:ef:2d:5b:8d:2a:6e:58:67:a3:96:d3:6f:ba:fc: c3:3d:cb:1a:f4:59:0d:bb:11:2f:8d:ad:1a:1f:b4:37: 36:49:92:42:95:bb:ff:a4:f9:01:a4:22:1c:d4:97:0b: 4c:fc:19:1f:da:7c:27:0d:77:ad:ca:14:5d:d9:8d:fc: e8:b4:7d:9e:61:df:6e:08:fa:c6:9f:96:b2:b9:9e:25: 44:97:ca:ff:00:e0:27:28:59:e4:a2:de:42:65:cc:51: 4b:ef:d7:98:15:52:fa:c7:ce:ad:b9:c1:48:ab:a4:3e: 05:5e:eb:6d:1b:c7:76:c5:b5:20:05:2f:7a:70:2f:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:3f:a8:b9:f1:d2:d5:fe:9f:fb:ea:84:1e:cc:61:7a: 49:62:9c:0a:18:41:c8:55:9f:2d:38:ef:76:c4:50:ba: 25:15:01:7b:ff:f6:7b:2a:88:6d:cc:41:6c:2a:01:04: 1f:02:f9:1e:3d:f2:1f:d3:f3:ce:36:d0:0c:a7:ab:4f: d4:55:6c:8d:3a:b6:e3:93:e0:5b:a8:6c:84:81:20:aa: d6:21:4d:bd:3a:c5:9f:9e:7e:68:b0:cf:bf:16:8a:d2: 2d:28:06:36:26:3e:18:1d:c8:00:c7:72:c4:ba:3e:a9: 3d:fb:5d:15:53:05:45:bc:74:e4:f0:8a:51:1a:5b:7d: 98:03:5a:ff:0a:c7:88:78:5b:69:37:33:f0:73:16:cc: 8f:69:de:06:b0:f3:ad:55:e3:03:8e:b8:8b:58:70:72: 1b:98:32:a0:2d:ba:d0:bb:14:b1:a7:0a:9d:b1:e0:b4: e7:26:fa:2c:60:b0:af:d0:b6:74:f1:c7:5e:78:bf:16: 67:cb:8a:85:60:1f:63:e4:9b:4e:ba:38:7c:80:82:9f: 06:c9:43:d9:3a:b5:4c:92:ad:1c:a3:bd:5a:cd:46:e6: db:b3:69:ec:2e:38:03:23:09:9d:23:3a:04:08:ce:2c: f0:f3:45:8c:9d:dd:b7:eb:2a:e5:d1:22:67:00:1e:30 Fingerprint (SHA-256): 02:20:35:03:B3:85:D6:93:AF:CF:25:29:FA:F4:F3:F7:73:23:65:F1:0B:50:6F:A2:1F:15:10:5B:01:F9:72:EB Fingerprint (SHA1): F2:E4:F7:D9:F2:00:25:3B:D5:83:B1:1D:BA:0F:38:97:10:F1:14:0C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #14222: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14223: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092746 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14224: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14225: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14226: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14227: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108092747 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14228: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14229: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14230: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14231: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108092748 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #14232: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14233: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #14234: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14235: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 108092749 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14236: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14237: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14238: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14239: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 108092750 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14240: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14241: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14242: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14243: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #14244: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14245: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #14246: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092746 (0x6715d4a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:49:37 2016 Not After : Fri Jan 08 14:49:37 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:15:81:02:23:9a:c7:ce:23:97:e1:e9:99:b7:9c:f5: f6:eb:c6:ca:99:95:4e:04:ad:95:06:49:cb:09:47:92: 61:f5:7c:ce:a1:2f:a2:c0:a3:1a:fb:86:32:d4:5e:9f: 8e:b4:21:6f:25:c1:64:c3:a8:1a:95:24:45:ce:31:58: d2:fe:82:ab:3a:d8:a7:50:ae:a7:26:33:8b:40:56:63: 28:5e:cb:22:e1:1b:79:2e:f1:93:cc:9c:55:de:35:42: 7b:cf:fd:0a:6c:65:fe:39:0b:2b:d8:eb:e7:4b:d1:1a: 06:24:d5:8e:d3:6a:ac:4e:4a:de:47:df:1d:99:3c:fa: 19:b6:a1:f6:2f:68:d2:84:39:4c:0f:64:bc:55:26:c0: 46:c1:93:5f:cf:72:26:0b:de:ee:23:59:91:b0:7d:da: 50:36:cf:57:99:72:87:47:5e:62:5a:0f:63:fd:c3:4a: 02:84:35:db:a9:04:56:58:9a:24:56:ec:60:ec:73:22: 13:5e:b2:5d:a0:94:e2:4c:2f:e6:54:1e:8a:4b:1f:07: 9b:57:df:de:5c:2c:21:8b:e3:85:fd:ba:8b:8d:6a:a2: b1:c9:6b:64:b5:1a:5d:59:f4:71:f1:ef:37:10:2b:1f: 6d:d3:73:19:65:07:7e:a8:a5:a7:12:a1:62:d4:20:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:9b:6b:d1:6a:d3:a7:5d:74:8e:25:fb:5a:c0:4d:39: 76:39:bc:d8:53:65:7b:7d:53:79:d6:94:f9:83:76:57: bf:86:00:15:74:85:6e:f7:a0:ac:67:fc:0f:a4:67:8e: bc:71:2e:c1:5e:90:d1:04:66:84:b8:c6:78:0a:89:62: 41:c6:0d:fd:0e:e0:02:98:ae:c2:ec:fc:c2:3c:c0:07: 9c:65:9d:a5:3a:d9:c4:bb:30:98:33:84:a2:2a:7b:71: 34:7a:20:0e:19:91:1e:63:5f:79:49:f2:dd:9a:25:fd: d7:66:67:bf:97:82:aa:85:12:00:ae:a3:51:e2:55:91: d6:9a:03:ac:dc:cd:0c:ef:73:d7:08:cb:1c:8e:a1:c4: 60:7f:7f:3b:b5:ee:aa:3c:96:a5:16:ee:cf:19:a4:0e: b5:ea:30:b5:a9:c6:26:49:66:8d:06:65:ec:35:21:3c: b6:01:43:3d:13:ca:ef:1d:07:58:c0:1e:83:e4:7a:a3: c4:85:ed:43:c8:ca:36:01:d3:0e:32:1c:c1:09:a9:9a: f6:6d:8c:52:8e:9b:ea:18:64:dd:6a:87:59:6c:b7:06: 09:ec:f9:d7:91:35:43:50:50:10:dc:3f:21:69:ad:9a: bf:07:43:be:f7:b5:61:80:fe:21:07:65:d2:d5:8f:a7 Fingerprint (SHA-256): CE:92:8E:28:36:C1:6F:34:DA:0B:8D:16:E8:17:83:7E:CE:AE:42:AF:5C:A6:4D:65:46:1B:9F:32:45:77:CC:13 Fingerprint (SHA1): 0E:FD:11:36:96:47:8A:0A:60:F1:35:90:76:CD:A9:30:58:BE:0D:9A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14247: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14248: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092747 (0x6715d4b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:49:50 2016 Not After : Fri Jan 08 14:49:50 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:69:77:2c:65:bd:35:9a:c9:cb:ea:96:31:3e:8f:68: 62:5a:ce:5a:1c:e5:f8:26:47:10:59:ad:b8:e2:88:f6: 18:80:bb:a8:85:e7:7c:73:63:57:3f:61:a9:53:02:58: 74:80:62:20:76:82:93:e4:a4:eb:11:62:89:53:4f:57: fd:d1:01:4d:3a:c9:47:17:ca:44:cb:e5:29:f1:bb:db: 9f:df:df:f9:f6:f5:b8:15:91:40:5d:72:61:00:91:22: f1:93:dd:19:92:32:15:44:3a:98:f7:90:e3:e1:a7:34: b8:b6:a5:54:39:07:a7:91:51:07:07:47:8a:90:4f:a7: ce:16:b9:c6:6b:5f:21:71:ad:e2:42:26:9a:54:c6:9a: 74:0e:b9:d2:31:57:24:64:3b:70:eb:60:f6:cf:44:1d: 33:f3:b1:fa:24:4c:04:3a:92:b9:da:8b:64:20:5f:1d: 81:aa:37:f2:0b:6c:4f:0e:8f:cf:c4:c8:ef:98:98:a0: 72:46:01:fb:68:cb:c4:33:54:49:4c:64:3d:e4:d8:2c: 28:d2:e2:13:75:09:53:38:d1:f2:68:20:91:2d:7f:df: f3:91:96:9e:43:49:ef:3c:fc:b6:0d:5e:ae:96:25:27: 9c:c1:b6:00:ae:59:f3:21:d8:ac:a1:d7:53:26:ad:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:43:0f:a1:ca:30:13:31:f3:4f:27:8b:0c:e2:c8:a8: 97:c2:fe:ef:ce:92:a3:20:1f:21:c5:9c:07:3b:69:f6: ae:d5:2f:9a:b7:cd:68:e2:bc:1d:8f:05:d7:eb:63:8f: 8a:e2:88:9a:c1:03:5c:a5:36:5d:11:14:6b:79:f7:41: 73:ec:58:02:83:4e:ba:0b:1c:24:6b:43:4a:c9:12:6e: b0:30:65:d0:53:2d:9f:5d:9d:fa:39:23:f0:70:fb:55: a4:91:ad:37:21:9f:4a:0a:ab:18:a7:39:97:c8:c9:e6: 4e:c5:69:aa:52:08:5b:c4:14:c0:da:d7:dd:8a:40:e2: 21:c3:97:87:e1:bd:e0:74:d0:22:9f:01:88:25:f2:e8: 8c:0f:37:a2:f5:47:ac:30:6c:b9:e0:90:e4:98:50:37: f9:50:7b:c6:cc:db:df:14:f7:94:32:65:74:70:99:14: 70:0c:f9:5a:88:fc:84:13:b5:71:a2:1e:d0:83:c6:30: da:2e:cb:8d:40:73:1e:94:fe:e9:99:af:d4:bb:cd:ae: d7:80:09:6d:15:33:f8:ef:66:b5:8a:a0:f9:cc:eb:af: 9d:81:43:2a:b1:16:44:e4:d6:c2:c2:47:a2:4e:21:d9: 8c:7b:f2:f1:f3:a6:9a:07:ee:f5:25:a8:05:22:5a:df Fingerprint (SHA-256): 43:15:79:F7:1A:1D:96:DF:5B:2E:B7:E3:6D:3E:FB:1E:C4:0D:DA:7E:44:45:AE:6C:AD:3B:3D:AF:D0:CD:6F:75 Fingerprint (SHA1): 51:48:59:1B:24:BA:64:3B:38:3C:AC:9E:BD:A7:58:D8:A1:E4:4B:19 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14249: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14250: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14251: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092748 (0x6715d4c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 14:49:57 2016 Not After : Fri Jan 08 14:49:57 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:95:7f:77:9f:c0:7a:ac:c0:ff:06:1f:c1:0a:88:14: 50:85:bf:3b:a8:15:bf:9d:14:61:ee:3c:94:74:55:b4: 25:7f:ed:9a:66:31:0b:ad:32:a0:6f:b9:40:79:d7:a3: 4c:5c:d4:48:99:ab:02:fb:0e:72:84:a1:25:07:76:bd: 8e:86:44:9f:18:92:bf:89:49:62:06:6c:19:0f:d9:e3: 39:10:99:ef:9b:59:5a:0c:35:92:5f:3c:69:6a:5d:4b: 2b:1f:b4:08:08:46:94:ec:ab:c2:7b:5a:0c:76:99:db: 33:6c:95:b7:b0:17:90:55:fd:bd:0b:5a:3b:71:e0:48: 5d:19:9e:cf:11:4c:dc:23:a6:68:56:31:b2:42:ac:3c: be:33:99:e6:76:4b:54:b2:0d:c1:6e:63:53:e0:2a:4f: 81:a4:23:8a:84:b1:91:a9:1e:6b:b7:74:5d:41:3b:a0: 33:30:03:2a:7f:6e:38:40:9f:72:b8:6e:9a:fd:d3:a0: e7:08:c3:f1:5d:28:38:f2:b3:f0:9b:70:8c:ff:f4:3c: 27:7e:42:ae:2e:8d:18:20:06:61:08:76:d8:90:bb:f2: 7f:99:71:0a:1d:30:77:13:63:f5:39:b3:9a:27:93:cf: b1:4f:4d:46:70:63:e5:75:ae:a4:42:42:9b:67:85:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:0f:b5:2f:fc:d6:a6:2d:0d:e9:62:5b:1e:5e:bf:6e: 9d:56:6f:57:f7:a3:3d:df:74:49:41:7b:51:ef:cb:ae: 31:0e:47:a4:75:f9:0b:a3:7c:2c:a5:e0:0c:6f:24:4b: 4f:d6:46:9f:3c:ea:4a:de:8d:29:7f:d0:74:90:2b:6d: bc:cf:52:f4:2d:6b:28:9e:21:d5:f0:31:12:ab:36:9d: 92:22:1c:27:39:99:d8:8e:4c:52:cd:71:83:34:9e:22: 55:d4:f6:69:76:c7:07:57:04:9b:87:fa:7e:f5:15:6f: dc:68:5c:65:d1:75:6c:b3:98:47:5a:9c:45:cc:ec:68: 42:b1:7e:15:e3:b1:b7:7c:fb:35:51:f4:4e:2f:b8:1b: b5:f4:56:0c:01:af:ee:c4:1e:14:f7:e2:6e:cf:7c:10: c5:0c:a8:b7:56:87:97:d0:1d:4d:34:63:bf:ae:a8:0c: 4a:c2:78:52:86:77:d2:b6:0e:f8:1d:89:78:60:0b:08: c1:9e:2c:a7:58:0e:db:e3:98:d3:46:93:02:94:9c:2a: 05:fd:a5:c5:93:1d:eb:7b:4c:a2:b1:bf:1d:66:a1:bd: 27:bc:9a:24:ea:6a:6a:15:21:18:4f:70:c0:e9:be:b5: 05:f5:14:e8:47:a4:06:e9:9c:db:ac:10:0e:93:88:e0 Fingerprint (SHA-256): DA:C2:97:BA:12:2A:5D:9A:F9:FD:28:84:AE:09:0C:54:A9:FA:B9:DE:49:EC:60:0C:9C:F6:ED:0D:B5:2E:16:1E Fingerprint (SHA1): AE:4F:A6:5F:D1:54:88:F1:7C:B3:89:B1:14:6B:9A:4F:50:B1:29:6C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #14252: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14253: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092751 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14254: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14255: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14256: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14257: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108092752 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14258: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14259: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14260: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14261: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108092753 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA1Root-108092660.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14262: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14263: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14264: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14265: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108092754 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14266: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14267: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #14268: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092751 (0x6715d4f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:50:40 2016 Not After : Fri Jan 08 14:50:40 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:a0:66:59:73:2c:1b:f0:e1:f6:91:1d:2b:59:b5:90: 1a:11:21:b2:2e:84:d6:d3:6a:f9:a5:8a:6a:25:4d:e8: 24:a8:a1:64:9f:05:2b:3e:34:d4:d7:c3:3a:e0:19:39: 2c:ee:2b:09:6c:a1:42:a3:c2:96:bd:43:36:21:34:2e: 16:1c:6e:1a:a1:d4:49:0b:c5:09:91:0c:e1:76:ee:f8: 95:9d:3a:62:47:58:11:39:40:d3:68:d3:a1:8c:f7:9e: ab:79:29:76:f3:6b:dc:f5:4b:43:93:a1:3d:04:0f:95: e6:5e:ca:6e:50:cf:3b:19:db:01:bf:4a:81:fa:3e:40: 13:68:f4:12:d0:de:d8:29:bd:62:e9:75:8d:54:80:25: a1:b9:64:e4:9a:13:85:60:c9:49:c6:d8:1b:5f:3f:1a: 2f:7d:69:a6:81:4b:08:0a:7d:8c:2c:61:3d:3f:30:2b: b0:fe:01:87:b2:d6:e6:4c:4e:38:98:57:23:50:f9:95: 86:f0:98:9a:c0:c9:6e:c8:0a:8c:4c:12:f3:f1:09:41: 43:f0:73:ae:4f:3d:43:0f:31:ef:76:43:81:14:4d:bd: 4a:6f:e1:a5:e8:56:12:d8:14:1a:7e:cd:31:bf:e6:82: b9:bf:7b:32:b9:7b:01:63:0e:d3:da:95:c5:c1:b4:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:c3:03:1d:33:33:76:fe:ab:27:50:e5:d8:b0:ad:13: 07:03:d8:4a:8f:ae:ae:fa:13:ec:35:e5:40:78:03:3b: df:0e:72:fc:55:4d:9c:b2:6c:80:04:d8:9d:29:f1:5c: 7e:bf:3a:73:44:6c:53:0c:5c:af:ae:8e:f5:e9:c8:18: f3:d7:26:b4:18:a4:33:40:fd:82:b5:0c:5b:ea:1f:15: 93:b4:13:63:2f:66:48:ac:ad:2e:a7:ca:0f:02:27:6d: bb:64:da:a9:a7:01:a8:a7:b1:70:92:c9:23:be:4d:ed: 23:6d:47:01:5d:f2:f7:69:ba:e3:42:8d:26:79:93:44: 5c:96:14:78:c2:9b:58:71:58:9a:52:5d:13:22:5d:80: 8e:df:74:72:ff:d0:ee:6d:6c:52:7b:cb:ca:5e:b3:a2: 99:3f:08:c3:74:bb:b1:30:6f:85:04:2b:22:58:83:5f: 3e:31:6a:cd:b0:6c:5f:27:4a:87:8c:69:b8:03:79:7b: ee:ad:4c:0b:57:52:0a:97:3d:a6:2b:2d:bd:b7:2b:50: 9a:78:d1:a9:a3:70:58:88:4d:6d:03:91:29:08:1d:42: 38:d4:65:7c:c7:50:c9:33:d2:2b:9b:b8:8c:c1:7b:71: be:7a:26:d9:55:70:c0:80:06:a2:d1:69:d8:16:96:ac Fingerprint (SHA-256): 46:57:2F:9E:93:FE:C8:71:2F:67:F9:6D:81:53:01:52:20:35:0B:EA:77:38:CE:65:2E:1B:E2:9A:1D:D6:77:A4 Fingerprint (SHA1): 43:25:08:EF:5D:81:50:BC:D6:70:E3:AE:52:DD:23:81:ED:7D:B2:42 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14269: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #14270: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092755 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14271: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #14272: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #14273: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092756 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14274: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #14275: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #14276: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14277: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108092757 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14278: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14279: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108092758 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14280: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14281: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #14282: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14283: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14284: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108092759 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-Bridge-108092661.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14285: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14286: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14287: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14288: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108092760 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14289: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14290: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #14291: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092755 (0x6715d53) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 14:51:25 2016 Not After : Fri Jan 08 14:51:25 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:c3:01:b4:36:12:78:89:91:f1:18:6d:08:99:76:43: da:59:ee:c8:0b:97:45:63:5e:dc:98:dd:56:54:11:94: ea:d0:a8:47:42:3f:8c:3a:74:cd:5e:8e:c2:10:68:72: 90:d3:e0:26:47:d5:24:f4:fa:50:cc:a8:1b:03:9f:c8: a1:71:79:ea:9a:2d:a0:af:94:3d:b7:1e:52:3d:82:b9: db:0e:a7:7c:d2:d9:9d:ca:3d:50:9e:6f:68:ec:9f:36: 66:6b:f6:2c:ec:0b:09:be:8e:62:3e:e3:01:31:64:10: 5f:11:40:a0:e5:89:0a:de:37:2a:82:e4:8e:fd:96:1c: 0a:06:9f:c1:b9:b7:9d:2a:81:fe:61:16:ba:25:88:65: af:6c:d0:ff:25:a8:ce:f3:cc:d8:b1:3b:90:94:66:d2: 96:6b:f1:85:ad:f4:f0:7d:b2:fd:d4:02:a0:c1:32:17: 80:b0:7d:70:39:86:5c:5e:b3:76:b3:d0:d2:2d:d5:5e: bc:82:47:91:64:e1:d1:48:da:45:ca:14:78:51:36:32: 9a:ea:c6:80:25:fc:4b:8d:93:8f:17:7b:b9:69:54:71: 82:a0:c2:a4:26:9d:ca:a7:fc:b3:92:40:d0:85:dc:5a: f9:95:bb:cd:a1:e3:02:6c:3c:5c:9e:ef:26:67:a0:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:7e:91:2b:65:ae:4c:36:b7:f7:ff:2a:19:a6:24:4b: 45:63:1d:b2:6f:09:e4:0e:80:74:f0:1e:1a:ce:fa:65: 40:c4:77:55:c4:15:a5:f8:2e:cc:84:3a:97:b5:1d:5c: 71:e1:c3:c8:97:89:43:b5:d7:6d:a0:63:2e:e7:a3:60: 3f:92:e6:d0:5e:e7:a3:16:b3:c8:fc:09:75:ef:38:4e: f2:11:c5:db:9b:c0:a1:b3:66:e7:78:72:5a:3a:7e:a1: 22:ba:ff:bb:77:94:26:69:76:d3:a8:61:4e:14:ff:f5: fb:7c:66:81:7b:49:7b:78:c9:05:51:5d:45:51:9d:37: b6:54:c7:9f:af:77:ba:09:52:84:96:c7:0a:1e:40:1c: c1:f7:da:2f:cf:e7:18:b7:df:5f:10:00:9a:0e:df:16: a7:86:07:a0:6c:f9:55:fd:8f:d3:af:51:59:8c:55:4b: 3c:60:15:91:93:07:5e:9f:57:a6:31:06:4e:dd:28:e2: 3b:8c:eb:ad:4d:d1:7e:e9:88:a9:f7:10:62:86:03:bc: dc:df:b4:94:d4:5c:33:0f:c6:23:46:3b:d6:84:9c:95: 2e:76:39:99:a6:37:ff:aa:bd:2a:3b:31:af:7c:6b:85: c6:ba:dd:06:84:73:cd:61:a5:9d:b6:59:9a:1f:76:85 Fingerprint (SHA-256): B3:90:3F:1E:71:CF:82:E4:19:29:A0:7F:5B:94:6B:75:7B:CE:52:E5:78:B1:C8:22:77:FF:E2:FE:0C:7D:5E:0D Fingerprint (SHA1): 85:B6:BA:37:DC:F6:4E:4D:AD:2F:47:37:C3:73:60:FE:29:B6:33:80 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14292: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092756 (0x6715d54) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 14:51:41 2016 Not After : Fri Jan 08 14:51:41 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:1d:4e:db:1d:d3:77:d5:2d:b8:a2:8c:87:e4:6a:b9: 81:bb:21:94:de:dd:e8:67:11:5b:72:78:65:75:30:35: 57:20:49:f8:5d:e0:ba:14:9d:60:20:f4:6d:fd:e8:3d: 83:8e:ab:5e:9c:8b:ff:08:7e:1d:7c:e8:1d:1c:45:78: 07:ec:1e:b9:25:78:f3:51:3f:d4:98:8d:ea:39:21:74: 7c:c8:db:b1:5f:12:65:66:a4:7c:9c:9f:c0:1d:73:15: 2b:9a:60:20:48:91:9b:17:2b:3a:5f:fb:2a:33:0a:98: 1d:5e:6d:83:1f:ef:f5:23:63:cb:87:f8:7d:03:24:7a: c5:ed:10:3c:2c:ee:56:7a:f4:d0:3f:e1:d2:27:21:b4: f4:de:52:c9:cb:92:15:ab:0f:da:da:61:dd:b1:15:72: 03:2e:0c:01:d0:4f:e3:2b:21:19:4e:96:d3:be:3f:24: c2:cb:d4:5a:2f:3a:3d:cf:fa:26:b6:61:22:44:91:7c: ea:d9:a1:2a:93:cc:2e:c4:6d:8c:f4:55:25:a3:86:c0: 51:d4:dc:d9:25:f5:04:6b:57:0e:78:88:b1:b5:d6:53: 01:5b:00:95:aa:55:1f:3e:4e:a9:e6:cc:a2:3b:8b:57: a9:d7:65:9f:26:45:8a:0f:12:a9:7c:e4:a3:3f:f3:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:82:fc:a4:c4:27:7f:9b:a7:ea:4f:28:79:e0:13:ee: 4a:6c:96:94:c1:23:f2:32:cf:25:2a:fa:bc:ac:ca:0f: e0:f2:70:6f:4d:ea:0c:47:02:70:77:e3:57:c7:7d:2e: 8e:59:f9:dd:4c:68:b6:e8:d0:b3:62:c8:34:32:55:2e: 40:33:82:b8:c4:67:30:21:21:61:2d:83:e2:0b:5c:c3: f5:a1:86:d5:65:96:5f:4a:d0:98:ea:7e:c2:50:37:a3: a4:60:87:53:a5:d8:9b:b0:0e:93:f1:53:c2:e9:6c:80: ce:2f:a7:78:88:d6:91:89:99:d6:df:c1:ec:d8:4a:fa: 18:6a:c5:9f:ce:f4:c6:be:92:3d:73:39:3f:c2:b3:25: 7e:6f:d8:82:f8:ca:6c:60:7d:8a:a7:ae:2e:18:1f:d8: ce:13:c6:65:59:44:a8:bc:2d:9a:cc:26:4f:88:f9:86: 4e:e2:0c:49:a7:4a:29:d5:64:9b:fc:c5:ce:4c:f8:44: ef:19:bf:1f:4e:08:74:69:db:89:00:17:aa:c8:a1:fc: 98:4f:4b:da:88:6a:66:51:d7:bf:60:be:ba:30:82:65: 37:c8:95:55:42:50:5f:c4:20:2c:99:0d:82:23:a3:5a: 0e:c5:7e:20:8f:03:03:c3:52:7f:8c:18:90:5e:e1:5f Fingerprint (SHA-256): AD:BE:33:3D:DE:04:89:A7:00:0C:55:C3:E4:23:5A:F7:82:FE:A8:86:78:6B:8F:9B:C4:AB:A2:B7:02:46:83:3C Fingerprint (SHA1): E7:01:B4:69:90:B0:02:AD:38:EE:92:A9:C4:EF:A4:95:05:E4:CA:93 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14293: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092756 (0x6715d54) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 14:51:41 2016 Not After : Fri Jan 08 14:51:41 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:1d:4e:db:1d:d3:77:d5:2d:b8:a2:8c:87:e4:6a:b9: 81:bb:21:94:de:dd:e8:67:11:5b:72:78:65:75:30:35: 57:20:49:f8:5d:e0:ba:14:9d:60:20:f4:6d:fd:e8:3d: 83:8e:ab:5e:9c:8b:ff:08:7e:1d:7c:e8:1d:1c:45:78: 07:ec:1e:b9:25:78:f3:51:3f:d4:98:8d:ea:39:21:74: 7c:c8:db:b1:5f:12:65:66:a4:7c:9c:9f:c0:1d:73:15: 2b:9a:60:20:48:91:9b:17:2b:3a:5f:fb:2a:33:0a:98: 1d:5e:6d:83:1f:ef:f5:23:63:cb:87:f8:7d:03:24:7a: c5:ed:10:3c:2c:ee:56:7a:f4:d0:3f:e1:d2:27:21:b4: f4:de:52:c9:cb:92:15:ab:0f:da:da:61:dd:b1:15:72: 03:2e:0c:01:d0:4f:e3:2b:21:19:4e:96:d3:be:3f:24: c2:cb:d4:5a:2f:3a:3d:cf:fa:26:b6:61:22:44:91:7c: ea:d9:a1:2a:93:cc:2e:c4:6d:8c:f4:55:25:a3:86:c0: 51:d4:dc:d9:25:f5:04:6b:57:0e:78:88:b1:b5:d6:53: 01:5b:00:95:aa:55:1f:3e:4e:a9:e6:cc:a2:3b:8b:57: a9:d7:65:9f:26:45:8a:0f:12:a9:7c:e4:a3:3f:f3:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:82:fc:a4:c4:27:7f:9b:a7:ea:4f:28:79:e0:13:ee: 4a:6c:96:94:c1:23:f2:32:cf:25:2a:fa:bc:ac:ca:0f: e0:f2:70:6f:4d:ea:0c:47:02:70:77:e3:57:c7:7d:2e: 8e:59:f9:dd:4c:68:b6:e8:d0:b3:62:c8:34:32:55:2e: 40:33:82:b8:c4:67:30:21:21:61:2d:83:e2:0b:5c:c3: f5:a1:86:d5:65:96:5f:4a:d0:98:ea:7e:c2:50:37:a3: a4:60:87:53:a5:d8:9b:b0:0e:93:f1:53:c2:e9:6c:80: ce:2f:a7:78:88:d6:91:89:99:d6:df:c1:ec:d8:4a:fa: 18:6a:c5:9f:ce:f4:c6:be:92:3d:73:39:3f:c2:b3:25: 7e:6f:d8:82:f8:ca:6c:60:7d:8a:a7:ae:2e:18:1f:d8: ce:13:c6:65:59:44:a8:bc:2d:9a:cc:26:4f:88:f9:86: 4e:e2:0c:49:a7:4a:29:d5:64:9b:fc:c5:ce:4c:f8:44: ef:19:bf:1f:4e:08:74:69:db:89:00:17:aa:c8:a1:fc: 98:4f:4b:da:88:6a:66:51:d7:bf:60:be:ba:30:82:65: 37:c8:95:55:42:50:5f:c4:20:2c:99:0d:82:23:a3:5a: 0e:c5:7e:20:8f:03:03:c3:52:7f:8c:18:90:5e:e1:5f Fingerprint (SHA-256): AD:BE:33:3D:DE:04:89:A7:00:0C:55:C3:E4:23:5A:F7:82:FE:A8:86:78:6B:8F:9B:C4:AB:A2:B7:02:46:83:3C Fingerprint (SHA1): E7:01:B4:69:90:B0:02:AD:38:EE:92:A9:C4:EF:A4:95:05:E4:CA:93 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14294: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #14295: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092761 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14296: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #14297: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #14298: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092762 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14299: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #14300: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #14301: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14302: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108092763 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14303: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14304: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108092764 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14305: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14306: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #14307: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14308: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14309: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108092765 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-Bridge-108092662.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14310: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14311: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14312: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14313: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108092766 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14314: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14315: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14316: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14317: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108092767 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-BridgeNavy-108092663.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14318: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14319: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14320: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14321: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108092768 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14322: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14323: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #14324: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092761 (0x6715d59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 14:52:49 2016 Not After : Fri Jan 08 14:52:49 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:a2:59:ee:d6:bc:e0:6b:6f:e5:75:04:35:6a:56:dd: f9:85:a6:60:22:17:ef:30:5c:26:5c:ef:8c:2a:2f:82: 28:1b:b1:53:86:f8:1a:4e:a5:1a:6d:85:2a:b0:ac:18: e9:17:85:6b:51:d7:b0:b7:73:b6:c3:d6:e1:7c:b1:95: ca:4f:20:94:da:25:79:77:eb:37:75:d9:e1:fe:0f:e8: cd:56:92:33:be:0a:76:fb:4b:8e:e4:d9:e4:4b:f3:a7: 81:d1:f9:3a:ee:ce:24:9f:bb:7d:4a:a6:33:ed:40:91: 34:63:9d:cc:63:56:b0:27:79:53:bc:53:76:f4:df:be: e5:ae:f2:ae:40:b4:95:fc:06:81:79:46:ac:56:3a:be: 57:fb:bd:cf:ec:31:92:bd:a3:c6:99:64:dc:a7:9e:61: 85:27:da:39:32:c7:ba:82:3e:7a:1d:85:1b:ea:97:a9: 35:3b:ce:a6:8e:d9:55:d3:9c:2b:c1:ce:c7:ce:ed:28: 3d:dc:1c:f2:98:2a:d2:7d:9e:e2:a3:31:20:b1:c0:09: 30:0b:5b:6d:a8:bb:f2:74:6d:bd:42:fc:1b:64:66:c7: 26:3d:91:4c:dc:ad:f2:6c:4f:3b:18:bd:e5:6b:40:40: 3a:b3:43:3a:d7:53:1f:fb:db:ae:22:9d:c6:f4:ca:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:01:5c:1b:f2:35:ca:07:ed:29:c1:ba:21:b9:16:a3: 50:1b:58:3a:83:e2:b5:db:47:3e:86:b4:85:21:a2:81: 16:67:41:83:91:73:4c:c3:59:f0:6e:6e:5f:72:11:f2: 4d:f5:af:15:9e:c1:00:da:e8:94:18:0d:96:01:7d:d5: a0:f0:56:aa:7d:c5:40:44:e8:d2:0d:64:96:6f:80:e0: 12:ba:d4:85:8c:59:f3:ca:6a:d0:7b:64:68:a6:65:2b: b4:49:01:1a:e1:7c:60:02:b8:27:6b:02:cf:c4:1c:08: 8a:66:7b:f2:b8:13:a6:67:85:91:bc:a3:1f:30:ef:44: 4e:b3:d2:f3:02:83:3b:f5:a0:a1:f8:75:74:33:4a:60: fe:37:12:d3:83:ba:13:ee:91:5a:d7:ff:c6:d5:ae:61: 06:3c:f4:af:ec:ae:e8:11:97:bb:4d:ca:a8:59:c4:96: f9:b4:e9:01:1c:be:8b:ea:06:86:1c:bc:1a:6b:31:4a: 1d:ab:14:81:4b:90:f1:b1:82:3b:1c:27:de:f5:42:6e: 19:35:d4:81:05:f9:e4:f9:fc:84:41:5f:23:77:be:68: f6:81:90:61:5f:6e:03:ba:5c:2c:24:71:8c:fd:41:06: 77:ca:3d:42:db:fa:39:ff:0f:69:ff:ca:0d:82:18:16 Fingerprint (SHA-256): E9:CA:DE:E3:BC:93:37:10:1A:0F:43:1E:13:EC:4D:A8:D3:AD:4F:16:FB:E9:8D:41:EF:C9:70:70:8D:AA:6B:DE Fingerprint (SHA1): 53:58:95:E8:F1:27:34:D6:7D:84:90:FE:A5:0C:76:28:6A:E4:10:B9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14325: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092762 (0x6715d5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 14:52:58 2016 Not After : Fri Jan 08 14:52:58 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:59:e8:de:1e:24:4c:cc:19:6e:af:50:1e:83:95:9c: 11:49:52:fd:46:f0:f0:b6:07:d0:b4:b0:bf:cc:0d:0b: 75:79:25:67:7b:38:3e:c6:fb:ae:cc:c3:94:dc:b4:35: 8f:11:24:d1:12:f8:76:84:72:16:84:7f:e9:be:68:f0: b0:3b:6a:01:6a:13:00:40:74:41:e6:75:81:92:0c:10: ca:bf:8d:35:a8:ad:80:6c:28:89:cc:16:22:46:dc:5a: b6:0c:69:7b:f1:d9:0b:f9:77:73:f2:1c:ce:56:05:7a: b6:8e:38:92:d5:69:f8:9c:a6:9f:47:50:5a:38:60:1d: 8d:89:4e:7f:44:7c:28:bb:83:d3:d3:48:5d:05:9f:01: 4f:6d:a5:ee:02:ab:93:1f:f7:e6:11:dc:59:ad:02:e7: 86:cb:c1:b9:fe:8f:99:0c:64:b7:e8:2a:e5:90:65:39: f2:11:09:ed:bf:54:32:42:fa:35:90:da:d3:66:e3:0d: b9:08:62:5a:7e:d1:3a:69:7e:02:6e:f7:f8:b8:bd:ed: 7c:73:3c:33:50:f7:97:48:d6:0f:c9:6c:89:13:f8:8f: dc:c9:64:b1:d4:65:c9:31:84:42:bf:3c:b6:d5:62:e8: 68:d3:98:ed:46:1b:74:8e:3e:6a:98:4f:0e:1e:c3:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:90:8f:9c:1d:ce:19:15:d9:2b:d5:12:43:7d:b3:5b: 1d:68:2a:03:9e:f2:d0:0f:0e:bd:af:a3:1f:6a:6b:c4: a1:f2:7a:00:00:ec:c3:31:00:b2:73:76:14:30:49:fa: d0:ed:01:67:b6:c1:29:14:d0:78:d0:f3:cb:31:3d:50: aa:92:c7:df:a2:11:b1:a8:77:c5:8c:1d:c2:85:d3:21: 0f:cd:32:c8:31:76:38:5b:4c:69:83:74:49:9b:59:90: d1:14:de:94:47:38:c3:d7:90:f9:d7:7c:7b:7e:45:36: 57:96:f6:79:72:7a:82:54:ba:cf:81:87:b2:4b:b5:90: d4:ab:8f:f1:2a:29:75:ed:90:ff:51:78:ce:86:fc:29: d6:33:26:a3:1b:a7:e4:aa:2a:ae:98:9b:a0:36:42:a3: 6a:bd:be:2c:3d:71:6c:91:7b:7f:c1:04:0b:7e:56:b5: 18:a2:ba:7e:69:e6:af:54:04:77:b8:63:da:c7:e6:01: c3:b2:1b:8b:85:23:7b:6a:19:69:2c:9c:c7:5b:70:21: 4b:5d:48:17:ac:b6:3f:19:17:33:b7:7c:c7:71:15:bc: a3:d7:a0:ab:5e:79:94:86:0c:e5:33:98:ad:09:ab:ee: 90:cb:8c:3c:d6:35:47:6b:8b:1d:f2:cf:a8:9e:06:0e Fingerprint (SHA-256): 3A:93:A6:AD:4E:0E:F3:EE:68:24:D6:03:68:DD:C7:1D:C8:C0:01:69:EE:00:44:9F:1C:CD:01:2C:49:8B:3C:79 Fingerprint (SHA1): C5:BB:78:A7:09:2F:14:12:60:B7:6A:72:61:3D:8A:8D:E1:11:25:54 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14326: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092762 (0x6715d5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 14:52:58 2016 Not After : Fri Jan 08 14:52:58 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:59:e8:de:1e:24:4c:cc:19:6e:af:50:1e:83:95:9c: 11:49:52:fd:46:f0:f0:b6:07:d0:b4:b0:bf:cc:0d:0b: 75:79:25:67:7b:38:3e:c6:fb:ae:cc:c3:94:dc:b4:35: 8f:11:24:d1:12:f8:76:84:72:16:84:7f:e9:be:68:f0: b0:3b:6a:01:6a:13:00:40:74:41:e6:75:81:92:0c:10: ca:bf:8d:35:a8:ad:80:6c:28:89:cc:16:22:46:dc:5a: b6:0c:69:7b:f1:d9:0b:f9:77:73:f2:1c:ce:56:05:7a: b6:8e:38:92:d5:69:f8:9c:a6:9f:47:50:5a:38:60:1d: 8d:89:4e:7f:44:7c:28:bb:83:d3:d3:48:5d:05:9f:01: 4f:6d:a5:ee:02:ab:93:1f:f7:e6:11:dc:59:ad:02:e7: 86:cb:c1:b9:fe:8f:99:0c:64:b7:e8:2a:e5:90:65:39: f2:11:09:ed:bf:54:32:42:fa:35:90:da:d3:66:e3:0d: b9:08:62:5a:7e:d1:3a:69:7e:02:6e:f7:f8:b8:bd:ed: 7c:73:3c:33:50:f7:97:48:d6:0f:c9:6c:89:13:f8:8f: dc:c9:64:b1:d4:65:c9:31:84:42:bf:3c:b6:d5:62:e8: 68:d3:98:ed:46:1b:74:8e:3e:6a:98:4f:0e:1e:c3:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:90:8f:9c:1d:ce:19:15:d9:2b:d5:12:43:7d:b3:5b: 1d:68:2a:03:9e:f2:d0:0f:0e:bd:af:a3:1f:6a:6b:c4: a1:f2:7a:00:00:ec:c3:31:00:b2:73:76:14:30:49:fa: d0:ed:01:67:b6:c1:29:14:d0:78:d0:f3:cb:31:3d:50: aa:92:c7:df:a2:11:b1:a8:77:c5:8c:1d:c2:85:d3:21: 0f:cd:32:c8:31:76:38:5b:4c:69:83:74:49:9b:59:90: d1:14:de:94:47:38:c3:d7:90:f9:d7:7c:7b:7e:45:36: 57:96:f6:79:72:7a:82:54:ba:cf:81:87:b2:4b:b5:90: d4:ab:8f:f1:2a:29:75:ed:90:ff:51:78:ce:86:fc:29: d6:33:26:a3:1b:a7:e4:aa:2a:ae:98:9b:a0:36:42:a3: 6a:bd:be:2c:3d:71:6c:91:7b:7f:c1:04:0b:7e:56:b5: 18:a2:ba:7e:69:e6:af:54:04:77:b8:63:da:c7:e6:01: c3:b2:1b:8b:85:23:7b:6a:19:69:2c:9c:c7:5b:70:21: 4b:5d:48:17:ac:b6:3f:19:17:33:b7:7c:c7:71:15:bc: a3:d7:a0:ab:5e:79:94:86:0c:e5:33:98:ad:09:ab:ee: 90:cb:8c:3c:d6:35:47:6b:8b:1d:f2:cf:a8:9e:06:0e Fingerprint (SHA-256): 3A:93:A6:AD:4E:0E:F3:EE:68:24:D6:03:68:DD:C7:1D:C8:C0:01:69:EE:00:44:9F:1C:CD:01:2C:49:8B:3C:79 Fingerprint (SHA1): C5:BB:78:A7:09:2F:14:12:60:B7:6A:72:61:3D:8A:8D:E1:11:25:54 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14327: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #14328: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092761 (0x6715d59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 14:52:49 2016 Not After : Fri Jan 08 14:52:49 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:a2:59:ee:d6:bc:e0:6b:6f:e5:75:04:35:6a:56:dd: f9:85:a6:60:22:17:ef:30:5c:26:5c:ef:8c:2a:2f:82: 28:1b:b1:53:86:f8:1a:4e:a5:1a:6d:85:2a:b0:ac:18: e9:17:85:6b:51:d7:b0:b7:73:b6:c3:d6:e1:7c:b1:95: ca:4f:20:94:da:25:79:77:eb:37:75:d9:e1:fe:0f:e8: cd:56:92:33:be:0a:76:fb:4b:8e:e4:d9:e4:4b:f3:a7: 81:d1:f9:3a:ee:ce:24:9f:bb:7d:4a:a6:33:ed:40:91: 34:63:9d:cc:63:56:b0:27:79:53:bc:53:76:f4:df:be: e5:ae:f2:ae:40:b4:95:fc:06:81:79:46:ac:56:3a:be: 57:fb:bd:cf:ec:31:92:bd:a3:c6:99:64:dc:a7:9e:61: 85:27:da:39:32:c7:ba:82:3e:7a:1d:85:1b:ea:97:a9: 35:3b:ce:a6:8e:d9:55:d3:9c:2b:c1:ce:c7:ce:ed:28: 3d:dc:1c:f2:98:2a:d2:7d:9e:e2:a3:31:20:b1:c0:09: 30:0b:5b:6d:a8:bb:f2:74:6d:bd:42:fc:1b:64:66:c7: 26:3d:91:4c:dc:ad:f2:6c:4f:3b:18:bd:e5:6b:40:40: 3a:b3:43:3a:d7:53:1f:fb:db:ae:22:9d:c6:f4:ca:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:01:5c:1b:f2:35:ca:07:ed:29:c1:ba:21:b9:16:a3: 50:1b:58:3a:83:e2:b5:db:47:3e:86:b4:85:21:a2:81: 16:67:41:83:91:73:4c:c3:59:f0:6e:6e:5f:72:11:f2: 4d:f5:af:15:9e:c1:00:da:e8:94:18:0d:96:01:7d:d5: a0:f0:56:aa:7d:c5:40:44:e8:d2:0d:64:96:6f:80:e0: 12:ba:d4:85:8c:59:f3:ca:6a:d0:7b:64:68:a6:65:2b: b4:49:01:1a:e1:7c:60:02:b8:27:6b:02:cf:c4:1c:08: 8a:66:7b:f2:b8:13:a6:67:85:91:bc:a3:1f:30:ef:44: 4e:b3:d2:f3:02:83:3b:f5:a0:a1:f8:75:74:33:4a:60: fe:37:12:d3:83:ba:13:ee:91:5a:d7:ff:c6:d5:ae:61: 06:3c:f4:af:ec:ae:e8:11:97:bb:4d:ca:a8:59:c4:96: f9:b4:e9:01:1c:be:8b:ea:06:86:1c:bc:1a:6b:31:4a: 1d:ab:14:81:4b:90:f1:b1:82:3b:1c:27:de:f5:42:6e: 19:35:d4:81:05:f9:e4:f9:fc:84:41:5f:23:77:be:68: f6:81:90:61:5f:6e:03:ba:5c:2c:24:71:8c:fd:41:06: 77:ca:3d:42:db:fa:39:ff:0f:69:ff:ca:0d:82:18:16 Fingerprint (SHA-256): E9:CA:DE:E3:BC:93:37:10:1A:0F:43:1E:13:EC:4D:A8:D3:AD:4F:16:FB:E9:8D:41:EF:C9:70:70:8D:AA:6B:DE Fingerprint (SHA1): 53:58:95:E8:F1:27:34:D6:7D:84:90:FE:A5:0C:76:28:6A:E4:10:B9 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14329: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092762 (0x6715d5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 14:52:58 2016 Not After : Fri Jan 08 14:52:58 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:59:e8:de:1e:24:4c:cc:19:6e:af:50:1e:83:95:9c: 11:49:52:fd:46:f0:f0:b6:07:d0:b4:b0:bf:cc:0d:0b: 75:79:25:67:7b:38:3e:c6:fb:ae:cc:c3:94:dc:b4:35: 8f:11:24:d1:12:f8:76:84:72:16:84:7f:e9:be:68:f0: b0:3b:6a:01:6a:13:00:40:74:41:e6:75:81:92:0c:10: ca:bf:8d:35:a8:ad:80:6c:28:89:cc:16:22:46:dc:5a: b6:0c:69:7b:f1:d9:0b:f9:77:73:f2:1c:ce:56:05:7a: b6:8e:38:92:d5:69:f8:9c:a6:9f:47:50:5a:38:60:1d: 8d:89:4e:7f:44:7c:28:bb:83:d3:d3:48:5d:05:9f:01: 4f:6d:a5:ee:02:ab:93:1f:f7:e6:11:dc:59:ad:02:e7: 86:cb:c1:b9:fe:8f:99:0c:64:b7:e8:2a:e5:90:65:39: f2:11:09:ed:bf:54:32:42:fa:35:90:da:d3:66:e3:0d: b9:08:62:5a:7e:d1:3a:69:7e:02:6e:f7:f8:b8:bd:ed: 7c:73:3c:33:50:f7:97:48:d6:0f:c9:6c:89:13:f8:8f: dc:c9:64:b1:d4:65:c9:31:84:42:bf:3c:b6:d5:62:e8: 68:d3:98:ed:46:1b:74:8e:3e:6a:98:4f:0e:1e:c3:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:90:8f:9c:1d:ce:19:15:d9:2b:d5:12:43:7d:b3:5b: 1d:68:2a:03:9e:f2:d0:0f:0e:bd:af:a3:1f:6a:6b:c4: a1:f2:7a:00:00:ec:c3:31:00:b2:73:76:14:30:49:fa: d0:ed:01:67:b6:c1:29:14:d0:78:d0:f3:cb:31:3d:50: aa:92:c7:df:a2:11:b1:a8:77:c5:8c:1d:c2:85:d3:21: 0f:cd:32:c8:31:76:38:5b:4c:69:83:74:49:9b:59:90: d1:14:de:94:47:38:c3:d7:90:f9:d7:7c:7b:7e:45:36: 57:96:f6:79:72:7a:82:54:ba:cf:81:87:b2:4b:b5:90: d4:ab:8f:f1:2a:29:75:ed:90:ff:51:78:ce:86:fc:29: d6:33:26:a3:1b:a7:e4:aa:2a:ae:98:9b:a0:36:42:a3: 6a:bd:be:2c:3d:71:6c:91:7b:7f:c1:04:0b:7e:56:b5: 18:a2:ba:7e:69:e6:af:54:04:77:b8:63:da:c7:e6:01: c3:b2:1b:8b:85:23:7b:6a:19:69:2c:9c:c7:5b:70:21: 4b:5d:48:17:ac:b6:3f:19:17:33:b7:7c:c7:71:15:bc: a3:d7:a0:ab:5e:79:94:86:0c:e5:33:98:ad:09:ab:ee: 90:cb:8c:3c:d6:35:47:6b:8b:1d:f2:cf:a8:9e:06:0e Fingerprint (SHA-256): 3A:93:A6:AD:4E:0E:F3:EE:68:24:D6:03:68:DD:C7:1D:C8:C0:01:69:EE:00:44:9F:1C:CD:01:2C:49:8B:3C:79 Fingerprint (SHA1): C5:BB:78:A7:09:2F:14:12:60:B7:6A:72:61:3D:8A:8D:E1:11:25:54 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14330: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092762 (0x6715d5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 14:52:58 2016 Not After : Fri Jan 08 14:52:58 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:59:e8:de:1e:24:4c:cc:19:6e:af:50:1e:83:95:9c: 11:49:52:fd:46:f0:f0:b6:07:d0:b4:b0:bf:cc:0d:0b: 75:79:25:67:7b:38:3e:c6:fb:ae:cc:c3:94:dc:b4:35: 8f:11:24:d1:12:f8:76:84:72:16:84:7f:e9:be:68:f0: b0:3b:6a:01:6a:13:00:40:74:41:e6:75:81:92:0c:10: ca:bf:8d:35:a8:ad:80:6c:28:89:cc:16:22:46:dc:5a: b6:0c:69:7b:f1:d9:0b:f9:77:73:f2:1c:ce:56:05:7a: b6:8e:38:92:d5:69:f8:9c:a6:9f:47:50:5a:38:60:1d: 8d:89:4e:7f:44:7c:28:bb:83:d3:d3:48:5d:05:9f:01: 4f:6d:a5:ee:02:ab:93:1f:f7:e6:11:dc:59:ad:02:e7: 86:cb:c1:b9:fe:8f:99:0c:64:b7:e8:2a:e5:90:65:39: f2:11:09:ed:bf:54:32:42:fa:35:90:da:d3:66:e3:0d: b9:08:62:5a:7e:d1:3a:69:7e:02:6e:f7:f8:b8:bd:ed: 7c:73:3c:33:50:f7:97:48:d6:0f:c9:6c:89:13:f8:8f: dc:c9:64:b1:d4:65:c9:31:84:42:bf:3c:b6:d5:62:e8: 68:d3:98:ed:46:1b:74:8e:3e:6a:98:4f:0e:1e:c3:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:90:8f:9c:1d:ce:19:15:d9:2b:d5:12:43:7d:b3:5b: 1d:68:2a:03:9e:f2:d0:0f:0e:bd:af:a3:1f:6a:6b:c4: a1:f2:7a:00:00:ec:c3:31:00:b2:73:76:14:30:49:fa: d0:ed:01:67:b6:c1:29:14:d0:78:d0:f3:cb:31:3d:50: aa:92:c7:df:a2:11:b1:a8:77:c5:8c:1d:c2:85:d3:21: 0f:cd:32:c8:31:76:38:5b:4c:69:83:74:49:9b:59:90: d1:14:de:94:47:38:c3:d7:90:f9:d7:7c:7b:7e:45:36: 57:96:f6:79:72:7a:82:54:ba:cf:81:87:b2:4b:b5:90: d4:ab:8f:f1:2a:29:75:ed:90:ff:51:78:ce:86:fc:29: d6:33:26:a3:1b:a7:e4:aa:2a:ae:98:9b:a0:36:42:a3: 6a:bd:be:2c:3d:71:6c:91:7b:7f:c1:04:0b:7e:56:b5: 18:a2:ba:7e:69:e6:af:54:04:77:b8:63:da:c7:e6:01: c3:b2:1b:8b:85:23:7b:6a:19:69:2c:9c:c7:5b:70:21: 4b:5d:48:17:ac:b6:3f:19:17:33:b7:7c:c7:71:15:bc: a3:d7:a0:ab:5e:79:94:86:0c:e5:33:98:ad:09:ab:ee: 90:cb:8c:3c:d6:35:47:6b:8b:1d:f2:cf:a8:9e:06:0e Fingerprint (SHA-256): 3A:93:A6:AD:4E:0E:F3:EE:68:24:D6:03:68:DD:C7:1D:C8:C0:01:69:EE:00:44:9F:1C:CD:01:2C:49:8B:3C:79 Fingerprint (SHA1): C5:BB:78:A7:09:2F:14:12:60:B7:6A:72:61:3D:8A:8D:E1:11:25:54 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14331: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #14332: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092769 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14333: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #14334: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #14335: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092770 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14336: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #14337: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #14338: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14339: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 108092771 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14340: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14341: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #14342: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14343: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 108092772 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14344: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14345: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #14346: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14347: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 108092773 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #14348: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14349: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 108092774 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #14350: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14351: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #14352: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14353: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14354: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108092775 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14355: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14356: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14357: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14358: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108092776 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14359: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14360: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14361: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14362: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108092777 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14363: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14364: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14365: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14366: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108092778 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14367: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14368: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14369: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092769 (0x6715d61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 14:54:07 2016 Not After : Fri Jan 08 14:54:07 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:dc:14:17:1a:75:86:d6:f9:fb:1b:3b:32:6b:26:54: ad:1a:48:1d:0c:04:32:73:40:b7:9f:51:06:86:79:4c: 80:05:f2:9c:0b:16:38:a8:8e:93:2d:e5:1b:0a:93:e1: 4b:f7:0c:07:83:24:64:00:79:ce:99:3e:7c:cd:02:89: 8e:ab:0c:15:b8:f9:5a:1d:f8:3a:3d:95:b9:4f:bc:c1: a3:fd:51:dd:b1:af:29:fa:6b:23:a6:51:82:2a:f1:ef: 5e:f2:3a:5a:c2:b9:a0:8d:96:ed:2f:1f:95:0f:9c:e4: 20:83:1a:d5:a6:7e:61:f0:b9:4e:71:46:af:3a:12:a0: 52:f9:01:07:c4:70:c9:d4:78:d6:88:a8:af:6d:23:ba: 9a:17:ef:d3:b9:a4:43:53:e6:39:85:20:ef:12:01:10: ed:bb:02:fe:11:29:6d:67:cf:80:c8:ee:72:4f:64:04: 61:d7:62:03:1b:2c:0d:cc:39:bb:ce:2c:92:a7:4e:f7: 83:72:37:99:fe:2d:3f:76:cd:0f:3c:0a:4b:76:8d:4a: fd:4f:ba:a1:77:36:3f:d0:4c:89:43:a1:78:01:9e:ef: 27:fb:40:28:6d:0a:06:ac:17:7f:cb:9b:42:b1:f7:ac: 5e:f1:da:b5:08:28:0f:92:3e:0d:de:41:1d:7a:23:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:a9:d8:47:f0:a2:63:07:7a:1b:8e:0f:bd:58:db:22: 5b:3a:42:29:22:08:91:c1:e5:8e:c0:fc:c6:16:8a:dc: f1:44:e0:a9:70:df:d9:be:6a:28:65:e7:f5:34:ef:0c: 04:32:d9:c2:63:72:7d:fb:5a:f8:ec:eb:ee:0c:3d:cf: 0e:90:8b:0e:ad:75:b5:03:d4:6d:be:32:f5:dd:e4:c6: 73:03:06:6a:b8:97:79:2f:d6:db:41:7b:c2:25:58:60: 3b:a9:1d:c1:53:e3:a6:5d:62:5e:ae:3c:b3:34:7b:4c: e9:0f:5c:b0:69:64:4b:a8:02:10:0c:a1:41:d5:b0:9e: 48:83:7a:4a:94:d0:9b:78:6c:8f:dc:8e:ed:4a:fc:91: 43:79:b0:30:a7:1d:b0:09:ca:0d:4c:0c:a7:c1:ae:48: 6c:8b:99:21:0b:1b:07:55:bb:a7:c7:57:ae:ad:de:16: 0a:96:67:ba:15:76:8e:a6:0d:a4:6a:8d:59:4f:da:57: 7b:10:25:dd:13:15:6b:83:0d:2d:84:db:6d:06:f3:95: 53:13:4b:46:88:fb:b8:6f:34:65:b7:c2:d9:c2:11:6d: 07:9d:f3:f2:91:65:2c:94:32:c4:f5:54:c6:37:4b:ef: f5:7f:e2:dd:9b:a6:da:a3:20:0e:c4:7d:32:e8:78:00 Fingerprint (SHA-256): 1F:FC:8A:07:A8:58:72:2E:68:F3:36:F9:C1:20:D4:64:EA:B1:4E:4B:B1:C1:E3:E4:42:1E:33:CA:30:47:32:16 Fingerprint (SHA1): 2C:33:DE:C3:1B:51:1A:45:33:C9:D8:71:E4:75:D0:20:80:D9:24:B2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #14370: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14371: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14372: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14373: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14374: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14375: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14376: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14377: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14378: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092770 (0x6715d62) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 14:54:13 2016 Not After : Fri Jan 08 14:54:13 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:e1:2a:25:7b:cd:64:ae:e3:ff:89:68:c6:84:d7:ee: 6c:ed:c0:c6:0f:2f:57:0f:3d:9b:8b:be:4d:5b:11:78: 43:fa:95:8c:dc:93:22:78:38:e2:68:36:6e:b9:d1:07: d5:55:f2:52:06:ff:44:87:ee:39:dd:51:52:4a:86:5a: 1f:93:9b:72:74:b0:85:b0:04:6c:1e:58:9c:4d:29:d2: d0:7e:50:a6:46:35:55:94:03:a8:47:b1:d2:1a:56:b2: e5:c9:9a:64:5e:1c:e7:ac:20:27:73:d1:64:58:4e:0b: 5b:92:08:23:eb:cd:fe:51:26:98:65:e6:9d:d3:ea:36: e0:28:42:e0:7a:41:03:52:86:68:0f:b8:d7:b8:23:34: 3d:66:a4:ab:a7:fb:ea:b3:e0:cc:c7:6e:78:30:ba:2e: 4f:08:ac:35:46:ec:b9:fd:ae:6a:98:32:2e:07:73:35: 08:75:1d:58:ba:e5:88:4f:81:a7:95:69:fa:a6:7f:2d: 4b:dc:a2:f2:b3:6c:03:31:d3:5d:75:71:0c:1d:cb:3d: 8f:65:b4:22:3b:66:25:3b:a7:40:78:0f:f2:17:2c:e3: 32:20:9a:bc:a4:0a:8f:81:ab:4d:17:df:f4:7f:0d:43: 51:22:08:9a:17:16:21:b9:1f:dd:34:f7:09:43:bd:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:c3:ad:63:f1:0d:36:27:21:d3:9b:a1:8d:95:95:16: 9a:d0:9a:24:ed:a1:a8:e8:51:b7:14:bd:9f:32:b3:f2: 50:8d:3a:2e:8e:d1:ed:f5:56:07:e5:d9:85:14:48:96: 0b:3c:f2:7d:64:52:da:a9:aa:31:f1:5d:17:8e:db:8a: 0e:8b:69:00:7e:2b:67:69:86:c3:a3:79:1e:4a:cc:16: d7:16:4c:6c:4d:4c:a7:0d:ea:b1:d4:14:6b:7c:43:39: 97:ae:6c:db:80:64:5b:48:af:ab:1a:e9:07:84:93:44: a8:eb:cb:cd:b2:a4:92:88:84:fc:c1:b6:60:fa:a2:52: ad:36:9a:79:3d:00:9b:3f:9f:55:f2:1d:46:36:f7:32: 99:19:06:af:30:58:7e:f9:24:bf:52:d3:6d:fb:38:16: ce:b5:f3:5f:2d:16:3a:33:73:9e:ce:63:6b:b7:8a:36: 95:f5:b4:5c:6c:4b:ff:cf:a7:c3:97:47:a0:86:29:7d: fd:0c:92:4d:69:da:64:f4:cd:c7:80:61:6d:10:b4:f4: fc:53:69:75:6d:05:c3:86:34:8b:dc:97:8d:e4:ee:18: 21:06:c2:ae:d8:39:c3:b7:da:31:d5:95:d9:40:29:44: e5:2c:25:34:b6:1f:da:35:11:06:2b:c3:af:27:c9:e7 Fingerprint (SHA-256): 65:49:62:01:5B:CC:9B:6D:BA:EE:2B:62:1F:DA:9D:7C:66:79:63:77:1B:82:DC:DE:19:A6:92:D2:04:DB:D2:F5 Fingerprint (SHA1): 5E:77:6A:63:8C:75:3A:D6:85:9A:B4:21:86:0C:75:1A:24:C1:02:85 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #14379: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14380: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14381: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14382: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14383: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14384: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14385: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #14386: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #14387: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #14388: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #14389: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #14390: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #14391: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #14392: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #14393: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #14394: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #14395: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #14396: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14397: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092779 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14398: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14399: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14400: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14401: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108092780 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14402: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14403: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14404: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14405: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108092781 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14406: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14407: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14408: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14409: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 108092782 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14410: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14411: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14412: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14413: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108092783 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14414: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14415: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #14416: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14417: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 108092784 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14418: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14419: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #14420: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14421: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 108092785 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14422: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14423: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #14424: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14425: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 108092786 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14426: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14427: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #14428: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14429: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 108092787 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14430: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14431: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14432: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092779 (0x6715d6b) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:56:13 2016 Not After : Fri Jan 08 14:56:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 40:5d:4f:ff:fc:97:4c:87:92:f3:42:7c:33:2e:51:f9: b7:ad:a7:c6:c4:57:e3:02:fc:05:fa:98:b1:25:4f:88: 17:bd:78:7b:18:87:b7:18:ca:f4:dd:99:80:72:bb:41: 20:23:88:1d:ea:72:33:b9:9b:5a:d4:79:52:c3:40:3b: 12:a8:aa:f3:1a:c9:76:30:83:00:4d:36:5c:e9:e7:3f: e1:dc:12:77:98:cf:ee:24:09:e1:a8:af:a0:f7:b5:71: 04:7e:34:53:63:cd:66:14:49:68:be:91:2d:c8:b2:a5: 6b:f5:66:31:1c:28:1c:c1:ec:a8:3b:90:af:6c:3b:f4: 2e:b4:c4:e0:d8:ca:a7:84:12:81:40:54:16:50:cd:95: ee:64:e1:95:44:56:f6:6c:aa:91:59:a7:63:02:95:f5: df:49:12:4f:82:55:3e:3b:51:a9:b2:06:ef:15:3c:b9: cd:5d:9f:3a:af:6e:be:6a:f2:94:42:80:79:0e:18:9d: 8f:6a:89:4e:76:34:fc:c1:cd:63:e6:c0:f8:06:8b:21: 4d:39:21:15:1c:e1:72:09:00:a8:4d:a5:7a:ee:c1:52: 1b:99:ee:d0:ee:89:65:e0:61:9f:be:85:ed:1b:7f:66: b0:c9:f0:da:c8:48:9a:9f:07:be:be:82:ba:0c:90:96 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:ab:b2:45:09:13:51:34:2a:11:30:79: 8b:37:c7:95:1d:c5:f5:ff:cb:c4:ba:82:ef:68:8b:91: ec:02:1d:00:bd:b6:32:dc:68:5c:bf:6d:32:e2:7b:9e: 8c:80:69:94:81:0b:11:85:6a:b4:b8:3a:3f:8a:79:ab Fingerprint (SHA-256): D5:81:04:31:8D:A4:CF:B9:07:27:E2:55:8D:5E:6A:32:CE:AE:B8:79:F5:A7:B5:6B:DA:E3:48:B0:1A:2B:66:A3 Fingerprint (SHA1): 85:54:90:77:53:AA:14:A8:F8:42:62:E1:12:F2:AE:BB:C7:84:83:FB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14433: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092779 (0x6715d6b) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:56:13 2016 Not After : Fri Jan 08 14:56:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 40:5d:4f:ff:fc:97:4c:87:92:f3:42:7c:33:2e:51:f9: b7:ad:a7:c6:c4:57:e3:02:fc:05:fa:98:b1:25:4f:88: 17:bd:78:7b:18:87:b7:18:ca:f4:dd:99:80:72:bb:41: 20:23:88:1d:ea:72:33:b9:9b:5a:d4:79:52:c3:40:3b: 12:a8:aa:f3:1a:c9:76:30:83:00:4d:36:5c:e9:e7:3f: e1:dc:12:77:98:cf:ee:24:09:e1:a8:af:a0:f7:b5:71: 04:7e:34:53:63:cd:66:14:49:68:be:91:2d:c8:b2:a5: 6b:f5:66:31:1c:28:1c:c1:ec:a8:3b:90:af:6c:3b:f4: 2e:b4:c4:e0:d8:ca:a7:84:12:81:40:54:16:50:cd:95: ee:64:e1:95:44:56:f6:6c:aa:91:59:a7:63:02:95:f5: df:49:12:4f:82:55:3e:3b:51:a9:b2:06:ef:15:3c:b9: cd:5d:9f:3a:af:6e:be:6a:f2:94:42:80:79:0e:18:9d: 8f:6a:89:4e:76:34:fc:c1:cd:63:e6:c0:f8:06:8b:21: 4d:39:21:15:1c:e1:72:09:00:a8:4d:a5:7a:ee:c1:52: 1b:99:ee:d0:ee:89:65:e0:61:9f:be:85:ed:1b:7f:66: b0:c9:f0:da:c8:48:9a:9f:07:be:be:82:ba:0c:90:96 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:ab:b2:45:09:13:51:34:2a:11:30:79: 8b:37:c7:95:1d:c5:f5:ff:cb:c4:ba:82:ef:68:8b:91: ec:02:1d:00:bd:b6:32:dc:68:5c:bf:6d:32:e2:7b:9e: 8c:80:69:94:81:0b:11:85:6a:b4:b8:3a:3f:8a:79:ab Fingerprint (SHA-256): D5:81:04:31:8D:A4:CF:B9:07:27:E2:55:8D:5E:6A:32:CE:AE:B8:79:F5:A7:B5:6B:DA:E3:48:B0:1A:2B:66:A3 Fingerprint (SHA1): 85:54:90:77:53:AA:14:A8:F8:42:62:E1:12:F2:AE:BB:C7:84:83:FB Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14434: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092779 (0x6715d6b) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:56:13 2016 Not After : Fri Jan 08 14:56:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 40:5d:4f:ff:fc:97:4c:87:92:f3:42:7c:33:2e:51:f9: b7:ad:a7:c6:c4:57:e3:02:fc:05:fa:98:b1:25:4f:88: 17:bd:78:7b:18:87:b7:18:ca:f4:dd:99:80:72:bb:41: 20:23:88:1d:ea:72:33:b9:9b:5a:d4:79:52:c3:40:3b: 12:a8:aa:f3:1a:c9:76:30:83:00:4d:36:5c:e9:e7:3f: e1:dc:12:77:98:cf:ee:24:09:e1:a8:af:a0:f7:b5:71: 04:7e:34:53:63:cd:66:14:49:68:be:91:2d:c8:b2:a5: 6b:f5:66:31:1c:28:1c:c1:ec:a8:3b:90:af:6c:3b:f4: 2e:b4:c4:e0:d8:ca:a7:84:12:81:40:54:16:50:cd:95: ee:64:e1:95:44:56:f6:6c:aa:91:59:a7:63:02:95:f5: df:49:12:4f:82:55:3e:3b:51:a9:b2:06:ef:15:3c:b9: cd:5d:9f:3a:af:6e:be:6a:f2:94:42:80:79:0e:18:9d: 8f:6a:89:4e:76:34:fc:c1:cd:63:e6:c0:f8:06:8b:21: 4d:39:21:15:1c:e1:72:09:00:a8:4d:a5:7a:ee:c1:52: 1b:99:ee:d0:ee:89:65:e0:61:9f:be:85:ed:1b:7f:66: b0:c9:f0:da:c8:48:9a:9f:07:be:be:82:ba:0c:90:96 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:ab:b2:45:09:13:51:34:2a:11:30:79: 8b:37:c7:95:1d:c5:f5:ff:cb:c4:ba:82:ef:68:8b:91: ec:02:1d:00:bd:b6:32:dc:68:5c:bf:6d:32:e2:7b:9e: 8c:80:69:94:81:0b:11:85:6a:b4:b8:3a:3f:8a:79:ab Fingerprint (SHA-256): D5:81:04:31:8D:A4:CF:B9:07:27:E2:55:8D:5E:6A:32:CE:AE:B8:79:F5:A7:B5:6B:DA:E3:48:B0:1A:2B:66:A3 Fingerprint (SHA1): 85:54:90:77:53:AA:14:A8:F8:42:62:E1:12:F2:AE:BB:C7:84:83:FB Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #14435: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092779 (0x6715d6b) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:56:13 2016 Not After : Fri Jan 08 14:56:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 40:5d:4f:ff:fc:97:4c:87:92:f3:42:7c:33:2e:51:f9: b7:ad:a7:c6:c4:57:e3:02:fc:05:fa:98:b1:25:4f:88: 17:bd:78:7b:18:87:b7:18:ca:f4:dd:99:80:72:bb:41: 20:23:88:1d:ea:72:33:b9:9b:5a:d4:79:52:c3:40:3b: 12:a8:aa:f3:1a:c9:76:30:83:00:4d:36:5c:e9:e7:3f: e1:dc:12:77:98:cf:ee:24:09:e1:a8:af:a0:f7:b5:71: 04:7e:34:53:63:cd:66:14:49:68:be:91:2d:c8:b2:a5: 6b:f5:66:31:1c:28:1c:c1:ec:a8:3b:90:af:6c:3b:f4: 2e:b4:c4:e0:d8:ca:a7:84:12:81:40:54:16:50:cd:95: ee:64:e1:95:44:56:f6:6c:aa:91:59:a7:63:02:95:f5: df:49:12:4f:82:55:3e:3b:51:a9:b2:06:ef:15:3c:b9: cd:5d:9f:3a:af:6e:be:6a:f2:94:42:80:79:0e:18:9d: 8f:6a:89:4e:76:34:fc:c1:cd:63:e6:c0:f8:06:8b:21: 4d:39:21:15:1c:e1:72:09:00:a8:4d:a5:7a:ee:c1:52: 1b:99:ee:d0:ee:89:65:e0:61:9f:be:85:ed:1b:7f:66: b0:c9:f0:da:c8:48:9a:9f:07:be:be:82:ba:0c:90:96 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:ab:b2:45:09:13:51:34:2a:11:30:79: 8b:37:c7:95:1d:c5:f5:ff:cb:c4:ba:82:ef:68:8b:91: ec:02:1d:00:bd:b6:32:dc:68:5c:bf:6d:32:e2:7b:9e: 8c:80:69:94:81:0b:11:85:6a:b4:b8:3a:3f:8a:79:ab Fingerprint (SHA-256): D5:81:04:31:8D:A4:CF:B9:07:27:E2:55:8D:5E:6A:32:CE:AE:B8:79:F5:A7:B5:6B:DA:E3:48:B0:1A:2B:66:A3 Fingerprint (SHA1): 85:54:90:77:53:AA:14:A8:F8:42:62:E1:12:F2:AE:BB:C7:84:83:FB Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #14436: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14437: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14438: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14439: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #14440: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14441: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14442: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14443: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14444: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14445: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14446: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14447: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #14448: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14449: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14450: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14451: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #14452: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14453: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14454: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14455: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14456: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14457: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14458: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14459: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #14460: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14461: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14462: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14463: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108145809Z nextupdate=20170108145809Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 14:58:09 2016 Next Update: Sun Jan 08 14:58:09 2017 CRL Extensions: chains.sh: #14464: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108145809Z nextupdate=20170108145809Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 14:58:09 2016 Next Update: Sun Jan 08 14:58:09 2017 CRL Extensions: chains.sh: #14465: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108145810Z nextupdate=20170108145810Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 14:58:10 2016 Next Update: Sun Jan 08 14:58:10 2017 CRL Extensions: chains.sh: #14466: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108145811Z nextupdate=20170108145811Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 14:58:11 2016 Next Update: Sun Jan 08 14:58:11 2017 CRL Extensions: chains.sh: #14467: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108145812Z addcert 14 20160108145812Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 14:58:12 2016 Next Update: Sun Jan 08 14:58:10 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Jan 08 14:58:12 2016 CRL Extensions: chains.sh: #14468: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108145813Z addcert 15 20160108145813Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 14:58:13 2016 Next Update: Sun Jan 08 14:58:09 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Jan 08 14:58:13 2016 CRL Extensions: chains.sh: #14469: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14470: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14471: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #14472: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #14473: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #14474: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #14475: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #14476: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #14477: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #14478: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:57:09 2016 Not After : Fri Jan 08 14:57:09 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:62:5d:d2:cd:db:e3:b0:64:ca:e1:4e:50:2d:25:92: d6:9a:9e:e9:82:99:3e:b1:36:43:01:b3:1f:14:9e:cd: 53:c6:a5:61:5e:f4:29:13:c8:36:07:96:3d:30:b5:b8: 5b:2a:d7:65:56:9d:98:ee:e9:e9:b8:62:e0:36:7a:8b: 54:45:ba:b7:49:7a:ab:d4:c0:3d:c2:54:81:19:43:b4: 49:e9:ce:98:1b:53:eb:07:13:46:f5:83:73:d1:86:17: f6:cf:dc:67:eb:4d:f5:c9:a1:c3:3d:46:53:52:5c:0b: 6b:39:9d:bb:39:cb:25:07:39:a6:3b:b1:18:9c:cf:06: 96:08:05:fa:4d:74:7e:19:a3:ce:7b:fc:cf:f6:3a:78: 53:41:4d:04:e8:d0:8c:51:af:9d:c7:35:cd:5d:6f:d8: 83:55:2d:e8:63:9b:9d:ea:c6:c8:4d:fc:82:dd:76:a1: d7:ab:e5:07:8b:79:97:80:d4:88:6a:c3:12:11:78:6f: f1:ad:2c:23:f5:ea:96:fd:07:6d:4a:da:7c:7a:1a:58: a2:84:55:cc:b5:2a:ae:97:64:90:f7:23:eb:79:bc:10: 7c:a8:a8:fc:b8:72:84:92:a4:26:63:2d:44:91:a3:89: 0a:5d:ec:5c:97:5d:da:4f:24:56:86:b4:fc:31:27:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:35:8b:42:a8:87:8e:49:e9:6a:4f:73:24:12:75:c2: 4a:8f:33:38:02:cb:09:ef:e1:88:6c:63:df:46:0d:ba: 90:0d:16:d7:2d:7e:b4:fd:c3:8b:b8:b5:18:cf:20:73: b5:b5:62:62:f0:b1:52:04:fb:49:cd:35:42:89:4f:fd: ee:d2:ab:a4:46:67:fe:bf:27:58:71:1f:39:65:ae:5e: 2c:6b:6d:13:54:e7:50:6a:28:44:26:ab:b6:7e:fc:0c: 30:d6:79:39:1e:55:be:5b:cd:11:43:0a:77:df:c4:f3: 22:14:2d:96:48:48:b0:c9:59:7c:4d:f5:85:ed:99:45: 21:8b:a0:44:6d:3d:29:e7:09:bf:cc:13:c3:1a:d3:3b: a2:31:8b:1c:3b:28:8b:43:f6:02:d9:09:7a:83:3b:77: d5:c1:c8:08:12:89:04:d2:ed:e3:3f:82:99:e6:e6:0a: 6f:e1:02:39:e7:b0:a3:4d:d2:8e:59:73:e1:a6:cb:92: 20:37:77:a1:c7:81:56:ab:5c:80:a9:34:0d:8e:3e:71: b1:f4:64:6d:b1:0d:9b:44:2c:d6:05:8a:bb:fc:0c:ba: 51:31:95:e9:50:17:17:6c:5b:0d:6b:1a:a2:ff:93:a5: 52:22:6b:19:cc:ac:de:7a:04:5a:31:9c:07:b6:81:f6 Fingerprint (SHA-256): 43:BD:1D:57:51:0D:AC:F8:4B:96:B1:22:B0:D2:A9:7C:1D:E2:27:87:D0:62:7D:7C:75:07:57:2C:C1:75:97:15 Fingerprint (SHA1): BD:2D:B7:19:6F:49:82:5D:AD:D5:93:32:47:A8:AA:F6:82:1C:7F:B3 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #14479: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #14480: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:57:09 2016 Not After : Fri Jan 08 14:57:09 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:62:5d:d2:cd:db:e3:b0:64:ca:e1:4e:50:2d:25:92: d6:9a:9e:e9:82:99:3e:b1:36:43:01:b3:1f:14:9e:cd: 53:c6:a5:61:5e:f4:29:13:c8:36:07:96:3d:30:b5:b8: 5b:2a:d7:65:56:9d:98:ee:e9:e9:b8:62:e0:36:7a:8b: 54:45:ba:b7:49:7a:ab:d4:c0:3d:c2:54:81:19:43:b4: 49:e9:ce:98:1b:53:eb:07:13:46:f5:83:73:d1:86:17: f6:cf:dc:67:eb:4d:f5:c9:a1:c3:3d:46:53:52:5c:0b: 6b:39:9d:bb:39:cb:25:07:39:a6:3b:b1:18:9c:cf:06: 96:08:05:fa:4d:74:7e:19:a3:ce:7b:fc:cf:f6:3a:78: 53:41:4d:04:e8:d0:8c:51:af:9d:c7:35:cd:5d:6f:d8: 83:55:2d:e8:63:9b:9d:ea:c6:c8:4d:fc:82:dd:76:a1: d7:ab:e5:07:8b:79:97:80:d4:88:6a:c3:12:11:78:6f: f1:ad:2c:23:f5:ea:96:fd:07:6d:4a:da:7c:7a:1a:58: a2:84:55:cc:b5:2a:ae:97:64:90:f7:23:eb:79:bc:10: 7c:a8:a8:fc:b8:72:84:92:a4:26:63:2d:44:91:a3:89: 0a:5d:ec:5c:97:5d:da:4f:24:56:86:b4:fc:31:27:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:35:8b:42:a8:87:8e:49:e9:6a:4f:73:24:12:75:c2: 4a:8f:33:38:02:cb:09:ef:e1:88:6c:63:df:46:0d:ba: 90:0d:16:d7:2d:7e:b4:fd:c3:8b:b8:b5:18:cf:20:73: b5:b5:62:62:f0:b1:52:04:fb:49:cd:35:42:89:4f:fd: ee:d2:ab:a4:46:67:fe:bf:27:58:71:1f:39:65:ae:5e: 2c:6b:6d:13:54:e7:50:6a:28:44:26:ab:b6:7e:fc:0c: 30:d6:79:39:1e:55:be:5b:cd:11:43:0a:77:df:c4:f3: 22:14:2d:96:48:48:b0:c9:59:7c:4d:f5:85:ed:99:45: 21:8b:a0:44:6d:3d:29:e7:09:bf:cc:13:c3:1a:d3:3b: a2:31:8b:1c:3b:28:8b:43:f6:02:d9:09:7a:83:3b:77: d5:c1:c8:08:12:89:04:d2:ed:e3:3f:82:99:e6:e6:0a: 6f:e1:02:39:e7:b0:a3:4d:d2:8e:59:73:e1:a6:cb:92: 20:37:77:a1:c7:81:56:ab:5c:80:a9:34:0d:8e:3e:71: b1:f4:64:6d:b1:0d:9b:44:2c:d6:05:8a:bb:fc:0c:ba: 51:31:95:e9:50:17:17:6c:5b:0d:6b:1a:a2:ff:93:a5: 52:22:6b:19:cc:ac:de:7a:04:5a:31:9c:07:b6:81:f6 Fingerprint (SHA-256): 43:BD:1D:57:51:0D:AC:F8:4B:96:B1:22:B0:D2:A9:7C:1D:E2:27:87:D0:62:7D:7C:75:07:57:2C:C1:75:97:15 Fingerprint (SHA1): BD:2D:B7:19:6F:49:82:5D:AD:D5:93:32:47:A8:AA:F6:82:1C:7F:B3 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #14481: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #14482: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14483: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092788 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14484: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14485: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #14486: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14487: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 108092789 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14488: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14489: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14490: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108092679.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14491: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108092664.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14492: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14493: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #14494: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108092679.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14495: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 108092790 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14496: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14497: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14498: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108092679.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14499: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108092665.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14500: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14501: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #14502: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14503: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 108092791 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14504: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14505: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14506: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108092679.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14507: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108092666.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14508: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14509: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14510: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108092679.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14511: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108092667.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14512: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14513: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108150003Z nextupdate=20170108150003Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 15:00:03 2016 Next Update: Sun Jan 08 15:00:03 2017 CRL Extensions: chains.sh: #14514: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108150004Z nextupdate=20170108150004Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 15:00:04 2016 Next Update: Sun Jan 08 15:00:04 2017 CRL Extensions: chains.sh: #14515: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108150005Z nextupdate=20170108150005Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 15:00:05 2016 Next Update: Sun Jan 08 15:00:05 2017 CRL Extensions: chains.sh: #14516: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108150006Z nextupdate=20170108150006Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 15:00:06 2016 Next Update: Sun Jan 08 15:00:06 2017 CRL Extensions: chains.sh: #14517: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108150007Z addcert 20 20160108150007Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 15:00:07 2016 Next Update: Sun Jan 08 15:00:04 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 15:00:07 2016 CRL Extensions: chains.sh: #14518: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108150008Z addcert 40 20160108150008Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 15:00:08 2016 Next Update: Sun Jan 08 15:00:04 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 15:00:07 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 15:00:08 2016 CRL Extensions: chains.sh: #14519: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14520: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14521: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #14522: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092788 (0x6715d74) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:58:32 2016 Not After : Fri Jan 08 14:58:32 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:52:24:9b:71:7e:cf:2c:20:af:81:ff:b1:4d:0e:64: de:9c:72:ed:a6:2f:bb:6c:49:9e:7f:97:7a:25:0a:61: 5f:32:fe:02:f1:7a:67:12:55:01:c8:7b:a9:99:28:14: 8b:d1:a0:a0:d1:a0:00:8b:09:55:08:c7:92:9e:9e:52: 39:91:86:98:d2:38:c1:35:5b:8f:fd:bc:82:79:f1:1a: 4b:68:8e:3a:22:e9:0c:22:bb:96:06:39:05:5f:3b:99: af:c4:b6:c5:4b:76:77:56:df:68:25:54:97:d6:ca:2f: e4:e3:96:c4:78:53:b1:0b:e3:63:6c:d1:87:e9:01:d0: 38:42:aa:af:e4:8b:b6:8c:33:79:a1:d3:3b:00:b5:6b: 5e:88:5c:60:7a:2a:b9:42:8d:3a:e0:10:bc:99:9a:6d: 4f:c9:a9:e4:65:53:ed:13:9b:ad:b6:b9:95:1c:7e:c0: 46:bc:2f:11:f1:6b:39:dc:53:54:85:01:43:0c:03:bc: 41:7f:c7:f0:29:6f:20:73:a0:e9:22:d6:4a:b7:e1:ef: b4:09:e6:2d:b9:10:54:63:cd:56:0a:aa:fb:5e:60:5b: 6e:54:a3:65:81:4b:c9:38:df:6f:0b:3e:8a:82:19:69: 7a:6e:1f:1e:58:15:ce:5e:4f:76:b5:09:c8:c0:5e:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:7d:80:9c:45:49:70:9e:ce:24:77:2a:45:0d:b3:72: 0e:6b:aa:70:9c:33:79:1d:e6:58:d9:0d:55:d9:08:ec: 3a:32:a3:3b:ec:07:b9:ff:5c:3c:15:74:99:c8:72:a9: 3c:3b:de:d8:93:4a:d3:50:98:15:e6:ff:8e:bb:92:ef: 56:3f:69:4c:90:28:35:af:9d:82:c4:40:c8:b6:79:11: 04:ad:b0:76:4f:9d:79:1f:55:1d:7a:99:7f:8d:40:69: 74:6b:92:8b:d8:1f:b0:76:6f:41:4d:dc:35:c1:6e:52: ef:b9:3f:02:25:37:d6:83:4b:d5:8e:27:c7:79:fd:6a: f0:03:7a:e5:cd:1d:b8:7d:99:8c:f8:38:4b:31:2c:f8: 5b:52:47:9e:28:fb:c2:5a:f9:7f:56:4c:83:f7:1c:ff: 0f:97:04:ce:fc:8e:df:ad:1a:cb:19:b7:08:cf:c7:fd: ab:7a:fd:9d:4a:8f:54:77:35:b8:21:a7:46:de:c2:93: 29:0c:62:f1:f2:12:e3:de:97:1c:67:6f:e7:00:b6:9c: e0:43:66:39:8d:84:f6:97:52:b9:1d:2f:1e:07:be:f1: a0:df:5b:80:5e:80:b8:2e:53:70:f3:c3:45:e9:1d:b9: 26:f9:5d:1c:57:1b:b1:b4:cf:a2:a6:be:2f:96:b9:3a Fingerprint (SHA-256): A8:D6:ED:33:6E:FF:DF:00:10:58:3C:92:1B:10:37:28:2A:98:CB:89:49:6B:DF:FE:33:16:64:19:02:88:2F:16 Fingerprint (SHA1): B6:2A:C4:59:E0:CB:93:4A:6C:DC:30:96:89:D0:B0:32:05:3D:FB:2B Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #14523: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #14524: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092788 (0x6715d74) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 14:58:32 2016 Not After : Fri Jan 08 14:58:32 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:52:24:9b:71:7e:cf:2c:20:af:81:ff:b1:4d:0e:64: de:9c:72:ed:a6:2f:bb:6c:49:9e:7f:97:7a:25:0a:61: 5f:32:fe:02:f1:7a:67:12:55:01:c8:7b:a9:99:28:14: 8b:d1:a0:a0:d1:a0:00:8b:09:55:08:c7:92:9e:9e:52: 39:91:86:98:d2:38:c1:35:5b:8f:fd:bc:82:79:f1:1a: 4b:68:8e:3a:22:e9:0c:22:bb:96:06:39:05:5f:3b:99: af:c4:b6:c5:4b:76:77:56:df:68:25:54:97:d6:ca:2f: e4:e3:96:c4:78:53:b1:0b:e3:63:6c:d1:87:e9:01:d0: 38:42:aa:af:e4:8b:b6:8c:33:79:a1:d3:3b:00:b5:6b: 5e:88:5c:60:7a:2a:b9:42:8d:3a:e0:10:bc:99:9a:6d: 4f:c9:a9:e4:65:53:ed:13:9b:ad:b6:b9:95:1c:7e:c0: 46:bc:2f:11:f1:6b:39:dc:53:54:85:01:43:0c:03:bc: 41:7f:c7:f0:29:6f:20:73:a0:e9:22:d6:4a:b7:e1:ef: b4:09:e6:2d:b9:10:54:63:cd:56:0a:aa:fb:5e:60:5b: 6e:54:a3:65:81:4b:c9:38:df:6f:0b:3e:8a:82:19:69: 7a:6e:1f:1e:58:15:ce:5e:4f:76:b5:09:c8:c0:5e:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:7d:80:9c:45:49:70:9e:ce:24:77:2a:45:0d:b3:72: 0e:6b:aa:70:9c:33:79:1d:e6:58:d9:0d:55:d9:08:ec: 3a:32:a3:3b:ec:07:b9:ff:5c:3c:15:74:99:c8:72:a9: 3c:3b:de:d8:93:4a:d3:50:98:15:e6:ff:8e:bb:92:ef: 56:3f:69:4c:90:28:35:af:9d:82:c4:40:c8:b6:79:11: 04:ad:b0:76:4f:9d:79:1f:55:1d:7a:99:7f:8d:40:69: 74:6b:92:8b:d8:1f:b0:76:6f:41:4d:dc:35:c1:6e:52: ef:b9:3f:02:25:37:d6:83:4b:d5:8e:27:c7:79:fd:6a: f0:03:7a:e5:cd:1d:b8:7d:99:8c:f8:38:4b:31:2c:f8: 5b:52:47:9e:28:fb:c2:5a:f9:7f:56:4c:83:f7:1c:ff: 0f:97:04:ce:fc:8e:df:ad:1a:cb:19:b7:08:cf:c7:fd: ab:7a:fd:9d:4a:8f:54:77:35:b8:21:a7:46:de:c2:93: 29:0c:62:f1:f2:12:e3:de:97:1c:67:6f:e7:00:b6:9c: e0:43:66:39:8d:84:f6:97:52:b9:1d:2f:1e:07:be:f1: a0:df:5b:80:5e:80:b8:2e:53:70:f3:c3:45:e9:1d:b9: 26:f9:5d:1c:57:1b:b1:b4:cf:a2:a6:be:2f:96:b9:3a Fingerprint (SHA-256): A8:D6:ED:33:6E:FF:DF:00:10:58:3C:92:1B:10:37:28:2A:98:CB:89:49:6B:DF:FE:33:16:64:19:02:88:2F:16 Fingerprint (SHA1): B6:2A:C4:59:E0:CB:93:4A:6C:DC:30:96:89:D0:B0:32:05:3D:FB:2B Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #14525: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #14526: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #14527: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092792 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14528: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #14529: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14530: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14531: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108092793 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14532: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14533: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14534: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14535: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108092794 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14536: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14537: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14538: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14539: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 108092795 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14540: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14541: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #14542: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092796 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14543: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #14544: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #14545: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14546: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 108092797 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14547: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14548: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14549: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14550: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 108092798 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14551: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14552: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #14553: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #14554: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #14555: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092792 (0x6715d78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:00:26 2016 Not After : Fri Jan 08 15:00:26 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:19:be:96:db:b0:29:11:4b:ac:5e:39:58:fb:eb:4f: 2c:14:02:89:e5:f1:7c:0b:77:58:a0:7e:ba:57:80:de: 6e:88:67:83:39:66:17:90:31:5f:69:c9:99:76:d7:c6: 48:6b:bb:d1:fd:8a:2a:2d:87:08:d5:f6:78:72:62:e7: f2:c5:48:b6:11:0e:39:86:e5:d0:d6:0f:3c:33:ca:62: 67:7a:50:f5:60:f9:62:af:8f:b7:49:2f:fd:3c:3c:68: b1:74:f8:77:bb:41:94:ed:b9:de:2a:7d:d2:5f:c3:93: 44:b1:4c:62:a8:59:a5:0f:1b:84:fe:30:6c:a5:eb:6e: e9:2a:1c:d8:ef:2e:19:7c:78:3a:60:a2:04:6e:0e:77: b7:93:a7:55:00:ee:43:b6:c9:13:06:d9:19:f7:06:d6: c8:ad:8f:c9:0f:d7:3f:9a:98:be:91:b6:9f:ec:28:0d: 9d:64:9a:51:1e:6f:f8:6c:c1:78:10:d2:ba:58:a1:71: 76:7e:97:1f:39:b2:43:ba:92:8a:7d:bc:30:8e:af:ab: ed:48:e2:99:fb:91:22:df:19:c9:2b:76:0a:d2:79:c4: 34:15:d7:34:bc:18:da:a8:37:45:b5:6d:49:13:bf:ed: 41:f0:0b:66:2d:d3:f3:58:1c:12:a6:40:f5:bd:59:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:bf:6f:47:28:8f:09:ce:c5:88:9f:3d:26:53:d0:5b: cd:6e:34:de:c0:b9:41:50:ec:0f:20:92:e3:c9:16:a6: 83:88:77:cf:52:09:55:fb:d2:f0:16:1a:39:24:9e:1d: 93:30:bb:10:a1:42:3e:6c:50:c2:35:14:59:b5:5b:62: b0:05:ef:ed:e2:44:69:1f:03:31:fc:93:70:51:81:cd: a5:02:ba:58:ad:a0:1b:f4:b9:5e:b8:47:91:a7:8e:37: 4d:21:7d:7d:ea:d9:cf:31:2c:f7:bb:58:50:3c:a0:9d: d5:24:ea:0a:60:40:b3:60:ef:40:62:36:b5:c8:02:28: 47:ea:c7:22:44:95:85:9e:ad:8c:90:34:03:34:74:66: f8:72:38:c3:de:23:3e:6a:ac:e5:d6:6c:5f:61:03:57: 27:39:a5:4e:4d:d3:bf:10:4c:ea:b8:39:78:7d:0b:21: c7:17:65:ab:48:65:54:22:df:18:f2:0c:9a:2e:5d:20: 2c:f3:d9:7a:fb:87:35:14:94:96:3b:a4:05:38:90:ec: 93:21:31:e9:a3:f3:6b:1e:27:ec:df:d4:af:62:aa:8d: 43:ab:60:3e:89:c5:ec:bc:79:f2:c5:ec:44:5c:47:6b: 18:20:33:89:d4:16:f2:02:9c:30:4f:3c:11:4e:09:f8 Fingerprint (SHA-256): A9:8D:93:73:A0:9C:5B:21:04:7E:2E:5B:4C:DE:35:D2:6E:B1:17:61:AE:CE:35:0D:E9:F9:2F:BF:64:82:C2:DB Fingerprint (SHA1): 82:DA:AB:55:BA:A3:AC:BC:AB:25:41:98:F2:80:4E:D8:30:02:43:85 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14556: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092794 (0x6715d7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 15:00:51 2016 Not After : Fri Jan 08 15:00:51 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:3c:7d:59:ee:30:0a:fd:86:b4:97:93:de:d6:24:43: 21:06:72:6f:df:ab:83:42:d3:a6:c4:df:11:83:70:26: 46:a5:3a:3e:cd:33:16:4a:3c:1b:bc:a1:12:4e:0d:e0: eb:4c:38:62:8a:88:b4:12:f7:f4:2a:09:31:c3:33:f8: 36:aa:a5:5d:c8:cf:bb:b1:1c:54:9c:d4:6d:a6:a4:f6: c5:b8:c7:16:97:39:97:da:1b:65:52:36:f5:f1:2f:d1: 01:cb:3d:05:a3:92:b7:44:64:85:cc:9d:df:31:46:92: db:3f:d7:f2:58:00:04:e7:41:3c:0d:5c:87:79:80:ca: 7f:0f:03:13:bc:92:62:2b:76:f3:06:65:ed:41:52:b4: 42:b8:8f:c0:4f:2a:e5:49:7d:dc:55:2f:02:2c:54:57: 5a:82:65:83:47:62:fd:66:8a:74:ea:04:7f:0f:02:f6: 80:17:db:5b:f2:66:09:1c:ef:ba:26:46:ee:8c:94:ae: ae:42:db:46:59:f3:fe:53:4a:6f:e4:03:5a:00:b1:e7: ff:f2:ad:06:22:27:be:10:57:b9:ef:b5:7d:32:23:a3: ca:3e:5e:ea:34:a0:f9:cf:dd:f1:82:00:74:f4:99:64: d3:94:8e:fa:17:18:10:93:8e:82:8c:4d:a1:f1:18:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:37:13:ff:74:61:9a:da:8a:31:c2:6a:0a:6d:dd:6f: f9:58:0d:77:75:8b:12:d6:22:3e:41:57:93:24:a0:22: 84:48:2c:ea:02:ff:10:40:78:9b:64:0e:0e:de:10:b3: a0:b7:0c:13:0b:f4:27:4b:68:ad:75:64:85:7d:a2:ae: 7f:5e:4e:4e:3d:d1:e8:e1:a0:e6:53:2d:87:c8:18:fd: 25:bb:73:5a:a0:70:12:17:c6:7a:d2:80:37:dd:cf:1f: 8f:4e:7b:8d:2f:5d:0d:e6:4d:1d:a6:7c:b1:31:0a:e3: 24:02:0d:03:83:31:ce:a5:c6:94:9e:4b:35:65:e4:0b: 32:2e:a5:0e:b3:48:e1:fc:9d:1e:e2:42:2c:92:84:71: 76:11:90:cc:01:13:82:a7:23:9a:41:a1:02:01:8c:85: 43:4f:ce:30:f4:00:69:8c:1a:df:d4:e3:7a:2e:b9:d1: 24:e9:86:e7:55:36:e0:3f:55:bf:c6:67:99:0b:e9:d4: 41:2f:2c:a7:6c:4a:e1:be:9e:18:9f:3e:e1:c4:61:30: 0d:77:67:63:59:f5:13:1c:01:a3:73:a9:66:8b:a0:91: a6:ff:9b:90:0c:39:a4:e1:c0:ad:80:7b:23:47:ae:71: ec:1e:d5:20:81:28:5d:0a:8e:6f:21:51:76:16:9f:45 Fingerprint (SHA-256): 19:E5:2F:0A:AF:C6:E8:0C:C7:D9:EB:33:F9:96:46:77:05:EF:67:E1:BD:02:98:8C:F4:ED:B1:90:B6:0D:B5:C6 Fingerprint (SHA1): 3A:FA:EF:51:8F:83:C3:9C:F5:AF:54:45:B4:19:B4:4E:AC:DB:07:B2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #14557: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092792 (0x6715d78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:00:26 2016 Not After : Fri Jan 08 15:00:26 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:19:be:96:db:b0:29:11:4b:ac:5e:39:58:fb:eb:4f: 2c:14:02:89:e5:f1:7c:0b:77:58:a0:7e:ba:57:80:de: 6e:88:67:83:39:66:17:90:31:5f:69:c9:99:76:d7:c6: 48:6b:bb:d1:fd:8a:2a:2d:87:08:d5:f6:78:72:62:e7: f2:c5:48:b6:11:0e:39:86:e5:d0:d6:0f:3c:33:ca:62: 67:7a:50:f5:60:f9:62:af:8f:b7:49:2f:fd:3c:3c:68: b1:74:f8:77:bb:41:94:ed:b9:de:2a:7d:d2:5f:c3:93: 44:b1:4c:62:a8:59:a5:0f:1b:84:fe:30:6c:a5:eb:6e: e9:2a:1c:d8:ef:2e:19:7c:78:3a:60:a2:04:6e:0e:77: b7:93:a7:55:00:ee:43:b6:c9:13:06:d9:19:f7:06:d6: c8:ad:8f:c9:0f:d7:3f:9a:98:be:91:b6:9f:ec:28:0d: 9d:64:9a:51:1e:6f:f8:6c:c1:78:10:d2:ba:58:a1:71: 76:7e:97:1f:39:b2:43:ba:92:8a:7d:bc:30:8e:af:ab: ed:48:e2:99:fb:91:22:df:19:c9:2b:76:0a:d2:79:c4: 34:15:d7:34:bc:18:da:a8:37:45:b5:6d:49:13:bf:ed: 41:f0:0b:66:2d:d3:f3:58:1c:12:a6:40:f5:bd:59:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:bf:6f:47:28:8f:09:ce:c5:88:9f:3d:26:53:d0:5b: cd:6e:34:de:c0:b9:41:50:ec:0f:20:92:e3:c9:16:a6: 83:88:77:cf:52:09:55:fb:d2:f0:16:1a:39:24:9e:1d: 93:30:bb:10:a1:42:3e:6c:50:c2:35:14:59:b5:5b:62: b0:05:ef:ed:e2:44:69:1f:03:31:fc:93:70:51:81:cd: a5:02:ba:58:ad:a0:1b:f4:b9:5e:b8:47:91:a7:8e:37: 4d:21:7d:7d:ea:d9:cf:31:2c:f7:bb:58:50:3c:a0:9d: d5:24:ea:0a:60:40:b3:60:ef:40:62:36:b5:c8:02:28: 47:ea:c7:22:44:95:85:9e:ad:8c:90:34:03:34:74:66: f8:72:38:c3:de:23:3e:6a:ac:e5:d6:6c:5f:61:03:57: 27:39:a5:4e:4d:d3:bf:10:4c:ea:b8:39:78:7d:0b:21: c7:17:65:ab:48:65:54:22:df:18:f2:0c:9a:2e:5d:20: 2c:f3:d9:7a:fb:87:35:14:94:96:3b:a4:05:38:90:ec: 93:21:31:e9:a3:f3:6b:1e:27:ec:df:d4:af:62:aa:8d: 43:ab:60:3e:89:c5:ec:bc:79:f2:c5:ec:44:5c:47:6b: 18:20:33:89:d4:16:f2:02:9c:30:4f:3c:11:4e:09:f8 Fingerprint (SHA-256): A9:8D:93:73:A0:9C:5B:21:04:7E:2E:5B:4C:DE:35:D2:6E:B1:17:61:AE:CE:35:0D:E9:F9:2F:BF:64:82:C2:DB Fingerprint (SHA1): 82:DA:AB:55:BA:A3:AC:BC:AB:25:41:98:F2:80:4E:D8:30:02:43:85 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14558: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #14559: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092792 (0x6715d78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:00:26 2016 Not After : Fri Jan 08 15:00:26 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:19:be:96:db:b0:29:11:4b:ac:5e:39:58:fb:eb:4f: 2c:14:02:89:e5:f1:7c:0b:77:58:a0:7e:ba:57:80:de: 6e:88:67:83:39:66:17:90:31:5f:69:c9:99:76:d7:c6: 48:6b:bb:d1:fd:8a:2a:2d:87:08:d5:f6:78:72:62:e7: f2:c5:48:b6:11:0e:39:86:e5:d0:d6:0f:3c:33:ca:62: 67:7a:50:f5:60:f9:62:af:8f:b7:49:2f:fd:3c:3c:68: b1:74:f8:77:bb:41:94:ed:b9:de:2a:7d:d2:5f:c3:93: 44:b1:4c:62:a8:59:a5:0f:1b:84:fe:30:6c:a5:eb:6e: e9:2a:1c:d8:ef:2e:19:7c:78:3a:60:a2:04:6e:0e:77: b7:93:a7:55:00:ee:43:b6:c9:13:06:d9:19:f7:06:d6: c8:ad:8f:c9:0f:d7:3f:9a:98:be:91:b6:9f:ec:28:0d: 9d:64:9a:51:1e:6f:f8:6c:c1:78:10:d2:ba:58:a1:71: 76:7e:97:1f:39:b2:43:ba:92:8a:7d:bc:30:8e:af:ab: ed:48:e2:99:fb:91:22:df:19:c9:2b:76:0a:d2:79:c4: 34:15:d7:34:bc:18:da:a8:37:45:b5:6d:49:13:bf:ed: 41:f0:0b:66:2d:d3:f3:58:1c:12:a6:40:f5:bd:59:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:bf:6f:47:28:8f:09:ce:c5:88:9f:3d:26:53:d0:5b: cd:6e:34:de:c0:b9:41:50:ec:0f:20:92:e3:c9:16:a6: 83:88:77:cf:52:09:55:fb:d2:f0:16:1a:39:24:9e:1d: 93:30:bb:10:a1:42:3e:6c:50:c2:35:14:59:b5:5b:62: b0:05:ef:ed:e2:44:69:1f:03:31:fc:93:70:51:81:cd: a5:02:ba:58:ad:a0:1b:f4:b9:5e:b8:47:91:a7:8e:37: 4d:21:7d:7d:ea:d9:cf:31:2c:f7:bb:58:50:3c:a0:9d: d5:24:ea:0a:60:40:b3:60:ef:40:62:36:b5:c8:02:28: 47:ea:c7:22:44:95:85:9e:ad:8c:90:34:03:34:74:66: f8:72:38:c3:de:23:3e:6a:ac:e5:d6:6c:5f:61:03:57: 27:39:a5:4e:4d:d3:bf:10:4c:ea:b8:39:78:7d:0b:21: c7:17:65:ab:48:65:54:22:df:18:f2:0c:9a:2e:5d:20: 2c:f3:d9:7a:fb:87:35:14:94:96:3b:a4:05:38:90:ec: 93:21:31:e9:a3:f3:6b:1e:27:ec:df:d4:af:62:aa:8d: 43:ab:60:3e:89:c5:ec:bc:79:f2:c5:ec:44:5c:47:6b: 18:20:33:89:d4:16:f2:02:9c:30:4f:3c:11:4e:09:f8 Fingerprint (SHA-256): A9:8D:93:73:A0:9C:5B:21:04:7E:2E:5B:4C:DE:35:D2:6E:B1:17:61:AE:CE:35:0D:E9:F9:2F:BF:64:82:C2:DB Fingerprint (SHA1): 82:DA:AB:55:BA:A3:AC:BC:AB:25:41:98:F2:80:4E:D8:30:02:43:85 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14560: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092794 (0x6715d7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 15:00:51 2016 Not After : Fri Jan 08 15:00:51 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:3c:7d:59:ee:30:0a:fd:86:b4:97:93:de:d6:24:43: 21:06:72:6f:df:ab:83:42:d3:a6:c4:df:11:83:70:26: 46:a5:3a:3e:cd:33:16:4a:3c:1b:bc:a1:12:4e:0d:e0: eb:4c:38:62:8a:88:b4:12:f7:f4:2a:09:31:c3:33:f8: 36:aa:a5:5d:c8:cf:bb:b1:1c:54:9c:d4:6d:a6:a4:f6: c5:b8:c7:16:97:39:97:da:1b:65:52:36:f5:f1:2f:d1: 01:cb:3d:05:a3:92:b7:44:64:85:cc:9d:df:31:46:92: db:3f:d7:f2:58:00:04:e7:41:3c:0d:5c:87:79:80:ca: 7f:0f:03:13:bc:92:62:2b:76:f3:06:65:ed:41:52:b4: 42:b8:8f:c0:4f:2a:e5:49:7d:dc:55:2f:02:2c:54:57: 5a:82:65:83:47:62:fd:66:8a:74:ea:04:7f:0f:02:f6: 80:17:db:5b:f2:66:09:1c:ef:ba:26:46:ee:8c:94:ae: ae:42:db:46:59:f3:fe:53:4a:6f:e4:03:5a:00:b1:e7: ff:f2:ad:06:22:27:be:10:57:b9:ef:b5:7d:32:23:a3: ca:3e:5e:ea:34:a0:f9:cf:dd:f1:82:00:74:f4:99:64: d3:94:8e:fa:17:18:10:93:8e:82:8c:4d:a1:f1:18:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:37:13:ff:74:61:9a:da:8a:31:c2:6a:0a:6d:dd:6f: f9:58:0d:77:75:8b:12:d6:22:3e:41:57:93:24:a0:22: 84:48:2c:ea:02:ff:10:40:78:9b:64:0e:0e:de:10:b3: a0:b7:0c:13:0b:f4:27:4b:68:ad:75:64:85:7d:a2:ae: 7f:5e:4e:4e:3d:d1:e8:e1:a0:e6:53:2d:87:c8:18:fd: 25:bb:73:5a:a0:70:12:17:c6:7a:d2:80:37:dd:cf:1f: 8f:4e:7b:8d:2f:5d:0d:e6:4d:1d:a6:7c:b1:31:0a:e3: 24:02:0d:03:83:31:ce:a5:c6:94:9e:4b:35:65:e4:0b: 32:2e:a5:0e:b3:48:e1:fc:9d:1e:e2:42:2c:92:84:71: 76:11:90:cc:01:13:82:a7:23:9a:41:a1:02:01:8c:85: 43:4f:ce:30:f4:00:69:8c:1a:df:d4:e3:7a:2e:b9:d1: 24:e9:86:e7:55:36:e0:3f:55:bf:c6:67:99:0b:e9:d4: 41:2f:2c:a7:6c:4a:e1:be:9e:18:9f:3e:e1:c4:61:30: 0d:77:67:63:59:f5:13:1c:01:a3:73:a9:66:8b:a0:91: a6:ff:9b:90:0c:39:a4:e1:c0:ad:80:7b:23:47:ae:71: ec:1e:d5:20:81:28:5d:0a:8e:6f:21:51:76:16:9f:45 Fingerprint (SHA-256): 19:E5:2F:0A:AF:C6:E8:0C:C7:D9:EB:33:F9:96:46:77:05:EF:67:E1:BD:02:98:8C:F4:ED:B1:90:B6:0D:B5:C6 Fingerprint (SHA1): 3A:FA:EF:51:8F:83:C3:9C:F5:AF:54:45:B4:19:B4:4E:AC:DB:07:B2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #14561: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #14562: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #14563: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #14564: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092792 (0x6715d78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:00:26 2016 Not After : Fri Jan 08 15:00:26 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:19:be:96:db:b0:29:11:4b:ac:5e:39:58:fb:eb:4f: 2c:14:02:89:e5:f1:7c:0b:77:58:a0:7e:ba:57:80:de: 6e:88:67:83:39:66:17:90:31:5f:69:c9:99:76:d7:c6: 48:6b:bb:d1:fd:8a:2a:2d:87:08:d5:f6:78:72:62:e7: f2:c5:48:b6:11:0e:39:86:e5:d0:d6:0f:3c:33:ca:62: 67:7a:50:f5:60:f9:62:af:8f:b7:49:2f:fd:3c:3c:68: b1:74:f8:77:bb:41:94:ed:b9:de:2a:7d:d2:5f:c3:93: 44:b1:4c:62:a8:59:a5:0f:1b:84:fe:30:6c:a5:eb:6e: e9:2a:1c:d8:ef:2e:19:7c:78:3a:60:a2:04:6e:0e:77: b7:93:a7:55:00:ee:43:b6:c9:13:06:d9:19:f7:06:d6: c8:ad:8f:c9:0f:d7:3f:9a:98:be:91:b6:9f:ec:28:0d: 9d:64:9a:51:1e:6f:f8:6c:c1:78:10:d2:ba:58:a1:71: 76:7e:97:1f:39:b2:43:ba:92:8a:7d:bc:30:8e:af:ab: ed:48:e2:99:fb:91:22:df:19:c9:2b:76:0a:d2:79:c4: 34:15:d7:34:bc:18:da:a8:37:45:b5:6d:49:13:bf:ed: 41:f0:0b:66:2d:d3:f3:58:1c:12:a6:40:f5:bd:59:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:bf:6f:47:28:8f:09:ce:c5:88:9f:3d:26:53:d0:5b: cd:6e:34:de:c0:b9:41:50:ec:0f:20:92:e3:c9:16:a6: 83:88:77:cf:52:09:55:fb:d2:f0:16:1a:39:24:9e:1d: 93:30:bb:10:a1:42:3e:6c:50:c2:35:14:59:b5:5b:62: b0:05:ef:ed:e2:44:69:1f:03:31:fc:93:70:51:81:cd: a5:02:ba:58:ad:a0:1b:f4:b9:5e:b8:47:91:a7:8e:37: 4d:21:7d:7d:ea:d9:cf:31:2c:f7:bb:58:50:3c:a0:9d: d5:24:ea:0a:60:40:b3:60:ef:40:62:36:b5:c8:02:28: 47:ea:c7:22:44:95:85:9e:ad:8c:90:34:03:34:74:66: f8:72:38:c3:de:23:3e:6a:ac:e5:d6:6c:5f:61:03:57: 27:39:a5:4e:4d:d3:bf:10:4c:ea:b8:39:78:7d:0b:21: c7:17:65:ab:48:65:54:22:df:18:f2:0c:9a:2e:5d:20: 2c:f3:d9:7a:fb:87:35:14:94:96:3b:a4:05:38:90:ec: 93:21:31:e9:a3:f3:6b:1e:27:ec:df:d4:af:62:aa:8d: 43:ab:60:3e:89:c5:ec:bc:79:f2:c5:ec:44:5c:47:6b: 18:20:33:89:d4:16:f2:02:9c:30:4f:3c:11:4e:09:f8 Fingerprint (SHA-256): A9:8D:93:73:A0:9C:5B:21:04:7E:2E:5B:4C:DE:35:D2:6E:B1:17:61:AE:CE:35:0D:E9:F9:2F:BF:64:82:C2:DB Fingerprint (SHA1): 82:DA:AB:55:BA:A3:AC:BC:AB:25:41:98:F2:80:4E:D8:30:02:43:85 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14565: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092796 (0x6715d7c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 15:01:13 2016 Not After : Fri Jan 08 15:01:13 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:23:5f:54:5d:60:2a:6d:1a:f1:3c:06:93:b0:08:bb: f8:69:e3:a3:c8:88:07:1f:07:a8:e5:51:39:8a:2b:35: 4b:b8:13:27:c0:34:9d:f6:5e:57:2c:b7:ee:45:42:b5: 85:a9:7d:2b:d4:82:43:31:eb:76:01:cd:1c:c4:5d:23: a8:0f:52:07:8c:8f:cc:d5:26:a5:82:95:f3:9f:cc:53: 72:e4:71:e9:8c:28:5d:1d:9f:cc:49:7d:75:23:ac:b4: 9d:78:38:d4:b5:a0:f5:0b:e4:a8:53:b1:b7:42:af:26: e9:48:4f:52:ec:72:45:31:8b:28:44:79:2c:cb:2e:50: d2:57:a6:e4:5d:b4:7b:2d:b9:47:ec:d2:39:09:96:89: af:19:14:9b:a7:50:1c:5b:2b:c4:4f:b2:16:d8:65:a7: 1c:ac:72:b1:36:93:74:55:51:30:9b:cd:64:27:a8:9e: c3:aa:07:34:0c:db:b2:33:80:b3:26:61:9b:ef:08:eb: 4c:9e:dc:9e:2e:5e:bd:ec:78:ce:ad:6a:f6:b9:fa:97: 73:8f:36:73:78:f5:ac:4b:a5:28:42:b7:28:b8:60:5f: 32:4b:d8:f7:08:cd:bb:f0:20:73:db:0a:e3:6c:ae:05: c1:58:75:5c:d1:b6:14:72:6a:45:ed:68:3e:48:b6:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:75:e8:4e:cd:ef:5e:48:b0:72:2f:0a:81:74:0c:7a: f4:fd:c4:2d:03:26:f4:5c:0f:be:28:c7:2a:aa:5b:aa: ee:ab:95:54:22:5c:95:a7:d2:82:e6:61:34:0a:ec:57: ea:39:a1:a6:91:0d:7c:11:35:f9:a6:e7:24:dd:ae:4c: d7:63:82:d0:e9:37:15:65:f8:4b:c5:ae:ee:1e:55:f2: fc:a9:2d:1b:35:49:c8:95:e1:4b:8d:ab:18:7a:bc:16: 7a:62:52:e7:2b:20:bf:33:48:48:95:60:b5:2a:d4:51: 60:6a:0a:9b:f6:dd:79:14:21:1a:93:a2:5e:08:ca:79: f5:58:83:59:6d:e1:d9:f8:c7:26:1d:e0:1a:3f:e2:83: 7c:93:bb:e2:5c:01:c4:27:75:a2:e4:a9:6b:cd:d9:52: 53:3f:31:4d:62:36:2a:12:9b:c5:42:f5:2f:a2:16:fd: 80:61:cd:9d:47:b9:af:64:8d:67:0e:f1:8a:a2:00:ff: c4:39:9d:b7:18:64:fe:38:fd:8f:54:fc:f4:94:60:89: 32:42:21:0d:1d:cc:17:c1:03:d7:eb:d0:75:e4:49:da: 80:cc:2e:37:56:a9:3d:23:5e:70:2d:c0:af:f9:3e:f6: 89:e9:31:ad:cc:7c:41:d9:00:d9:26:e3:89:8e:21:78 Fingerprint (SHA-256): 6F:62:55:A8:B9:CF:CF:28:A8:A7:DC:D4:63:4C:34:B2:5F:C4:44:3C:D9:7F:5E:45:D5:AA:C5:F8:49:DC:A1:DA Fingerprint (SHA1): 48:26:EF:48:E6:74:37:0E:B0:8F:67:58:72:C4:69:7D:8C:DA:13:A5 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #14566: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092792 (0x6715d78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:00:26 2016 Not After : Fri Jan 08 15:00:26 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:19:be:96:db:b0:29:11:4b:ac:5e:39:58:fb:eb:4f: 2c:14:02:89:e5:f1:7c:0b:77:58:a0:7e:ba:57:80:de: 6e:88:67:83:39:66:17:90:31:5f:69:c9:99:76:d7:c6: 48:6b:bb:d1:fd:8a:2a:2d:87:08:d5:f6:78:72:62:e7: f2:c5:48:b6:11:0e:39:86:e5:d0:d6:0f:3c:33:ca:62: 67:7a:50:f5:60:f9:62:af:8f:b7:49:2f:fd:3c:3c:68: b1:74:f8:77:bb:41:94:ed:b9:de:2a:7d:d2:5f:c3:93: 44:b1:4c:62:a8:59:a5:0f:1b:84:fe:30:6c:a5:eb:6e: e9:2a:1c:d8:ef:2e:19:7c:78:3a:60:a2:04:6e:0e:77: b7:93:a7:55:00:ee:43:b6:c9:13:06:d9:19:f7:06:d6: c8:ad:8f:c9:0f:d7:3f:9a:98:be:91:b6:9f:ec:28:0d: 9d:64:9a:51:1e:6f:f8:6c:c1:78:10:d2:ba:58:a1:71: 76:7e:97:1f:39:b2:43:ba:92:8a:7d:bc:30:8e:af:ab: ed:48:e2:99:fb:91:22:df:19:c9:2b:76:0a:d2:79:c4: 34:15:d7:34:bc:18:da:a8:37:45:b5:6d:49:13:bf:ed: 41:f0:0b:66:2d:d3:f3:58:1c:12:a6:40:f5:bd:59:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:bf:6f:47:28:8f:09:ce:c5:88:9f:3d:26:53:d0:5b: cd:6e:34:de:c0:b9:41:50:ec:0f:20:92:e3:c9:16:a6: 83:88:77:cf:52:09:55:fb:d2:f0:16:1a:39:24:9e:1d: 93:30:bb:10:a1:42:3e:6c:50:c2:35:14:59:b5:5b:62: b0:05:ef:ed:e2:44:69:1f:03:31:fc:93:70:51:81:cd: a5:02:ba:58:ad:a0:1b:f4:b9:5e:b8:47:91:a7:8e:37: 4d:21:7d:7d:ea:d9:cf:31:2c:f7:bb:58:50:3c:a0:9d: d5:24:ea:0a:60:40:b3:60:ef:40:62:36:b5:c8:02:28: 47:ea:c7:22:44:95:85:9e:ad:8c:90:34:03:34:74:66: f8:72:38:c3:de:23:3e:6a:ac:e5:d6:6c:5f:61:03:57: 27:39:a5:4e:4d:d3:bf:10:4c:ea:b8:39:78:7d:0b:21: c7:17:65:ab:48:65:54:22:df:18:f2:0c:9a:2e:5d:20: 2c:f3:d9:7a:fb:87:35:14:94:96:3b:a4:05:38:90:ec: 93:21:31:e9:a3:f3:6b:1e:27:ec:df:d4:af:62:aa:8d: 43:ab:60:3e:89:c5:ec:bc:79:f2:c5:ec:44:5c:47:6b: 18:20:33:89:d4:16:f2:02:9c:30:4f:3c:11:4e:09:f8 Fingerprint (SHA-256): A9:8D:93:73:A0:9C:5B:21:04:7E:2E:5B:4C:DE:35:D2:6E:B1:17:61:AE:CE:35:0D:E9:F9:2F:BF:64:82:C2:DB Fingerprint (SHA1): 82:DA:AB:55:BA:A3:AC:BC:AB:25:41:98:F2:80:4E:D8:30:02:43:85 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14567: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #14568: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #14569: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #14570: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #14571: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #14572: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092797 (0x6715d7d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 15:01:18 2016 Not After : Fri Jan 08 15:01:18 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:aa:25:bc:5b:4a:58:5b:c8:e8:7d:08:ab:0f:30:2f: 46:9c:f4:77:a9:85:1d:36:16:e7:82:93:27:d7:60:71: 59:29:73:b1:e9:93:b8:de:c7:39:c6:98:98:34:c1:14: e8:e5:79:b6:62:2c:ba:43:c3:f1:f8:84:83:55:49:e9: 69:6b:57:c2:20:55:46:4e:8c:b1:80:33:0b:1b:26:eb: 1f:2b:7a:ef:47:db:fc:84:80:04:df:33:83:fb:5f:41: 42:7a:45:dd:d3:20:2b:aa:3a:24:f2:a6:10:e0:6d:c8: 18:03:c0:3a:ea:33:ad:63:1f:03:3a:4b:d0:bf:c1:62: 8d:ec:93:3a:d6:93:26:e9:d8:4a:72:31:59:79:6e:d9: 9d:16:d4:d6:eb:26:aa:78:1a:e1:50:e2:f8:30:70:9e: 56:3a:91:53:93:31:69:c1:d2:90:90:a2:73:3c:24:08: f7:41:da:b4:da:c8:c4:bf:e0:72:ff:d0:97:03:15:16: 2b:d6:a8:96:98:7a:5a:53:d4:3c:fa:a9:cb:e6:33:bb: fe:2a:99:ba:17:08:5b:15:f2:92:e8:ec:fb:eb:0c:c3: 0e:3d:91:79:85:86:e9:7c:ae:57:e6:c6:ab:c6:16:33: e6:2e:c3:e7:0f:06:16:bd:40:fe:97:ba:c3:46:79:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:60:d1:f0:80:91:f8:57:6e:b6:cf:94:50:96:52:6a: 06:3a:34:31:19:91:0b:39:3d:f0:83:ba:e2:02:13:af: 0d:82:8a:92:bf:18:c4:5b:7f:45:f5:77:55:f9:2d:4d: 99:60:a2:e2:2a:89:9a:8c:64:9b:cd:74:6e:78:d0:49: 1c:2d:d2:6a:9f:60:4f:e5:1d:8d:4a:6d:9c:6c:d5:21: 10:93:d9:19:d9:8b:eb:9f:5c:86:1e:d3:27:5b:ef:7f: 45:56:ed:06:07:92:52:1e:50:65:e9:a4:bb:69:96:76: c0:bd:bf:c9:a5:73:a2:27:bb:f8:5b:5b:30:74:e8:d7: 73:fd:7f:52:c0:d3:ed:d3:8c:a3:a6:96:2a:2b:ce:6a: 72:b7:48:89:be:83:26:11:1e:31:ab:c8:d6:73:a4:b9: 8f:21:03:66:89:5f:67:12:e2:74:88:86:0f:68:c7:71: 2e:a1:83:1c:9e:1d:28:aa:85:e9:69:17:1c:79:71:3e: 48:4d:12:90:ff:38:6f:93:2d:ac:82:d7:10:27:17:91: 01:5a:9d:a0:03:53:77:8c:a8:60:20:5f:ca:32:4d:bb: d2:25:01:a2:79:f3:16:ed:44:5d:0f:48:4c:de:3e:cf: 30:c3:7c:60:c0:c6:96:d5:06:bb:3d:52:28:c3:72:36 Fingerprint (SHA-256): 8C:96:37:6E:93:5B:6F:C1:7D:96:6C:BB:DB:DA:0F:C0:A7:C4:58:B6:64:2B:2C:BF:03:C6:E5:C1:8C:50:AB:B5 Fingerprint (SHA1): 21:18:F9:F3:64:4C:DA:97:8E:B9:80:E8:81:85:4A:14:22:3A:07:B3 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #14573: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #14574: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #14575: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #14576: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #14577: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14578: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14579: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #14580: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14581: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14582: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #14583: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #14584: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #14585: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14586: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14587: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #14588: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14589: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14590: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14591: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14592: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14593: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #14594: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14595: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #14596: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 19520 at Fri Jan 8 10:02:01 EST 2016 kill -USR1 19520 httpserv: normal termination httpserv -b -p 9601 2>/dev/null; httpserv with PID 19520 killed at Fri Jan 8 10:02:01 EST 2016 httpserv starting at Fri Jan 8 10:02:01 EST 2016 httpserv -D -p 9601 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.18586 & trying to connect to httpserv at Fri Jan 8 10:02:01 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 10:02:07 EST 2016 tstclnt -p 9601 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #14597: Waiting for Server - FAILED kill -0 2598 >/dev/null 2>/dev/null httpserv with PID 2598 found at Fri Jan 8 10:02:07 EST 2016 httpserv with PID 2598 started at Fri Jan 8 10:02:07 EST 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #14598: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092799 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14599: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #14600: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #14601: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092800 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14602: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #14603: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #14604: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14605: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108092801 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14606: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14607: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108092802 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14608: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14609: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #14610: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14611: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14612: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 108092803 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14613: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14614: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14615: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #14616: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #14617: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092800 (0x6715d80) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 15:02:30 2016 Not After : Fri Jan 08 15:02:30 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:c8:83:b0:94:10:ef:50:1b:29:ad:04:fe:d9:37:b8: 1b:d8:80:da:15:bb:36:32:a2:f6:4a:49:1a:e7:2f:a0: 02:4b:a9:c5:91:2e:83:a9:2f:87:92:a2:02:32:d9:09: 56:74:ac:e4:ed:bc:09:f5:1e:a5:e6:dd:8d:7b:26:bb: 6b:8d:4d:42:9f:a9:ca:9b:1f:83:d9:0f:d5:b9:dc:68: 3d:ef:f6:b7:c0:ea:6e:68:ca:b4:9c:86:3e:4c:1b:b8: 2a:3b:50:e8:b4:c6:1b:c5:01:e9:a4:e3:8b:1c:0e:b0: c4:1a:d0:c0:02:7c:b7:0e:bf:0b:7f:8f:7c:15:b5:39: c1:e5:8a:0f:f4:00:68:09:4e:6d:01:15:0b:65:0b:a3: 7e:39:e0:85:1b:e6:2a:cf:70:7a:ac:f1:ab:cb:17:f0: 44:3d:36:8e:6e:e1:e3:b3:eb:83:c8:28:1a:ee:98:bd: fe:4e:66:65:63:b2:b4:f5:53:eb:ac:3e:97:0f:22:4a: 86:55:57:eb:d4:78:2a:73:22:0e:42:75:17:37:91:02: 61:76:6a:02:be:9e:f2:7e:2b:85:b4:b5:94:ec:ad:42: 4c:8f:d5:1e:7c:6c:7d:ff:75:69:54:29:1d:2d:18:58: 1e:d2:6c:6e:b6:51:f7:45:84:0e:32:f0:74:d2:52:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:57:5c:01:7f:8b:6d:43:3f:05:b2:49:bf:77:09:f9: 57:f9:11:98:45:47:ac:0e:db:00:73:bb:ed:98:2d:8a: 34:a4:50:ee:28:55:b5:fc:88:42:9a:fc:74:24:81:be: d6:d8:f5:b9:77:55:3d:e7:d2:23:c0:85:4a:8a:4c:fa: 5c:d3:fe:a1:4f:ed:ba:63:3f:39:68:39:3d:82:96:aa: 6a:5c:6a:8d:79:7c:5c:d3:b0:a3:db:7c:84:29:d1:35: 60:90:9d:ef:62:e8:74:d6:36:f5:ab:53:2e:a3:77:83: 10:ac:17:86:96:5a:0e:90:ca:05:39:83:f3:51:34:17: cf:8c:ce:52:a3:24:a9:6b:bc:89:09:d9:8f:e1:ec:64: e9:16:8c:43:e8:05:b1:cf:e0:b9:46:e5:97:f6:f6:96: 55:a7:82:ef:1e:7c:12:2a:25:45:45:0d:80:6a:aa:53: 80:0e:7a:00:a2:09:6f:46:55:76:75:d0:f6:96:d4:e5: f2:92:2a:67:e4:58:bf:2c:38:e0:19:93:94:82:2d:08: a5:2e:9d:8f:f0:08:1b:be:2c:41:e6:c0:db:a9:2a:2d: 72:25:eb:e8:a5:be:85:e0:c2:59:e1:27:b7:fa:ac:f4: 88:31:6a:17:6e:c4:0f:b8:5d:63:35:ae:1c:9c:80:d7 Fingerprint (SHA-256): 1F:2C:77:CE:ED:7B:70:57:53:21:2C:BF:57:34:2C:92:30:64:47:EB:00:7D:78:B3:B9:50:A3:B0:D3:D7:FD:84 Fingerprint (SHA1): 27:43:09:7E:97:AD:21:96:36:B0:CD:AC:71:1B:94:99:13:5F:59:C7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14618: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092799 (0x6715d7f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 15:02:11 2016 Not After : Fri Jan 08 15:02:11 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:38:08:77:e1:d8:6f:8e:f7:de:13:f7:dd:04:73:62: c2:f1:ea:17:a9:58:3a:5b:d1:3f:68:5e:ed:61:01:3a: 97:2e:2e:37:91:3b:18:09:1c:8e:3f:d8:6c:87:7b:81: 44:06:1a:0b:8a:d7:5d:43:19:cb:26:ad:a3:93:3d:0b: ab:80:bb:b9:4d:0a:d6:21:06:58:73:a0:d5:4b:08:23: 2d:0f:9d:49:5e:e2:62:7f:fb:65:42:88:b4:e1:a8:67: 1b:e9:47:e6:58:1b:22:fb:77:48:f0:35:82:ba:1c:3f: a2:f6:fc:6a:a3:b2:1f:c6:32:75:e9:87:d3:fb:82:d8: 16:46:ca:b3:38:a7:e9:bd:76:17:1e:b9:55:2c:35:3c: f3:dc:6f:57:f3:d0:4d:7c:b4:74:e2:a8:b5:c3:8e:ba: 6b:32:09:75:bb:59:d2:21:40:96:69:a1:b3:4d:29:05: de:43:b9:50:d6:bb:d7:18:19:3b:9f:4a:84:5c:79:4f: a2:c7:98:66:05:93:85:de:d1:1e:b5:9b:4e:7b:d9:ae: d6:7b:b5:76:4b:93:61:22:4d:33:b5:18:3b:7f:8e:2c: 93:7a:29:b4:9b:10:9e:85:30:5a:47:77:d1:92:54:2b: ad:af:59:82:c3:5a:ad:20:93:35:41:68:33:ce:90:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:3d:a1:b5:b5:b3:d7:46:c6:43:2b:ea:64:78:d4:62: 8d:60:49:37:39:76:8c:81:50:83:f2:9d:f0:31:c5:93: 23:4a:8d:28:c3:ee:8b:5c:cd:58:09:16:3a:1f:99:12: dc:dc:05:2b:d9:17:e2:44:b8:14:4d:32:fd:68:bb:b9: 8b:48:a2:fa:d2:be:5b:5c:f6:1f:86:02:da:d8:ff:fd: 9e:44:00:30:c1:16:2b:2e:cd:9a:a0:a8:17:5b:17:83: c5:9c:ce:30:ba:4c:d8:0c:d2:90:d6:f5:b4:15:aa:86: e0:c2:88:08:86:ce:18:4a:a2:2a:df:9f:fa:74:95:f9: 34:d4:82:c4:d3:f6:24:2b:ee:ac:69:a8:1a:ba:e1:f6: d1:53:51:ec:83:4a:d4:1d:e9:77:df:0e:36:25:ca:0d: 62:12:a6:5e:5f:c0:51:bd:3c:a7:fd:45:e3:df:6f:02: 28:92:ce:b7:e3:bc:20:9c:41:da:48:cd:10:41:ad:27: 8a:a7:24:dd:9c:04:0c:7c:15:74:30:bf:8b:73:2d:ae: 22:a5:b5:78:fa:ce:f5:32:9d:a6:e8:32:36:d5:88:fd: e2:7e:fc:d8:57:2f:b8:05:ae:60:c6:6c:c9:9b:eb:e3: 06:fc:9a:d4:0a:ee:21:d7:bf:ee:a7:26:8c:c9:03:db Fingerprint (SHA-256): D1:0E:7D:D5:9C:07:AE:29:A3:17:31:69:91:8C:2D:1F:B5:4D:43:F0:5F:7A:A9:D9:C0:53:27:3A:9C:CB:72:29 Fingerprint (SHA1): 11:6D:58:A9:23:D3:97:BF:0D:11:FF:A0:8B:A2:6E:F0:3F:7E:78:9E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14619: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #14620: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #14621: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #14622: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092799 (0x6715d7f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 15:02:11 2016 Not After : Fri Jan 08 15:02:11 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:38:08:77:e1:d8:6f:8e:f7:de:13:f7:dd:04:73:62: c2:f1:ea:17:a9:58:3a:5b:d1:3f:68:5e:ed:61:01:3a: 97:2e:2e:37:91:3b:18:09:1c:8e:3f:d8:6c:87:7b:81: 44:06:1a:0b:8a:d7:5d:43:19:cb:26:ad:a3:93:3d:0b: ab:80:bb:b9:4d:0a:d6:21:06:58:73:a0:d5:4b:08:23: 2d:0f:9d:49:5e:e2:62:7f:fb:65:42:88:b4:e1:a8:67: 1b:e9:47:e6:58:1b:22:fb:77:48:f0:35:82:ba:1c:3f: a2:f6:fc:6a:a3:b2:1f:c6:32:75:e9:87:d3:fb:82:d8: 16:46:ca:b3:38:a7:e9:bd:76:17:1e:b9:55:2c:35:3c: f3:dc:6f:57:f3:d0:4d:7c:b4:74:e2:a8:b5:c3:8e:ba: 6b:32:09:75:bb:59:d2:21:40:96:69:a1:b3:4d:29:05: de:43:b9:50:d6:bb:d7:18:19:3b:9f:4a:84:5c:79:4f: a2:c7:98:66:05:93:85:de:d1:1e:b5:9b:4e:7b:d9:ae: d6:7b:b5:76:4b:93:61:22:4d:33:b5:18:3b:7f:8e:2c: 93:7a:29:b4:9b:10:9e:85:30:5a:47:77:d1:92:54:2b: ad:af:59:82:c3:5a:ad:20:93:35:41:68:33:ce:90:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:3d:a1:b5:b5:b3:d7:46:c6:43:2b:ea:64:78:d4:62: 8d:60:49:37:39:76:8c:81:50:83:f2:9d:f0:31:c5:93: 23:4a:8d:28:c3:ee:8b:5c:cd:58:09:16:3a:1f:99:12: dc:dc:05:2b:d9:17:e2:44:b8:14:4d:32:fd:68:bb:b9: 8b:48:a2:fa:d2:be:5b:5c:f6:1f:86:02:da:d8:ff:fd: 9e:44:00:30:c1:16:2b:2e:cd:9a:a0:a8:17:5b:17:83: c5:9c:ce:30:ba:4c:d8:0c:d2:90:d6:f5:b4:15:aa:86: e0:c2:88:08:86:ce:18:4a:a2:2a:df:9f:fa:74:95:f9: 34:d4:82:c4:d3:f6:24:2b:ee:ac:69:a8:1a:ba:e1:f6: d1:53:51:ec:83:4a:d4:1d:e9:77:df:0e:36:25:ca:0d: 62:12:a6:5e:5f:c0:51:bd:3c:a7:fd:45:e3:df:6f:02: 28:92:ce:b7:e3:bc:20:9c:41:da:48:cd:10:41:ad:27: 8a:a7:24:dd:9c:04:0c:7c:15:74:30:bf:8b:73:2d:ae: 22:a5:b5:78:fa:ce:f5:32:9d:a6:e8:32:36:d5:88:fd: e2:7e:fc:d8:57:2f:b8:05:ae:60:c6:6c:c9:9b:eb:e3: 06:fc:9a:d4:0a:ee:21:d7:bf:ee:a7:26:8c:c9:03:db Fingerprint (SHA-256): D1:0E:7D:D5:9C:07:AE:29:A3:17:31:69:91:8C:2D:1F:B5:4D:43:F0:5F:7A:A9:D9:C0:53:27:3A:9C:CB:72:29 Fingerprint (SHA1): 11:6D:58:A9:23:D3:97:BF:0D:11:FF:A0:8B:A2:6E:F0:3F:7E:78:9E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14623: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092800 (0x6715d80) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 15:02:30 2016 Not After : Fri Jan 08 15:02:30 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:c8:83:b0:94:10:ef:50:1b:29:ad:04:fe:d9:37:b8: 1b:d8:80:da:15:bb:36:32:a2:f6:4a:49:1a:e7:2f:a0: 02:4b:a9:c5:91:2e:83:a9:2f:87:92:a2:02:32:d9:09: 56:74:ac:e4:ed:bc:09:f5:1e:a5:e6:dd:8d:7b:26:bb: 6b:8d:4d:42:9f:a9:ca:9b:1f:83:d9:0f:d5:b9:dc:68: 3d:ef:f6:b7:c0:ea:6e:68:ca:b4:9c:86:3e:4c:1b:b8: 2a:3b:50:e8:b4:c6:1b:c5:01:e9:a4:e3:8b:1c:0e:b0: c4:1a:d0:c0:02:7c:b7:0e:bf:0b:7f:8f:7c:15:b5:39: c1:e5:8a:0f:f4:00:68:09:4e:6d:01:15:0b:65:0b:a3: 7e:39:e0:85:1b:e6:2a:cf:70:7a:ac:f1:ab:cb:17:f0: 44:3d:36:8e:6e:e1:e3:b3:eb:83:c8:28:1a:ee:98:bd: fe:4e:66:65:63:b2:b4:f5:53:eb:ac:3e:97:0f:22:4a: 86:55:57:eb:d4:78:2a:73:22:0e:42:75:17:37:91:02: 61:76:6a:02:be:9e:f2:7e:2b:85:b4:b5:94:ec:ad:42: 4c:8f:d5:1e:7c:6c:7d:ff:75:69:54:29:1d:2d:18:58: 1e:d2:6c:6e:b6:51:f7:45:84:0e:32:f0:74:d2:52:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:57:5c:01:7f:8b:6d:43:3f:05:b2:49:bf:77:09:f9: 57:f9:11:98:45:47:ac:0e:db:00:73:bb:ed:98:2d:8a: 34:a4:50:ee:28:55:b5:fc:88:42:9a:fc:74:24:81:be: d6:d8:f5:b9:77:55:3d:e7:d2:23:c0:85:4a:8a:4c:fa: 5c:d3:fe:a1:4f:ed:ba:63:3f:39:68:39:3d:82:96:aa: 6a:5c:6a:8d:79:7c:5c:d3:b0:a3:db:7c:84:29:d1:35: 60:90:9d:ef:62:e8:74:d6:36:f5:ab:53:2e:a3:77:83: 10:ac:17:86:96:5a:0e:90:ca:05:39:83:f3:51:34:17: cf:8c:ce:52:a3:24:a9:6b:bc:89:09:d9:8f:e1:ec:64: e9:16:8c:43:e8:05:b1:cf:e0:b9:46:e5:97:f6:f6:96: 55:a7:82:ef:1e:7c:12:2a:25:45:45:0d:80:6a:aa:53: 80:0e:7a:00:a2:09:6f:46:55:76:75:d0:f6:96:d4:e5: f2:92:2a:67:e4:58:bf:2c:38:e0:19:93:94:82:2d:08: a5:2e:9d:8f:f0:08:1b:be:2c:41:e6:c0:db:a9:2a:2d: 72:25:eb:e8:a5:be:85:e0:c2:59:e1:27:b7:fa:ac:f4: 88:31:6a:17:6e:c4:0f:b8:5d:63:35:ae:1c:9c:80:d7 Fingerprint (SHA-256): 1F:2C:77:CE:ED:7B:70:57:53:21:2C:BF:57:34:2C:92:30:64:47:EB:00:7D:78:B3:B9:50:A3:B0:D3:D7:FD:84 Fingerprint (SHA1): 27:43:09:7E:97:AD:21:96:36:B0:CD:AC:71:1B:94:99:13:5F:59:C7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14624: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #14625: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #14626: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #14627: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #14628: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #14629: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092800 (0x6715d80) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 15:02:30 2016 Not After : Fri Jan 08 15:02:30 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:c8:83:b0:94:10:ef:50:1b:29:ad:04:fe:d9:37:b8: 1b:d8:80:da:15:bb:36:32:a2:f6:4a:49:1a:e7:2f:a0: 02:4b:a9:c5:91:2e:83:a9:2f:87:92:a2:02:32:d9:09: 56:74:ac:e4:ed:bc:09:f5:1e:a5:e6:dd:8d:7b:26:bb: 6b:8d:4d:42:9f:a9:ca:9b:1f:83:d9:0f:d5:b9:dc:68: 3d:ef:f6:b7:c0:ea:6e:68:ca:b4:9c:86:3e:4c:1b:b8: 2a:3b:50:e8:b4:c6:1b:c5:01:e9:a4:e3:8b:1c:0e:b0: c4:1a:d0:c0:02:7c:b7:0e:bf:0b:7f:8f:7c:15:b5:39: c1:e5:8a:0f:f4:00:68:09:4e:6d:01:15:0b:65:0b:a3: 7e:39:e0:85:1b:e6:2a:cf:70:7a:ac:f1:ab:cb:17:f0: 44:3d:36:8e:6e:e1:e3:b3:eb:83:c8:28:1a:ee:98:bd: fe:4e:66:65:63:b2:b4:f5:53:eb:ac:3e:97:0f:22:4a: 86:55:57:eb:d4:78:2a:73:22:0e:42:75:17:37:91:02: 61:76:6a:02:be:9e:f2:7e:2b:85:b4:b5:94:ec:ad:42: 4c:8f:d5:1e:7c:6c:7d:ff:75:69:54:29:1d:2d:18:58: 1e:d2:6c:6e:b6:51:f7:45:84:0e:32:f0:74:d2:52:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:57:5c:01:7f:8b:6d:43:3f:05:b2:49:bf:77:09:f9: 57:f9:11:98:45:47:ac:0e:db:00:73:bb:ed:98:2d:8a: 34:a4:50:ee:28:55:b5:fc:88:42:9a:fc:74:24:81:be: d6:d8:f5:b9:77:55:3d:e7:d2:23:c0:85:4a:8a:4c:fa: 5c:d3:fe:a1:4f:ed:ba:63:3f:39:68:39:3d:82:96:aa: 6a:5c:6a:8d:79:7c:5c:d3:b0:a3:db:7c:84:29:d1:35: 60:90:9d:ef:62:e8:74:d6:36:f5:ab:53:2e:a3:77:83: 10:ac:17:86:96:5a:0e:90:ca:05:39:83:f3:51:34:17: cf:8c:ce:52:a3:24:a9:6b:bc:89:09:d9:8f:e1:ec:64: e9:16:8c:43:e8:05:b1:cf:e0:b9:46:e5:97:f6:f6:96: 55:a7:82:ef:1e:7c:12:2a:25:45:45:0d:80:6a:aa:53: 80:0e:7a:00:a2:09:6f:46:55:76:75:d0:f6:96:d4:e5: f2:92:2a:67:e4:58:bf:2c:38:e0:19:93:94:82:2d:08: a5:2e:9d:8f:f0:08:1b:be:2c:41:e6:c0:db:a9:2a:2d: 72:25:eb:e8:a5:be:85:e0:c2:59:e1:27:b7:fa:ac:f4: 88:31:6a:17:6e:c4:0f:b8:5d:63:35:ae:1c:9c:80:d7 Fingerprint (SHA-256): 1F:2C:77:CE:ED:7B:70:57:53:21:2C:BF:57:34:2C:92:30:64:47:EB:00:7D:78:B3:B9:50:A3:B0:D3:D7:FD:84 Fingerprint (SHA1): 27:43:09:7E:97:AD:21:96:36:B0:CD:AC:71:1B:94:99:13:5F:59:C7 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14630: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092800 (0x6715d80) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 15:02:30 2016 Not After : Fri Jan 08 15:02:30 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:c8:83:b0:94:10:ef:50:1b:29:ad:04:fe:d9:37:b8: 1b:d8:80:da:15:bb:36:32:a2:f6:4a:49:1a:e7:2f:a0: 02:4b:a9:c5:91:2e:83:a9:2f:87:92:a2:02:32:d9:09: 56:74:ac:e4:ed:bc:09:f5:1e:a5:e6:dd:8d:7b:26:bb: 6b:8d:4d:42:9f:a9:ca:9b:1f:83:d9:0f:d5:b9:dc:68: 3d:ef:f6:b7:c0:ea:6e:68:ca:b4:9c:86:3e:4c:1b:b8: 2a:3b:50:e8:b4:c6:1b:c5:01:e9:a4:e3:8b:1c:0e:b0: c4:1a:d0:c0:02:7c:b7:0e:bf:0b:7f:8f:7c:15:b5:39: c1:e5:8a:0f:f4:00:68:09:4e:6d:01:15:0b:65:0b:a3: 7e:39:e0:85:1b:e6:2a:cf:70:7a:ac:f1:ab:cb:17:f0: 44:3d:36:8e:6e:e1:e3:b3:eb:83:c8:28:1a:ee:98:bd: fe:4e:66:65:63:b2:b4:f5:53:eb:ac:3e:97:0f:22:4a: 86:55:57:eb:d4:78:2a:73:22:0e:42:75:17:37:91:02: 61:76:6a:02:be:9e:f2:7e:2b:85:b4:b5:94:ec:ad:42: 4c:8f:d5:1e:7c:6c:7d:ff:75:69:54:29:1d:2d:18:58: 1e:d2:6c:6e:b6:51:f7:45:84:0e:32:f0:74:d2:52:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:57:5c:01:7f:8b:6d:43:3f:05:b2:49:bf:77:09:f9: 57:f9:11:98:45:47:ac:0e:db:00:73:bb:ed:98:2d:8a: 34:a4:50:ee:28:55:b5:fc:88:42:9a:fc:74:24:81:be: d6:d8:f5:b9:77:55:3d:e7:d2:23:c0:85:4a:8a:4c:fa: 5c:d3:fe:a1:4f:ed:ba:63:3f:39:68:39:3d:82:96:aa: 6a:5c:6a:8d:79:7c:5c:d3:b0:a3:db:7c:84:29:d1:35: 60:90:9d:ef:62:e8:74:d6:36:f5:ab:53:2e:a3:77:83: 10:ac:17:86:96:5a:0e:90:ca:05:39:83:f3:51:34:17: cf:8c:ce:52:a3:24:a9:6b:bc:89:09:d9:8f:e1:ec:64: e9:16:8c:43:e8:05:b1:cf:e0:b9:46:e5:97:f6:f6:96: 55:a7:82:ef:1e:7c:12:2a:25:45:45:0d:80:6a:aa:53: 80:0e:7a:00:a2:09:6f:46:55:76:75:d0:f6:96:d4:e5: f2:92:2a:67:e4:58:bf:2c:38:e0:19:93:94:82:2d:08: a5:2e:9d:8f:f0:08:1b:be:2c:41:e6:c0:db:a9:2a:2d: 72:25:eb:e8:a5:be:85:e0:c2:59:e1:27:b7:fa:ac:f4: 88:31:6a:17:6e:c4:0f:b8:5d:63:35:ae:1c:9c:80:d7 Fingerprint (SHA-256): 1F:2C:77:CE:ED:7B:70:57:53:21:2C:BF:57:34:2C:92:30:64:47:EB:00:7D:78:B3:B9:50:A3:B0:D3:D7:FD:84 Fingerprint (SHA1): 27:43:09:7E:97:AD:21:96:36:B0:CD:AC:71:1B:94:99:13:5F:59:C7 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14631: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #14632: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #14633: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #14634: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #14635: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #14636: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092799 (0x6715d7f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 15:02:11 2016 Not After : Fri Jan 08 15:02:11 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:38:08:77:e1:d8:6f:8e:f7:de:13:f7:dd:04:73:62: c2:f1:ea:17:a9:58:3a:5b:d1:3f:68:5e:ed:61:01:3a: 97:2e:2e:37:91:3b:18:09:1c:8e:3f:d8:6c:87:7b:81: 44:06:1a:0b:8a:d7:5d:43:19:cb:26:ad:a3:93:3d:0b: ab:80:bb:b9:4d:0a:d6:21:06:58:73:a0:d5:4b:08:23: 2d:0f:9d:49:5e:e2:62:7f:fb:65:42:88:b4:e1:a8:67: 1b:e9:47:e6:58:1b:22:fb:77:48:f0:35:82:ba:1c:3f: a2:f6:fc:6a:a3:b2:1f:c6:32:75:e9:87:d3:fb:82:d8: 16:46:ca:b3:38:a7:e9:bd:76:17:1e:b9:55:2c:35:3c: f3:dc:6f:57:f3:d0:4d:7c:b4:74:e2:a8:b5:c3:8e:ba: 6b:32:09:75:bb:59:d2:21:40:96:69:a1:b3:4d:29:05: de:43:b9:50:d6:bb:d7:18:19:3b:9f:4a:84:5c:79:4f: a2:c7:98:66:05:93:85:de:d1:1e:b5:9b:4e:7b:d9:ae: d6:7b:b5:76:4b:93:61:22:4d:33:b5:18:3b:7f:8e:2c: 93:7a:29:b4:9b:10:9e:85:30:5a:47:77:d1:92:54:2b: ad:af:59:82:c3:5a:ad:20:93:35:41:68:33:ce:90:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:3d:a1:b5:b5:b3:d7:46:c6:43:2b:ea:64:78:d4:62: 8d:60:49:37:39:76:8c:81:50:83:f2:9d:f0:31:c5:93: 23:4a:8d:28:c3:ee:8b:5c:cd:58:09:16:3a:1f:99:12: dc:dc:05:2b:d9:17:e2:44:b8:14:4d:32:fd:68:bb:b9: 8b:48:a2:fa:d2:be:5b:5c:f6:1f:86:02:da:d8:ff:fd: 9e:44:00:30:c1:16:2b:2e:cd:9a:a0:a8:17:5b:17:83: c5:9c:ce:30:ba:4c:d8:0c:d2:90:d6:f5:b4:15:aa:86: e0:c2:88:08:86:ce:18:4a:a2:2a:df:9f:fa:74:95:f9: 34:d4:82:c4:d3:f6:24:2b:ee:ac:69:a8:1a:ba:e1:f6: d1:53:51:ec:83:4a:d4:1d:e9:77:df:0e:36:25:ca:0d: 62:12:a6:5e:5f:c0:51:bd:3c:a7:fd:45:e3:df:6f:02: 28:92:ce:b7:e3:bc:20:9c:41:da:48:cd:10:41:ad:27: 8a:a7:24:dd:9c:04:0c:7c:15:74:30:bf:8b:73:2d:ae: 22:a5:b5:78:fa:ce:f5:32:9d:a6:e8:32:36:d5:88:fd: e2:7e:fc:d8:57:2f:b8:05:ae:60:c6:6c:c9:9b:eb:e3: 06:fc:9a:d4:0a:ee:21:d7:bf:ee:a7:26:8c:c9:03:db Fingerprint (SHA-256): D1:0E:7D:D5:9C:07:AE:29:A3:17:31:69:91:8C:2D:1F:B5:4D:43:F0:5F:7A:A9:D9:C0:53:27:3A:9C:CB:72:29 Fingerprint (SHA1): 11:6D:58:A9:23:D3:97:BF:0D:11:FF:A0:8B:A2:6E:F0:3F:7E:78:9E Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14637: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092799 (0x6715d7f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 15:02:11 2016 Not After : Fri Jan 08 15:02:11 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:38:08:77:e1:d8:6f:8e:f7:de:13:f7:dd:04:73:62: c2:f1:ea:17:a9:58:3a:5b:d1:3f:68:5e:ed:61:01:3a: 97:2e:2e:37:91:3b:18:09:1c:8e:3f:d8:6c:87:7b:81: 44:06:1a:0b:8a:d7:5d:43:19:cb:26:ad:a3:93:3d:0b: ab:80:bb:b9:4d:0a:d6:21:06:58:73:a0:d5:4b:08:23: 2d:0f:9d:49:5e:e2:62:7f:fb:65:42:88:b4:e1:a8:67: 1b:e9:47:e6:58:1b:22:fb:77:48:f0:35:82:ba:1c:3f: a2:f6:fc:6a:a3:b2:1f:c6:32:75:e9:87:d3:fb:82:d8: 16:46:ca:b3:38:a7:e9:bd:76:17:1e:b9:55:2c:35:3c: f3:dc:6f:57:f3:d0:4d:7c:b4:74:e2:a8:b5:c3:8e:ba: 6b:32:09:75:bb:59:d2:21:40:96:69:a1:b3:4d:29:05: de:43:b9:50:d6:bb:d7:18:19:3b:9f:4a:84:5c:79:4f: a2:c7:98:66:05:93:85:de:d1:1e:b5:9b:4e:7b:d9:ae: d6:7b:b5:76:4b:93:61:22:4d:33:b5:18:3b:7f:8e:2c: 93:7a:29:b4:9b:10:9e:85:30:5a:47:77:d1:92:54:2b: ad:af:59:82:c3:5a:ad:20:93:35:41:68:33:ce:90:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:3d:a1:b5:b5:b3:d7:46:c6:43:2b:ea:64:78:d4:62: 8d:60:49:37:39:76:8c:81:50:83:f2:9d:f0:31:c5:93: 23:4a:8d:28:c3:ee:8b:5c:cd:58:09:16:3a:1f:99:12: dc:dc:05:2b:d9:17:e2:44:b8:14:4d:32:fd:68:bb:b9: 8b:48:a2:fa:d2:be:5b:5c:f6:1f:86:02:da:d8:ff:fd: 9e:44:00:30:c1:16:2b:2e:cd:9a:a0:a8:17:5b:17:83: c5:9c:ce:30:ba:4c:d8:0c:d2:90:d6:f5:b4:15:aa:86: e0:c2:88:08:86:ce:18:4a:a2:2a:df:9f:fa:74:95:f9: 34:d4:82:c4:d3:f6:24:2b:ee:ac:69:a8:1a:ba:e1:f6: d1:53:51:ec:83:4a:d4:1d:e9:77:df:0e:36:25:ca:0d: 62:12:a6:5e:5f:c0:51:bd:3c:a7:fd:45:e3:df:6f:02: 28:92:ce:b7:e3:bc:20:9c:41:da:48:cd:10:41:ad:27: 8a:a7:24:dd:9c:04:0c:7c:15:74:30:bf:8b:73:2d:ae: 22:a5:b5:78:fa:ce:f5:32:9d:a6:e8:32:36:d5:88:fd: e2:7e:fc:d8:57:2f:b8:05:ae:60:c6:6c:c9:9b:eb:e3: 06:fc:9a:d4:0a:ee:21:d7:bf:ee:a7:26:8c:c9:03:db Fingerprint (SHA-256): D1:0E:7D:D5:9C:07:AE:29:A3:17:31:69:91:8C:2D:1F:B5:4D:43:F0:5F:7A:A9:D9:C0:53:27:3A:9C:CB:72:29 Fingerprint (SHA1): 11:6D:58:A9:23:D3:97:BF:0D:11:FF:A0:8B:A2:6E:F0:3F:7E:78:9E Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14638: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #14639: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092804 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14640: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #14641: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #14642: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092805 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14643: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #14644: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #14645: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092806 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14646: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #14647: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #14648: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092807 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14649: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #14650: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #14651: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092808 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14652: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #14653: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #14654: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092809 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14655: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #14656: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #14657: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092810 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14658: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #14659: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #14660: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092811 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14661: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #14662: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #14663: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092812 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14664: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #14665: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #14666: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14667: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 108092813 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14668: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14669: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 108092814 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14670: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14671: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 108092815 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14672: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14673: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #14674: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #14675: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14676: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 108092816 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14677: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14678: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 108092817 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14679: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14680: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 108092818 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14681: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14682: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #14683: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #14684: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14685: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 108092819 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14686: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14687: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 108092820 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14688: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14689: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 108092821 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14690: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14691: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #14692: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #14693: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14694: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 108092822 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14695: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14696: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 108092823 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14697: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14698: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 108092824 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14699: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14700: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #14701: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14702: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14703: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 108092825 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14704: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14705: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14706: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14707: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108092826 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14708: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14709: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092804 (0x6715d84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Jan 08 15:03:36 2016 Not After : Fri Jan 08 15:03:36 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:b3:48:30:91:e1:bb:c7:ef:d4:73:1d:0e:bd:7d:04: bb:03:6e:e9:b3:90:85:a1:05:db:55:a8:04:d1:5e:7c: 68:31:d0:58:27:c7:0d:82:c0:4e:bd:e2:2a:f7:14:7a: 8d:b6:df:0b:95:24:38:aa:8e:4c:b0:53:56:6a:93:79: 9f:34:8d:bf:cb:b6:c7:d6:bb:3f:f3:92:81:75:99:bf: 19:d5:04:03:b3:b7:12:5a:94:ec:5e:8d:d2:56:ab:d8: 59:6d:12:6a:8a:12:41:a2:7e:b4:57:db:35:10:bc:7f: 1e:18:80:f7:0f:7e:8d:6e:86:a9:3f:fb:29:31:d5:09: c2:23:30:c0:58:ce:11:67:0e:a1:d5:8e:01:90:ac:fa: db:7f:6c:c8:9e:82:81:c8:60:4d:5e:a0:42:46:f3:15: c1:a3:39:26:a5:a0:f9:e7:cc:a5:49:0a:07:58:90:30: 4d:59:c6:99:04:cc:ac:d9:5d:09:4c:65:6d:9f:6c:29: f7:17:79:9d:34:a6:db:33:61:25:05:c0:b5:0f:3f:4c: be:c6:31:96:12:a8:f8:00:e2:bc:60:0a:ac:fb:9e:68: db:a6:c9:37:82:0b:23:57:a4:59:04:81:be:b8:ea:29: 69:ec:90:61:61:49:98:2d:e0:88:72:d0:15:f6:9b:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:8c:bf:69:18:a1:cf:c6:1b:aa:76:e5:70:18:94:0c: 63:85:3e:24:9b:26:e6:89:6e:ed:d6:d0:13:a7:8f:19: 9b:ce:bd:c6:8f:b9:7c:fe:6a:0f:f0:a1:8e:bb:45:d0: b0:75:f0:19:5e:68:ab:b1:48:82:a9:d6:0f:d6:78:a2: da:19:88:b0:ed:41:c1:e3:67:c2:0c:3e:bc:21:99:49: 11:c3:a9:87:79:7f:a6:6e:ff:30:dc:75:d2:93:ac:ca: 5a:54:de:c3:1e:01:59:53:a5:41:82:f5:21:ee:75:30: e3:57:41:ad:81:37:ff:5c:82:2a:46:7c:a7:2b:3e:c2: f0:0e:35:56:74:94:fb:75:61:50:79:fa:83:b3:2e:f4: 57:88:f8:8b:9b:e4:3a:56:07:3b:31:5c:c8:c8:ed:fe: 12:de:b7:ec:b3:92:d6:3c:c3:dd:cb:3e:a9:76:7f:eb: bf:58:50:97:15:22:3b:65:66:a3:e1:ec:a7:c3:69:f8: 96:84:62:5f:95:5e:41:f7:e9:57:cf:c2:d8:d4:c3:5b: f9:14:c1:e8:7d:14:a3:ce:1b:18:9e:39:a7:fa:cf:a1: 01:4f:90:ba:22:0c:d0:d7:61:5c:c9:7f:06:34:1a:d3: 08:eb:a9:eb:aa:97:30:d9:ac:36:e0:42:20:6a:31:b2 Fingerprint (SHA-256): BB:33:C5:3F:E3:72:32:B8:91:63:0B:90:95:5D:99:23:D3:B2:B8:26:2E:9E:94:D5:BC:D8:56:36:28:70:9A:F0 Fingerprint (SHA1): 88:EC:64:C3:8D:D1:E2:62:9B:78:E7:18:79:4F:B0:A0:40:EC:D9:79 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #14710: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092805 (0x6715d85) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Jan 08 15:03:49 2016 Not After : Fri Jan 08 15:03:49 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:cc:77:0c:f8:fd:fc:1f:2e:43:02:be:2c:0f:83:6e: 1a:04:97:e9:75:9b:98:ff:f4:b1:8c:a1:fe:0f:78:01: ed:c9:40:1a:88:23:48:0b:c8:b7:1e:db:e9:ea:9e:05: 96:1b:20:9b:8e:a3:10:29:31:09:0a:84:f5:19:ac:30: 08:4c:dd:bd:f3:62:8e:4c:e0:03:66:e0:fb:cf:99:40: 19:e5:3b:d1:cd:35:dd:85:c9:57:e2:af:bf:30:26:24: d0:08:24:52:59:b7:12:27:9e:ba:bf:c3:3a:5c:7d:e9: 1c:14:8a:2b:61:da:6d:03:fe:7a:b8:2c:3f:0d:01:9b: 58:b9:7f:8b:30:e0:fa:20:b5:ec:1e:c5:4d:3e:e1:95: 5a:76:20:66:8f:6a:4c:9e:de:ec:3b:8c:1c:53:a1:6e: a0:8b:3a:de:a4:fc:f3:cf:f5:7b:56:43:6c:db:39:54: 96:90:33:92:e9:5a:2a:fe:4a:b0:f0:32:b3:ac:a1:56: 0b:82:12:cc:70:e1:5f:c0:c7:7c:95:59:d7:b4:35:c6: 7f:20:22:26:90:c5:cc:ca:a2:f7:a1:5f:4d:80:5e:d7: e8:f9:47:9a:b7:57:20:c2:6d:03:3e:28:e9:b5:5d:01: a5:49:fc:00:f4:29:74:97:ea:1a:4f:ab:ba:8a:4a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ab:fd:8f:b7:ca:0b:83:22:78:65:60:bd:dc:58:ea:b3: 35:75:12:29:ae:4f:3f:32:ad:3c:39:e5:dd:98:a1:49: f6:ee:de:f3:2d:92:4f:cf:27:6b:c9:d5:61:46:11:c1: ad:a6:81:18:87:11:1c:99:83:b1:6e:18:e1:cb:54:20: 1b:47:4c:94:4b:5b:45:fc:01:ae:cf:dc:b4:31:e2:a5: 2b:52:a2:60:de:52:d5:bf:8d:f1:ea:fb:78:74:4e:76: 8a:c1:4d:71:2c:ad:cf:78:f6:24:54:ab:81:8b:04:d3: b8:e3:c6:3a:52:1c:51:aa:d4:a7:c1:a2:90:b5:2e:02: e4:66:02:ef:08:b4:28:d1:a4:4e:3d:34:cf:eb:1e:e1: 8d:ef:40:ab:da:e1:b2:5b:9e:c1:19:63:60:2b:f5:1f: a2:b1:e1:a6:5b:db:1f:67:75:98:13:6b:b9:e9:41:9d: 30:29:2e:f3:a8:31:52:f1:36:d9:97:f1:fe:07:64:b4: e3:6a:57:03:f6:a4:b7:17:11:9a:3c:a4:f6:42:d3:f8: 70:70:fc:91:08:36:91:8e:3e:34:f1:ad:35:ec:84:10: 1f:ba:90:c5:50:43:50:a5:61:f0:a1:f1:dd:79:43:2b: f2:06:4e:4c:28:67:3c:a7:34:4d:8b:2e:0c:25:3e:24 Fingerprint (SHA-256): 5D:27:1B:BE:88:BC:E4:5D:82:56:01:15:2D:11:D2:CF:27:DD:13:D7:AC:AE:AA:41:69:E0:2D:AB:96:A5:DB:4F Fingerprint (SHA1): 55:2F:69:2E:A8:59:2B:C2:72:95:92:6B:D9:B0:39:E1:7A:29:5C:40 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #14711: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092806 (0x6715d86) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Jan 08 15:03:54 2016 Not After : Fri Jan 08 15:03:54 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:98:70:c5:36:d6:db:6c:31:78:cd:5e:92:80:2f:4a: d5:e2:26:08:84:db:c3:f7:bc:d9:da:01:f5:c7:59:56: 2a:2f:9e:6b:e1:8c:1d:30:d8:a9:92:cf:d6:23:5e:cf: 9b:d6:ad:a1:cb:09:44:25:90:30:22:5e:e3:92:df:bb: d7:69:7c:1a:1d:a0:e9:e3:0e:67:6d:e1:2c:da:10:9b: c9:4a:70:5e:14:cd:64:c3:43:69:30:3e:b7:6d:33:ff: 93:d8:6d:ef:6c:a8:52:58:76:90:69:48:33:09:fc:0a: ae:5d:4d:3c:09:16:2c:10:05:1a:e3:8b:61:cf:e1:b6: 85:e9:0d:30:d2:a6:a0:2a:e0:9e:10:49:bf:b1:ed:f1: cf:f2:fa:f9:13:51:aa:40:ab:36:a8:b0:5e:6b:28:0b: 29:65:b5:ec:c7:ea:15:60:34:c7:da:e2:d6:ab:3b:53: e7:20:61:ef:b8:2b:1b:0b:5b:ed:9a:13:da:0e:71:03: c4:f3:e0:ca:7c:2c:6a:1c:bd:db:9b:f5:ad:25:2c:1a: b2:4b:0d:f8:8d:3f:5f:a5:56:74:79:05:64:92:10:cd: 57:23:ac:6a:49:3c:77:2f:f2:b5:da:e5:5b:fa:0d:51: 8d:f6:2c:90:f1:27:e2:65:c9:eb:8d:8d:0d:95:3c:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:e3:c5:c0:ad:41:8e:6b:a1:7e:c7:98:16:ca:d5:f4: ff:e8:60:e3:d3:57:e3:71:0d:ba:7a:5c:25:cc:33:53: 37:3e:87:d1:3e:f5:c7:5e:7d:55:22:67:01:4a:53:8b: 02:61:88:79:07:71:f4:07:8b:c5:7b:3c:7c:21:5e:5f: 2a:ee:e3:0e:3c:fe:7c:7a:a0:5a:77:65:7f:ec:aa:86: 3f:fc:53:b7:c9:d9:28:22:16:3b:ed:8d:c5:08:30:47: 71:06:cc:cc:7e:56:d7:98:b0:45:16:73:a3:ef:6d:49: e8:4e:ff:94:be:06:93:d5:c6:3a:72:d7:6a:3a:77:e5: 53:46:c4:fb:4d:4f:60:be:2f:59:68:10:ae:7b:86:99: ec:b1:07:af:0e:76:ee:de:89:e5:b6:ac:5c:7e:d9:03: f9:61:05:c2:97:6c:2f:00:d7:30:b2:46:4b:d6:4d:3b: 91:aa:bc:7b:b1:9b:60:45:62:e5:30:80:c2:8c:05:03: 06:2a:b3:60:fe:e1:ed:75:91:0d:73:7c:e5:c3:ed:c0: 56:03:0f:ea:e6:22:03:d3:0b:ef:cd:9f:46:a0:24:8d: d1:38:36:43:cc:be:bb:ce:c1:ec:d0:19:66:ed:a5:4a: 1f:89:1d:86:15:9b:d9:69:15:98:ef:c0:6e:43:61:7a Fingerprint (SHA-256): F2:07:99:57:17:35:A4:08:1A:3A:7B:F8:4B:FB:7E:06:95:9F:03:22:BF:0D:79:0C:83:7A:D6:18:AF:87:DE:5F Fingerprint (SHA1): 92:FF:00:3A:E3:56:F5:2E:CB:B2:FC:42:9A:9B:2C:4C:BF:7A:A9:A4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #14712: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092807 (0x6715d87) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Jan 08 15:04:07 2016 Not After : Fri Jan 08 15:04:07 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:34:3e:4a:7c:c1:76:b2:61:d9:99:6b:0c:5c:72:2b: ef:21:4b:d8:3b:08:47:3d:4e:b4:32:39:02:3f:f7:5c: 3a:d0:4a:9e:8f:18:60:5c:dc:29:24:87:a2:83:ce:08: 54:42:4e:e5:11:a8:67:d1:a9:da:f8:79:81:d4:f0:89: 44:f2:5b:78:24:d9:3d:6a:f2:e1:44:6f:e5:fd:37:2c: 96:d1:d0:18:b0:06:dd:bf:43:0f:16:dc:17:3a:74:e2: 86:c5:77:47:cb:68:8d:70:97:fd:8e:11:a4:e1:77:77: 06:0f:f1:f5:c8:d0:64:f8:f7:6a:5a:97:c5:17:6d:aa: 22:51:36:47:0b:bf:50:98:3e:d2:4a:e2:48:54:60:f8: 5e:a9:0e:47:1f:30:72:22:91:cd:41:f1:60:fa:7e:52: 9c:eb:0d:17:1d:01:fc:0b:b9:78:02:8a:01:3c:05:3f: fb:fe:4b:8f:25:92:03:8b:3d:28:49:95:09:d1:a1:0e: ce:45:ff:fc:79:99:60:89:9a:f4:3e:01:88:80:96:77: b8:4b:34:64:03:32:05:a1:99:a8:94:4d:ba:e9:ab:63: 19:7b:7f:ab:7c:57:ef:0d:bd:68:a6:5e:4b:0d:04:a6: 95:a4:ff:40:c1:5f:fe:ca:6e:d5:ae:21:13:c9:a7:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:ff:ca:08:73:72:a6:97:c6:ca:5d:f9:7a:2c:92:6a: cd:3f:fc:2f:2e:99:7c:72:18:49:d3:46:83:71:88:e5: 62:3d:18:a9:33:2e:f4:33:c0:3b:c6:13:fb:52:3b:87: df:5a:e5:0d:06:2f:07:d7:58:20:74:a7:bd:61:4a:3a: 2b:28:d0:c2:00:8a:f0:10:1f:0b:96:fb:40:8a:26:5f: 7f:7f:51:4f:9d:06:b2:d0:a3:e0:b9:e1:71:e2:f5:7f: c3:71:6a:ae:6e:d9:6a:da:bb:5c:31:f3:58:b9:9d:6b: a9:30:90:9e:5e:48:a6:2a:8d:a0:2c:3a:0a:db:b0:7c: 79:9f:e3:1e:c6:e5:6c:5c:b0:fe:3e:13:d8:ba:7f:8f: 15:f4:15:75:51:2f:ab:e3:c7:7b:bf:bc:2e:bb:a7:db: 6f:bb:3b:6d:1a:05:41:1d:db:71:fa:20:5f:70:12:87: 49:ab:7e:85:13:3e:fd:93:76:cf:dd:d5:fa:b3:34:08: 8a:8c:0c:f7:e7:7a:0b:5d:00:ec:bb:33:ad:65:da:b2: 05:37:83:41:cd:bc:e7:cb:ab:18:6a:84:5a:14:d3:22: bc:da:19:0e:da:06:58:93:71:a5:96:76:f8:b7:3d:f7: 8f:b8:9e:fb:d5:01:ce:4f:84:0f:19:9a:2d:52:15:be Fingerprint (SHA-256): 6B:84:F1:E9:90:E7:88:F7:70:22:5B:BA:72:BB:31:CB:7D:9D:4A:9A:30:45:28:F3:58:87:14:2D:78:87:69:B7 Fingerprint (SHA1): 25:F9:EC:58:41:25:5E:C4:57:8F:12:E6:74:3F:EB:7A:63:3F:27:E6 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #14713: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092808 (0x6715d88) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Jan 08 15:04:11 2016 Not After : Fri Jan 08 15:04:11 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:c4:71:70:1c:e5:f1:ec:8c:2f:db:a6:e3:45:af:a7: ba:36:59:25:26:f2:ec:58:b8:21:a4:5d:96:e6:c5:04: 6f:93:93:c9:c0:db:81:b5:6f:be:26:60:92:32:87:38: 89:c7:52:43:c0:00:50:69:42:b3:da:a1:f1:6c:d6:52: c6:52:f7:f0:c8:d4:a6:9c:53:63:18:f6:c3:12:89:ae: 65:55:64:0f:a8:00:fb:f3:b3:2e:81:74:9c:d1:84:c8: 58:0f:52:cb:8b:30:1d:45:c2:90:8c:bc:fa:24:7c:ae: 98:38:50:84:6b:c5:32:fc:ab:a2:cb:87:6f:6e:d3:ad: eb:4b:61:62:e4:54:39:54:b3:df:5d:91:a4:94:ea:d6: fe:f4:59:7d:72:6e:e2:06:51:c7:95:49:db:75:93:2c: 68:7d:09:ee:dd:ca:07:15:64:07:63:7d:f0:61:c7:e5: 71:b9:a9:55:46:00:08:40:6f:f2:7b:7a:6e:fc:d3:c2: 35:80:24:37:c6:63:ac:d5:5d:29:72:4b:d7:71:48:f3: a4:b6:e0:36:f1:15:aa:f7:4b:a6:73:df:d2:fd:f2:60: 26:aa:7d:39:da:0d:ae:86:4f:40:fe:7f:e4:ad:e1:e2: c9:77:ef:4a:07:54:6c:08:2f:d3:33:2d:51:ab:19:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:55:32:ed:b0:03:82:a1:87:15:23:81:e8:fe:e1:12: 69:7c:2a:f7:80:de:3a:d0:10:80:fe:44:a8:0f:3c:9f: b0:3e:19:fb:84:f0:3c:2a:7b:be:21:9e:8f:75:ea:c0: 39:58:d3:20:34:a1:d5:a1:51:e1:fa:39:95:6d:7f:8a: 9c:aa:81:8e:0c:06:fe:72:8a:07:a9:d5:86:1d:0d:f6: 9e:48:ce:55:c1:29:68:7f:22:d4:33:53:c8:3e:06:7d: 3e:bc:be:88:5d:0f:c9:fe:83:04:41:77:88:ee:fe:78: 99:a6:7a:cc:2f:74:79:5d:3c:f8:76:89:9d:5f:c9:2d: 72:16:f7:69:4f:e4:a6:b6:e3:4a:68:5a:b5:c5:8a:94: 1b:2e:77:59:cb:e0:fd:3d:b5:48:15:dc:96:53:46:f1: c6:1b:27:2a:6b:14:99:98:c0:4b:f5:5a:4f:93:4b:0e: fc:48:d2:74:8a:1d:df:af:e5:84:7c:a0:a1:39:79:27: 41:2c:fb:8c:d2:5b:76:02:ee:8b:14:77:ac:92:28:26: db:8c:e8:f3:26:cd:3a:71:a1:ad:93:db:0a:fa:9f:e7: 84:14:be:27:2d:71:42:16:20:bb:3b:21:31:ab:c6:05: f8:34:71:f7:0e:45:2a:d9:25:78:62:23:d2:b4:ed:5a Fingerprint (SHA-256): 83:A0:88:72:13:B8:55:7D:31:CF:79:D2:8A:1B:B0:FA:F1:36:0F:D7:71:F7:F0:91:3B:5F:C5:75:B6:8B:83:1A Fingerprint (SHA1): F1:D4:C0:A8:B4:26:4D:B0:6A:4F:95:C1:30:09:FD:23:65:F7:C3:DE Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #14714: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092809 (0x6715d89) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Jan 08 15:04:18 2016 Not After : Fri Jan 08 15:04:18 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:92:4a:1f:70:a1:f2:02:5b:77:64:09:a5:da:16:e1: eb:1c:a3:f6:3c:73:2b:43:cb:e2:1b:8d:d1:6c:3c:af: d0:ea:a8:e8:25:d1:f7:12:5b:65:c1:03:e0:2e:40:85: 7c:e2:73:60:54:76:15:d7:b8:19:3e:b5:c5:3f:c0:2a: fc:2d:d4:8e:21:a0:e3:22:16:df:6c:19:ca:73:38:0d: 31:af:58:c5:ab:67:b5:b9:90:c7:31:3d:24:eb:7f:7d: ea:2a:d4:82:13:97:fc:b7:e7:b3:c0:1f:ae:d6:c7:f2: 49:fd:d7:96:b8:c3:58:76:4b:15:a9:61:a8:35:f0:4f: 72:25:33:49:f0:73:f9:66:ed:60:91:b5:13:59:66:7e: 3d:0f:c5:7f:18:31:c5:0e:5f:c1:88:e9:e7:19:fb:cb: cd:7b:1d:01:d6:ba:e7:7c:de:0d:6d:71:af:9a:ef:7e: 36:5e:22:c9:47:45:2b:54:84:83:51:dd:53:19:36:dd: 3a:12:17:dc:08:d2:d8:eb:ed:20:73:65:94:5c:5d:51: 06:4c:e8:a4:dc:e9:d1:88:0f:85:68:28:de:ce:fd:09: 96:ce:2c:da:4c:af:4f:f9:d4:98:3c:8c:b4:96:2b:7a: f1:d8:9a:f0:9b:d1:05:be:3f:6c:3e:59:20:aa:aa:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:4d:b5:ba:5b:be:56:1b:dc:58:62:d4:bc:1e:a5:ac: 82:9b:ac:69:32:02:3c:3e:bb:6d:f7:76:d3:63:22:6d: fb:13:17:69:2e:30:02:d3:59:07:a8:e6:73:97:1d:b0: 96:f6:1d:2d:e0:ea:e6:84:ba:cf:79:09:65:b4:0f:63: c8:93:06:b3:4a:c1:9c:c7:79:12:76:d3:65:9d:56:9b: c0:a5:65:54:b4:76:d0:10:ff:0a:59:39:44:1d:45:b3: 84:d6:ff:81:f8:48:67:2d:69:76:de:69:3b:65:c7:44: c9:63:52:85:86:1e:58:d5:64:fd:36:c4:1a:d8:8c:4a: 97:91:35:8d:b7:9f:c8:e2:4a:0b:f7:54:d3:af:03:45: 79:5c:b9:45:66:cd:36:d6:91:e6:8a:40:4f:40:f8:38: 5b:76:dd:7d:67:67:66:2a:25:37:17:2c:ae:b0:78:fe: 85:52:3c:61:f6:de:52:77:d7:20:dd:c2:ef:e2:2d:86: 70:39:41:cd:aa:99:76:40:36:2d:4c:48:98:49:fc:77: 94:8f:4a:d0:63:f4:91:a4:d3:fa:2a:97:88:e5:76:08: 73:9b:e0:bf:c6:fc:92:e1:6a:c1:00:6d:48:c8:46:1c: 18:6b:81:9a:83:23:05:9a:fe:8a:48:2e:0e:37:be:62 Fingerprint (SHA-256): 7E:AD:E9:2D:05:DD:6A:DE:0B:D3:23:C4:3B:E0:78:A7:7A:99:BE:B4:61:6C:22:68:FD:E5:4A:34:2A:A2:B6:69 Fingerprint (SHA1): E2:F4:DC:07:54:B1:44:2A:E8:1B:5F:EF:41:EC:07:0F:45:2D:17:F5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #14715: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092810 (0x6715d8a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Jan 08 15:04:28 2016 Not After : Fri Jan 08 15:04:28 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:00:c4:28:82:63:3c:b4:bb:ff:8b:ab:ba:f0:58:45: 5f:55:68:7e:0b:d7:09:b1:6c:01:bb:57:ef:5c:ba:29: 98:ca:34:6d:23:24:dd:5a:29:fd:fc:fd:e7:3c:30:f5: 96:44:9b:05:c3:69:bb:93:1e:c3:fc:14:cc:d5:be:58: cd:95:01:68:57:1d:a8:f0:a3:19:79:8d:1a:40:57:d2: 4c:8a:fc:92:7b:65:11:35:88:6d:0d:98:2c:93:41:3e: 6a:e5:5f:c6:7c:b7:ac:6f:91:7d:07:ab:06:c6:eb:4c: 60:c7:75:4b:8e:8f:07:10:ad:21:84:36:83:0d:9c:fa: f4:38:34:4f:1a:47:39:10:09:91:5a:07:b3:99:d9:da: 0e:2e:8a:36:7c:ca:cb:96:84:3b:2a:ea:ef:e4:45:96: b0:cb:89:46:81:4a:c2:fe:42:58:99:15:db:ca:97:82: 24:72:3c:2a:dc:45:8f:1b:34:64:2c:71:3c:23:23:ed: 3b:e1:fc:4c:19:ad:e4:72:af:62:ec:b5:85:32:da:0d: e5:d7:31:cc:f5:b4:ef:01:c9:d4:6c:4c:03:34:2d:e9: 8a:b0:74:ee:9b:32:d8:30:f5:3c:b0:67:b2:0b:5c:c7: 2d:88:d4:13:c7:b6:3b:55:c0:80:30:72:66:d3:fb:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:b6:6e:46:de:9e:9d:05:35:78:4f:e2:8d:8a:87:67: 06:83:31:4e:02:1d:3a:d1:6f:02:cf:17:63:a7:16:eb: da:da:fc:16:06:ae:2c:53:cd:da:e5:54:50:ec:1f:c1: 31:bc:be:55:6a:13:b7:d3:ca:fd:d8:05:84:25:4b:44: da:c1:bd:e6:31:e1:3f:3a:b1:39:94:78:c3:eb:95:53: 81:2d:af:2a:15:68:a3:05:64:60:83:71:94:3f:19:da: 13:b5:07:8d:2d:b4:e7:9b:3e:e0:58:1f:8f:cd:a9:74: 3c:f0:5c:aa:2e:a8:f2:84:fe:98:64:0e:6c:8e:17:8c: 6b:ed:1c:67:16:57:12:f6:57:36:66:aa:13:47:7c:25: cd:ad:5b:43:1f:af:ca:f5:6a:21:09:87:f8:f5:d9:f7: cf:39:bd:bc:70:7c:d1:8a:ac:b8:29:ac:8d:39:ed:9b: 8c:8b:60:d6:ef:39:0f:8d:81:06:69:34:65:e0:5b:8f: 51:1d:ab:fe:2d:1b:30:fa:e5:94:d9:6f:90:45:7f:41: 41:7f:61:00:a0:46:9a:58:bb:37:3c:6e:15:7d:cf:c6: 61:b4:f9:84:8b:c9:74:22:c7:fd:cb:79:19:94:89:e4: 7b:61:ad:6b:33:67:54:45:40:a0:dd:70:5e:fc:ff:0e Fingerprint (SHA-256): 02:FE:03:87:69:3D:A2:12:86:05:A4:AC:0D:3E:A2:E4:71:8E:26:79:C0:64:CC:5D:8F:58:C9:2D:45:94:11:D9 Fingerprint (SHA1): BE:BB:C3:6E:D2:A9:51:C0:4D:73:9A:12:44:6D:46:C5:5B:62:DA:5B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #14716: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092811 (0x6715d8b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Jan 08 15:04:33 2016 Not After : Fri Jan 08 15:04:33 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:79:04:03:7d:8f:39:9f:44:69:86:b6:b0:ea:04:af: 6e:4c:68:40:d1:1b:22:54:e2:82:0c:2e:d0:57:5a:60: 2d:3b:be:46:24:42:25:8a:37:ee:fe:df:cd:9f:75:f7: c1:c2:b7:6e:4d:2c:3e:39:31:07:f4:36:91:70:e7:1b: 64:f9:80:7a:b8:71:ca:56:cd:fa:17:00:6c:ee:cd:49: 7d:cf:f2:64:0f:43:44:a9:ce:b1:9b:6f:60:0a:99:a2: 64:ad:8f:a4:90:dd:44:ba:30:8b:06:4d:e6:91:30:2b: 12:21:de:40:19:a6:3a:e7:c2:3f:be:c5:f3:87:92:dd: f4:f3:2e:2e:74:99:ba:56:ba:d5:d1:60:67:2a:d9:36: ce:11:2c:17:5c:99:0e:d5:03:b2:f1:38:6a:2e:7c:e9: 16:23:e2:52:8e:bf:d0:e9:8f:38:f0:79:bb:94:67:df: 38:99:fe:fb:3e:39:cf:c4:b7:e5:37:13:27:ed:81:ab: 32:02:41:4f:8c:2b:82:d0:b9:59:7e:6d:03:f1:fb:5f: 88:8d:9f:fd:1e:58:c4:5a:0a:fa:53:0a:4e:cc:ec:e5: 42:e2:90:bf:ed:8b:00:f1:aa:04:f0:ea:d4:ef:e4:ad: df:f8:8d:27:47:2b:dd:4f:68:d2:b8:cb:7c:90:b9:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:93:7c:08:56:f0:ca:92:37:de:a4:1a:58:86:07:6a: 33:44:d3:a3:f1:79:96:1f:d9:4a:73:f5:10:e5:cb:07: f1:8e:a1:4e:81:3e:b0:ca:97:24:e3:74:57:5f:4f:f7: 9b:ab:b8:b6:bb:01:dd:8e:1a:f0:4f:4d:a3:2b:12:46: 15:a2:20:59:28:52:c4:1b:c8:8e:72:a5:fa:9f:9a:a1: e4:44:da:42:a2:24:59:89:e6:c6:25:93:d1:05:6f:e4: 50:c2:2c:c6:33:b2:3f:60:da:5f:46:d0:9d:77:ea:7a: 0c:87:1d:a7:9f:2a:3f:56:bd:3b:92:64:ce:f2:32:d0: fc:65:16:8b:1a:27:4c:70:ac:f2:c6:6c:24:66:02:02: 63:94:6e:f5:5d:d8:73:df:cd:52:3c:47:91:03:f2:06: 1d:d4:11:71:62:94:33:c3:c7:09:14:e1:24:3c:3b:55: 75:5e:a5:f2:64:a5:08:af:08:08:55:1c:bb:87:7b:be: 7a:f5:a3:25:57:03:4c:41:8b:11:88:1a:0f:f9:45:63: 80:9d:33:87:21:18:83:2c:0a:66:b7:80:29:5a:86:66: 01:44:19:97:1d:3c:23:60:bf:a0:68:ac:7a:f9:39:61: 6e:52:e9:93:26:a7:e2:68:67:2c:5b:ed:33:5e:a3:1f Fingerprint (SHA-256): C8:53:05:27:C5:22:AF:94:A8:14:EF:EA:5A:38:B3:F3:5B:20:A1:5A:D7:0F:3B:E6:8F:63:E5:4D:35:F4:08:61 Fingerprint (SHA1): C4:B4:DE:B7:C4:26:12:62:FA:F4:8B:71:E9:4E:63:06:3B:6C:95:2F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #14717: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092812 (0x6715d8c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Jan 08 15:04:51 2016 Not After : Fri Jan 08 15:04:51 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:d3:a8:de:d2:fb:9e:2b:55:4e:3f:18:b7:d0:d6:67: fd:e4:b2:75:5c:0e:37:00:4c:62:42:89:2c:48:bc:8d: 2c:f4:a0:b9:f4:11:61:f5:c5:f0:1e:2d:06:ce:20:fd: d6:b5:b9:3f:31:a0:27:85:8f:0b:42:37:b6:74:0c:16: c8:3f:ad:c8:6f:b6:6b:9a:0d:3d:bb:b2:ba:51:27:a3: d0:dc:d5:98:2f:9d:0f:0e:6d:70:a2:84:55:8a:16:8b: 74:ad:78:a1:ba:1f:ab:50:e8:8e:03:e7:2f:23:e0:34: 8e:4f:8c:8f:07:c0:d5:6b:b8:94:2f:dc:3c:fd:fd:55: d4:57:d3:a0:5d:e3:22:37:10:a0:11:07:6f:b5:1d:87: 81:9a:e6:86:6a:e7:96:e8:d4:96:d1:6c:b9:ee:03:4c: 84:84:eb:b2:b0:e9:2d:4e:a4:e9:a1:24:7d:d0:a6:48: 99:f8:e1:5f:9f:03:fd:5c:b4:8f:4a:1e:b6:7e:98:58: 45:56:b4:9d:7b:c1:35:04:bf:32:8b:58:71:1a:7b:35: 13:3a:ea:7a:4a:a3:0e:df:37:34:e5:14:28:84:59:52: ca:c1:a0:96:cd:86:dd:75:33:25:15:95:cb:7f:f2:af: 52:1b:f2:60:78:d5:75:2c:09:ef:ef:46:fc:b3:97:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:f0:36:5e:6f:9a:e9:ce:97:2b:63:78:78:87:27:58: 50:2c:6f:99:fa:49:59:bc:93:d4:d7:ac:a5:24:c2:1e: f0:56:1b:ad:16:f5:32:e3:58:27:5c:83:30:23:3b:92: 4a:24:5e:e2:dd:c9:fe:b5:59:95:3f:0a:f6:ab:f6:ef: 9e:d3:c5:54:7f:a5:11:89:5b:82:a2:20:97:d2:a3:50: 9a:48:24:da:4e:4e:55:a2:8f:a1:81:72:8f:34:0a:aa: 27:b5:67:36:67:30:86:48:35:bb:e1:b5:28:f5:e1:86: 21:de:c5:5e:1d:88:8a:d2:b3:e1:e8:67:20:cb:9a:f4: f3:95:3d:c3:c2:73:b8:64:af:6c:94:70:3c:b1:40:79: b1:4e:25:5f:a4:d7:d7:58:ac:d9:0b:85:55:cb:da:b9: dc:e1:91:70:e8:88:4a:19:24:79:3f:54:e0:af:85:72: 42:5f:f4:f0:9e:41:a6:c0:a3:e9:ab:60:f0:8e:02:f2: bf:db:fb:14:cd:4f:24:11:66:1a:f4:99:75:68:c2:4b: 09:b0:55:7a:28:cc:7c:08:ea:af:a2:60:3b:73:6b:03: 7d:21:d8:d3:dc:01:6d:84:6c:57:2b:91:72:a9:94:ab: a4:67:8f:12:24:b1:ef:ec:9e:5a:72:7a:74:43:20:23 Fingerprint (SHA-256): BA:A7:19:2E:2D:CD:67:4D:37:77:01:37:95:E4:5B:F9:88:9A:95:23:5C:19:35:6A:44:4B:2F:A7:2F:F2:A3:48 Fingerprint (SHA1): 1E:1B:19:46:0A:DE:0A:D1:9E:F8:DF:9D:90:57:20:D6:31:63:1D:15 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #14718: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14719: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092827 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14720: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14721: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14722: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14723: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108092828 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14724: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14725: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14726: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14727: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108092829 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14728: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14729: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14730: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14731: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108092830 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14732: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14733: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14734: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092827 (0x6715d9b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:06:45 2016 Not After : Fri Jan 08 15:06:45 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:27:b1:d7:0a:cc:ab:7b:29:78:e9:7d:b1:68:07:1f: 6d:99:0c:e9:fd:a1:6d:d9:cb:7a:fe:44:7b:30:db:73: 45:97:1c:63:b5:bb:da:3b:8d:ca:f4:bc:ed:27:ac:6e: 5a:17:7e:83:2c:fb:91:e0:5d:63:7f:4f:46:8f:5b:15: e9:74:59:07:69:8b:4a:8d:a9:1b:c7:16:f3:1d:4c:88: b5:bd:fa:e4:89:aa:32:78:ef:db:74:e8:77:61:25:c6: 92:89:fc:ce:ea:8f:54:1d:ae:b9:4a:05:6d:c6:a5:dc: e8:2a:50:a0:84:75:65:f7:80:8e:a0:70:57:b5:62:a2: 71:86:2a:0c:f0:66:c0:b6:c7:c6:d4:4b:c0:05:e1:7a: c2:fc:45:47:f2:38:c3:09:5e:5c:07:53:e9:9a:da:2e: 1d:f4:9f:94:2e:bd:67:9e:66:29:61:11:20:a9:a0:9a: 93:cd:f0:9b:f3:d2:5a:9b:5a:da:f7:e9:fe:bb:bf:d6: 4a:2f:48:18:a8:f9:2a:55:67:fe:72:fc:dd:30:a9:fa: 6a:78:c7:26:41:0b:45:bf:41:fb:47:e6:b7:62:fd:5e: 1d:d7:bd:86:49:00:36:1b:c8:d5:87:db:39:95:72:6a: 7f:40:52:c0:a9:ff:09:5a:5c:f1:d0:81:6e:60:1a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:02:b6:b9:4f:b4:2a:f9:4a:8d:ce:7a:e9:55:1c:e7: b3:5f:e0:3f:07:77:75:dc:e8:ae:17:f6:c1:44:83:63: 00:c4:9c:18:3d:05:e6:26:79:57:e6:c3:17:10:28:32: 23:51:c4:e2:1f:62:15:6b:64:da:58:d3:d7:5e:ab:a6: 82:17:f9:8c:40:86:f8:bb:24:8c:a2:50:50:4d:8b:dd: 8e:80:38:c4:a9:cd:b8:36:b1:df:ec:92:ff:e8:e5:fb: 54:aa:21:cd:e0:56:dd:d9:d3:e5:6a:38:39:56:03:b8: c5:f1:b0:ec:75:99:f3:dc:9f:20:2c:83:30:a1:96:64: 27:da:ff:26:75:23:89:a7:01:a9:2c:55:6c:3e:71:3b: d6:00:53:ee:b0:78:88:fe:21:dd:f2:da:ee:5c:51:48: 94:c1:f9:d7:cf:ff:06:f8:8c:3f:79:fb:e6:14:b0:2d: 0b:87:a4:17:75:27:8d:d0:f8:ea:64:34:56:fb:74:df: 03:fa:d4:ab:76:1c:d0:a7:7e:4b:2a:6b:a7:c3:df:ce: 0f:68:8f:32:01:46:b1:5f:7c:35:1f:74:e1:ee:c9:ba: 1f:80:f5:23:44:16:b0:71:e1:6b:d9:80:19:33:0a:7f: 21:4c:79:78:2f:eb:1a:39:ba:db:3d:71:af:f0:d3:e0 Fingerprint (SHA-256): AE:6C:EE:C3:9F:31:D8:F1:D3:86:6F:31:18:F7:8D:45:1D:EB:80:CE:3D:DA:EF:66:20:F6:DA:25:E4:D2:5B:C7 Fingerprint (SHA1): 1B:5C:9D:18:74:1B:ED:19:54:0D:18:30:38:7B:65:91:6D:D5:47:E9 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14735: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14736: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092828 (0x6715d9c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:06:55 2016 Not After : Fri Jan 08 15:06:55 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:8b:65:af:46:99:63:97:25:01:c3:f8:90:28:8d:07: 5e:b6:38:57:d1:82:28:2e:24:17:3a:4a:83:50:52:40: 7e:97:c4:71:3d:e8:ba:8b:64:10:b0:d8:59:db:98:de: f3:8f:4f:5a:1d:a8:e7:7e:81:b9:1b:84:d2:33:e7:9f: 55:26:1c:87:6b:ea:af:15:0d:d2:ed:bd:3c:a0:ab:8c: 03:b4:2e:03:b4:3e:cf:24:18:1f:4e:6f:7e:c1:e0:29: 69:59:aa:21:36:47:72:4c:8c:41:18:00:06:b8:96:31: 3a:6d:43:f9:b3:b8:66:d3:35:90:70:39:3f:eb:70:4c: 15:b1:aa:c3:fc:7c:c6:19:96:dd:e9:b7:ab:9b:e5:6b: ca:fc:35:93:9a:17:be:03:30:b9:d5:83:06:bd:cf:53: 1c:fe:02:ed:23:f0:6b:1e:f6:da:90:63:8e:96:f9:63: b4:58:0e:af:f4:77:49:f6:ec:f0:38:a8:2a:de:ad:57: 1e:21:f6:60:cf:1d:6b:e1:1f:16:30:74:d1:e3:cf:40: 7b:7c:fb:3a:37:d0:cf:9a:5f:3a:85:2f:db:43:4a:38: 8a:19:1c:6b:c5:69:47:28:7c:e8:de:75:3f:eb:9c:4f: a2:67:02:00:e1:c9:3e:3d:63:5a:8a:59:c7:e7:a6:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:5a:6d:ef:89:60:95:5b:0a:29:c9:89:86:fd:72:bf: 88:f5:51:56:21:83:ba:84:81:1c:88:3a:d2:4e:cc:f0: ae:10:8d:12:9d:ec:10:82:ec:34:af:e3:ee:39:fc:a2: 87:9e:91:8d:ac:8f:8e:56:80:15:af:35:74:67:37:79: 2c:48:a8:6b:ca:f4:55:bd:32:fb:4a:da:36:67:16:48: 42:3b:f3:98:b6:41:05:c1:e6:9d:9a:02:91:2a:24:3c: 83:95:ad:98:9f:36:30:3b:a0:41:13:3c:b7:9b:2d:a3: 8a:ff:e6:84:40:06:ef:82:81:53:96:be:10:84:08:59: 32:ec:1d:b6:a9:cb:81:82:90:b8:d1:b9:2a:4e:f4:00: bf:70:41:49:78:5e:55:ca:24:7a:a1:2a:d4:4f:0a:3c: 4f:c3:fe:c4:0f:c6:0b:0c:33:84:4c:83:eb:7c:a9:1c: 4f:27:c0:b1:f9:74:07:aa:49:7b:28:74:74:76:bd:a5: 16:a7:73:08:92:24:1d:c9:78:aa:93:df:12:ee:f7:de: e9:58:bc:5b:32:c1:11:66:b6:40:a3:a7:b4:75:9b:fa: 4e:49:9c:b4:67:ca:3d:63:e2:c7:1e:f3:82:f3:bb:72: e5:45:a2:c8:31:fd:49:ff:b5:43:8d:24:d0:2a:56:c4 Fingerprint (SHA-256): 3B:06:9F:6E:CC:CF:E9:35:43:FE:0A:1F:80:7B:CD:C6:3B:16:C6:EE:5A:E9:E5:8D:07:6A:8C:3C:4F:2E:79:AC Fingerprint (SHA1): 84:80:1B:E7:78:53:41:59:F6:11:11:F6:99:93:3C:D5:4F:D8:1A:E6 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14737: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14738: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092829 (0x6715d9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 15:07:07 2016 Not After : Fri Jan 08 15:07:07 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:84:03:df:7a:23:52:c5:e2:59:46:88:d7:8c:25:44: 7c:be:e5:72:9e:46:6d:e0:eb:97:6f:ba:0f:6e:83:a3: 17:7c:4c:00:09:05:38:5a:18:5a:54:2f:99:68:84:3f: 2e:e8:47:4b:e9:0c:8b:d3:47:89:73:82:7d:af:8b:fa: f3:82:77:12:59:0a:ab:4f:51:82:81:27:c2:5e:65:d1: 35:5e:61:0b:88:4e:39:49:15:b8:16:fc:ee:0b:4b:8a: 0e:ff:c6:24:08:d1:b6:92:a5:88:cf:5c:9d:ea:53:61: 2e:88:29:bd:8c:c8:e9:c2:b6:f5:61:9b:e5:a3:ba:c4: 88:07:1f:ac:ef:6e:80:50:c6:57:ad:f0:51:28:93:ea: 7f:67:03:a1:8b:1b:d1:6f:5f:a6:37:16:8a:3a:b6:d3: c9:85:25:9d:d7:74:4d:b7:4e:db:8f:dc:33:bd:18:dc: fe:4c:f5:5e:ec:f8:80:78:35:79:ad:25:8e:ec:0a:38: 1d:71:03:a9:c5:b7:92:75:c3:30:1b:f4:c0:6f:49:60: 0d:88:19:4c:24:62:1a:91:25:eb:34:7b:d2:40:de:cb: f1:f4:19:f4:1c:d8:53:64:8b:16:b5:cd:11:8f:87:9f: 41:be:97:c8:19:43:4f:4e:8e:62:a7:79:7c:f7:a6:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:5a:1b:03:99:0e:db:ea:b8:66:1a:ee:0a:1c:45:ad: 43:9a:64:7d:e3:c1:e4:f5:ad:1e:f5:05:6e:45:7a:a1: 63:b3:95:0e:6d:b0:08:d1:30:2c:46:78:23:e4:17:ca: 66:2f:8e:95:1a:8b:04:a9:22:30:ec:66:5a:04:e8:35: 5b:98:df:e8:3d:19:c1:81:b7:88:32:43:47:07:3b:13: c4:d5:4c:78:76:71:87:ac:3c:44:95:1a:ea:7f:04:20: 89:94:c1:01:5e:30:91:b6:8f:ff:a8:07:26:15:b1:3b: 79:c1:9f:fa:8d:21:c1:f3:98:89:6f:0f:cc:0d:90:03: 8c:23:78:b3:cd:5d:06:48:4c:cd:bc:42:53:1e:9b:de: 5b:ef:06:8e:28:04:e8:bc:7e:d3:df:21:80:0c:a4:1d: de:11:f9:e5:94:da:21:22:c0:5a:bc:66:13:a3:f5:90: 7c:72:4d:97:ab:46:11:af:57:a3:61:b3:b4:e9:1d:ec: 61:ec:87:d9:75:67:7c:b5:86:31:2a:82:ef:18:d9:94: da:8f:05:35:f0:0a:aa:42:66:e1:27:3b:3d:57:e0:ea: af:6d:5b:78:46:72:94:dc:3f:b8:30:be:5a:6a:90:c6: aa:58:29:da:0c:79:16:a3:3a:c8:ef:43:a4:83:bd:85 Fingerprint (SHA-256): 5B:4E:AA:E5:AC:C2:DB:23:D7:5E:8C:C1:A3:27:D8:DE:30:DB:94:97:A1:34:8F:E4:7D:10:A8:AC:8B:5C:26:51 Fingerprint (SHA1): B7:FF:EC:6E:16:4F:DB:9F:49:F8:A1:9F:61:A7:23:E8:CF:41:E0:3B Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #14739: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14740: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14741: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #14742: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14743: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092827 (0x6715d9b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:06:45 2016 Not After : Fri Jan 08 15:06:45 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:27:b1:d7:0a:cc:ab:7b:29:78:e9:7d:b1:68:07:1f: 6d:99:0c:e9:fd:a1:6d:d9:cb:7a:fe:44:7b:30:db:73: 45:97:1c:63:b5:bb:da:3b:8d:ca:f4:bc:ed:27:ac:6e: 5a:17:7e:83:2c:fb:91:e0:5d:63:7f:4f:46:8f:5b:15: e9:74:59:07:69:8b:4a:8d:a9:1b:c7:16:f3:1d:4c:88: b5:bd:fa:e4:89:aa:32:78:ef:db:74:e8:77:61:25:c6: 92:89:fc:ce:ea:8f:54:1d:ae:b9:4a:05:6d:c6:a5:dc: e8:2a:50:a0:84:75:65:f7:80:8e:a0:70:57:b5:62:a2: 71:86:2a:0c:f0:66:c0:b6:c7:c6:d4:4b:c0:05:e1:7a: c2:fc:45:47:f2:38:c3:09:5e:5c:07:53:e9:9a:da:2e: 1d:f4:9f:94:2e:bd:67:9e:66:29:61:11:20:a9:a0:9a: 93:cd:f0:9b:f3:d2:5a:9b:5a:da:f7:e9:fe:bb:bf:d6: 4a:2f:48:18:a8:f9:2a:55:67:fe:72:fc:dd:30:a9:fa: 6a:78:c7:26:41:0b:45:bf:41:fb:47:e6:b7:62:fd:5e: 1d:d7:bd:86:49:00:36:1b:c8:d5:87:db:39:95:72:6a: 7f:40:52:c0:a9:ff:09:5a:5c:f1:d0:81:6e:60:1a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:02:b6:b9:4f:b4:2a:f9:4a:8d:ce:7a:e9:55:1c:e7: b3:5f:e0:3f:07:77:75:dc:e8:ae:17:f6:c1:44:83:63: 00:c4:9c:18:3d:05:e6:26:79:57:e6:c3:17:10:28:32: 23:51:c4:e2:1f:62:15:6b:64:da:58:d3:d7:5e:ab:a6: 82:17:f9:8c:40:86:f8:bb:24:8c:a2:50:50:4d:8b:dd: 8e:80:38:c4:a9:cd:b8:36:b1:df:ec:92:ff:e8:e5:fb: 54:aa:21:cd:e0:56:dd:d9:d3:e5:6a:38:39:56:03:b8: c5:f1:b0:ec:75:99:f3:dc:9f:20:2c:83:30:a1:96:64: 27:da:ff:26:75:23:89:a7:01:a9:2c:55:6c:3e:71:3b: d6:00:53:ee:b0:78:88:fe:21:dd:f2:da:ee:5c:51:48: 94:c1:f9:d7:cf:ff:06:f8:8c:3f:79:fb:e6:14:b0:2d: 0b:87:a4:17:75:27:8d:d0:f8:ea:64:34:56:fb:74:df: 03:fa:d4:ab:76:1c:d0:a7:7e:4b:2a:6b:a7:c3:df:ce: 0f:68:8f:32:01:46:b1:5f:7c:35:1f:74:e1:ee:c9:ba: 1f:80:f5:23:44:16:b0:71:e1:6b:d9:80:19:33:0a:7f: 21:4c:79:78:2f:eb:1a:39:ba:db:3d:71:af:f0:d3:e0 Fingerprint (SHA-256): AE:6C:EE:C3:9F:31:D8:F1:D3:86:6F:31:18:F7:8D:45:1D:EB:80:CE:3D:DA:EF:66:20:F6:DA:25:E4:D2:5B:C7 Fingerprint (SHA1): 1B:5C:9D:18:74:1B:ED:19:54:0D:18:30:38:7B:65:91:6D:D5:47:E9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14744: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14745: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092828 (0x6715d9c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:06:55 2016 Not After : Fri Jan 08 15:06:55 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:8b:65:af:46:99:63:97:25:01:c3:f8:90:28:8d:07: 5e:b6:38:57:d1:82:28:2e:24:17:3a:4a:83:50:52:40: 7e:97:c4:71:3d:e8:ba:8b:64:10:b0:d8:59:db:98:de: f3:8f:4f:5a:1d:a8:e7:7e:81:b9:1b:84:d2:33:e7:9f: 55:26:1c:87:6b:ea:af:15:0d:d2:ed:bd:3c:a0:ab:8c: 03:b4:2e:03:b4:3e:cf:24:18:1f:4e:6f:7e:c1:e0:29: 69:59:aa:21:36:47:72:4c:8c:41:18:00:06:b8:96:31: 3a:6d:43:f9:b3:b8:66:d3:35:90:70:39:3f:eb:70:4c: 15:b1:aa:c3:fc:7c:c6:19:96:dd:e9:b7:ab:9b:e5:6b: ca:fc:35:93:9a:17:be:03:30:b9:d5:83:06:bd:cf:53: 1c:fe:02:ed:23:f0:6b:1e:f6:da:90:63:8e:96:f9:63: b4:58:0e:af:f4:77:49:f6:ec:f0:38:a8:2a:de:ad:57: 1e:21:f6:60:cf:1d:6b:e1:1f:16:30:74:d1:e3:cf:40: 7b:7c:fb:3a:37:d0:cf:9a:5f:3a:85:2f:db:43:4a:38: 8a:19:1c:6b:c5:69:47:28:7c:e8:de:75:3f:eb:9c:4f: a2:67:02:00:e1:c9:3e:3d:63:5a:8a:59:c7:e7:a6:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:5a:6d:ef:89:60:95:5b:0a:29:c9:89:86:fd:72:bf: 88:f5:51:56:21:83:ba:84:81:1c:88:3a:d2:4e:cc:f0: ae:10:8d:12:9d:ec:10:82:ec:34:af:e3:ee:39:fc:a2: 87:9e:91:8d:ac:8f:8e:56:80:15:af:35:74:67:37:79: 2c:48:a8:6b:ca:f4:55:bd:32:fb:4a:da:36:67:16:48: 42:3b:f3:98:b6:41:05:c1:e6:9d:9a:02:91:2a:24:3c: 83:95:ad:98:9f:36:30:3b:a0:41:13:3c:b7:9b:2d:a3: 8a:ff:e6:84:40:06:ef:82:81:53:96:be:10:84:08:59: 32:ec:1d:b6:a9:cb:81:82:90:b8:d1:b9:2a:4e:f4:00: bf:70:41:49:78:5e:55:ca:24:7a:a1:2a:d4:4f:0a:3c: 4f:c3:fe:c4:0f:c6:0b:0c:33:84:4c:83:eb:7c:a9:1c: 4f:27:c0:b1:f9:74:07:aa:49:7b:28:74:74:76:bd:a5: 16:a7:73:08:92:24:1d:c9:78:aa:93:df:12:ee:f7:de: e9:58:bc:5b:32:c1:11:66:b6:40:a3:a7:b4:75:9b:fa: 4e:49:9c:b4:67:ca:3d:63:e2:c7:1e:f3:82:f3:bb:72: e5:45:a2:c8:31:fd:49:ff:b5:43:8d:24:d0:2a:56:c4 Fingerprint (SHA-256): 3B:06:9F:6E:CC:CF:E9:35:43:FE:0A:1F:80:7B:CD:C6:3B:16:C6:EE:5A:E9:E5:8D:07:6A:8C:3C:4F:2E:79:AC Fingerprint (SHA1): 84:80:1B:E7:78:53:41:59:F6:11:11:F6:99:93:3C:D5:4F:D8:1A:E6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14746: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14747: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092829 (0x6715d9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 15:07:07 2016 Not After : Fri Jan 08 15:07:07 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:84:03:df:7a:23:52:c5:e2:59:46:88:d7:8c:25:44: 7c:be:e5:72:9e:46:6d:e0:eb:97:6f:ba:0f:6e:83:a3: 17:7c:4c:00:09:05:38:5a:18:5a:54:2f:99:68:84:3f: 2e:e8:47:4b:e9:0c:8b:d3:47:89:73:82:7d:af:8b:fa: f3:82:77:12:59:0a:ab:4f:51:82:81:27:c2:5e:65:d1: 35:5e:61:0b:88:4e:39:49:15:b8:16:fc:ee:0b:4b:8a: 0e:ff:c6:24:08:d1:b6:92:a5:88:cf:5c:9d:ea:53:61: 2e:88:29:bd:8c:c8:e9:c2:b6:f5:61:9b:e5:a3:ba:c4: 88:07:1f:ac:ef:6e:80:50:c6:57:ad:f0:51:28:93:ea: 7f:67:03:a1:8b:1b:d1:6f:5f:a6:37:16:8a:3a:b6:d3: c9:85:25:9d:d7:74:4d:b7:4e:db:8f:dc:33:bd:18:dc: fe:4c:f5:5e:ec:f8:80:78:35:79:ad:25:8e:ec:0a:38: 1d:71:03:a9:c5:b7:92:75:c3:30:1b:f4:c0:6f:49:60: 0d:88:19:4c:24:62:1a:91:25:eb:34:7b:d2:40:de:cb: f1:f4:19:f4:1c:d8:53:64:8b:16:b5:cd:11:8f:87:9f: 41:be:97:c8:19:43:4f:4e:8e:62:a7:79:7c:f7:a6:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:5a:1b:03:99:0e:db:ea:b8:66:1a:ee:0a:1c:45:ad: 43:9a:64:7d:e3:c1:e4:f5:ad:1e:f5:05:6e:45:7a:a1: 63:b3:95:0e:6d:b0:08:d1:30:2c:46:78:23:e4:17:ca: 66:2f:8e:95:1a:8b:04:a9:22:30:ec:66:5a:04:e8:35: 5b:98:df:e8:3d:19:c1:81:b7:88:32:43:47:07:3b:13: c4:d5:4c:78:76:71:87:ac:3c:44:95:1a:ea:7f:04:20: 89:94:c1:01:5e:30:91:b6:8f:ff:a8:07:26:15:b1:3b: 79:c1:9f:fa:8d:21:c1:f3:98:89:6f:0f:cc:0d:90:03: 8c:23:78:b3:cd:5d:06:48:4c:cd:bc:42:53:1e:9b:de: 5b:ef:06:8e:28:04:e8:bc:7e:d3:df:21:80:0c:a4:1d: de:11:f9:e5:94:da:21:22:c0:5a:bc:66:13:a3:f5:90: 7c:72:4d:97:ab:46:11:af:57:a3:61:b3:b4:e9:1d:ec: 61:ec:87:d9:75:67:7c:b5:86:31:2a:82:ef:18:d9:94: da:8f:05:35:f0:0a:aa:42:66:e1:27:3b:3d:57:e0:ea: af:6d:5b:78:46:72:94:dc:3f:b8:30:be:5a:6a:90:c6: aa:58:29:da:0c:79:16:a3:3a:c8:ef:43:a4:83:bd:85 Fingerprint (SHA-256): 5B:4E:AA:E5:AC:C2:DB:23:D7:5E:8C:C1:A3:27:D8:DE:30:DB:94:97:A1:34:8F:E4:7D:10:A8:AC:8B:5C:26:51 Fingerprint (SHA1): B7:FF:EC:6E:16:4F:DB:9F:49:F8:A1:9F:61:A7:23:E8:CF:41:E0:3B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #14748: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14749: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14750: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092831 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14751: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14752: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14753: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14754: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108092832 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14755: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14756: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14757: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14758: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108092833 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14759: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14760: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #14761: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14762: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108092834 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14763: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14764: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #14765: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14766: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108092835 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14767: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14768: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14769: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092831 (0x6715d9f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:08:05 2016 Not After : Fri Jan 08 15:08:05 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:07:ff:70:69:f0:62:9c:d4:4a:11:a3:4d:ba:fe:57: 3b:a2:73:3a:e2:59:56:a0:ba:bd:d3:f6:6d:4d:47:58: d9:ce:95:ef:fe:6e:7c:dd:74:8c:99:9a:fe:1b:e6:65: 7b:49:6b:a4:21:d5:e7:69:86:71:2f:3b:05:81:58:69: 9d:d2:d1:62:ee:dc:06:2a:2c:72:60:d6:08:12:b6:68: 1c:0d:ec:b5:7a:66:4d:25:62:7e:4f:08:50:d9:13:9d: df:dc:e5:89:0e:ea:16:2d:c7:c2:50:41:c2:23:53:f6: 56:7f:40:0e:f6:99:c1:85:19:e4:bf:94:36:37:a2:ac: d1:2a:6f:0c:df:39:32:a6:92:7a:f5:07:38:4f:dc:b8: 64:03:b2:a9:f1:99:1f:89:c7:a9:1a:82:f9:84:07:86: 20:fe:31:75:dc:2e:61:65:0d:1c:f4:e2:cf:78:71:b3: 4c:e8:81:70:89:9d:8f:0d:28:7e:86:22:68:05:95:b3: 24:56:bf:a2:f1:c3:a5:8e:3c:90:98:c2:e9:12:b9:ae: f5:04:c2:9a:ec:63:22:95:66:b9:37:67:3f:a5:db:4f: 2f:1a:72:3b:e7:7e:b0:e9:9c:0b:94:d4:7e:66:41:97: 17:b9:4b:1c:f2:97:03:5a:59:b4:3b:af:a0:54:02:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:87:6d:d3:17:76:57:ee:51:bd:d5:9b:c8:db:8d:72: 20:dd:d8:d4:e0:86:85:21:7e:d7:bd:6c:1d:96:0c:1d: 3b:79:e7:d4:f1:1e:6b:e7:26:1c:46:db:cc:19:4a:06: e1:b7:20:56:ba:ff:bc:9a:10:81:32:fe:7b:5c:f5:14: a8:8b:75:6a:ab:ea:2d:6e:f2:2b:37:51:b9:02:7b:5a: 2e:30:2f:8e:0a:e8:d7:73:0d:54:b2:7e:03:b6:6d:9b: ab:82:ca:96:04:b1:9d:dc:29:0a:e2:1d:09:87:e4:75: b1:8f:b4:ac:29:09:11:62:11:df:cd:42:3a:45:8b:97: 2d:0f:75:c7:2f:31:ec:ed:9b:6b:64:9e:0d:51:3a:8e: 2a:f7:0e:9c:d7:ca:cc:11:f9:82:56:28:3d:60:bb:81: 1d:bc:10:ed:02:ce:98:c7:ea:e3:d9:08:36:d6:55:1d: ef:5b:5c:79:28:dc:0b:ed:1b:4c:a2:3f:31:04:ff:0f: 79:17:3d:fc:98:68:22:b9:bc:23:e4:a1:bd:cb:88:88: 6e:3f:e5:4f:24:24:04:55:fc:ee:2d:0a:9b:13:e0:44: 56:37:a3:a8:f9:d4:65:87:45:b7:89:d7:67:08:7e:18: 28:9c:0c:eb:22:6f:29:05:1c:86:5a:a9:38:72:be:46 Fingerprint (SHA-256): 93:60:F1:58:AD:0E:D1:FB:BB:66:1D:B5:ED:3A:4C:A1:87:8C:81:77:93:C5:F8:59:6A:E5:19:FF:D7:92:8B:1E Fingerprint (SHA1): 5C:CA:E2:D0:84:20:86:08:DF:56:57:17:B7:AC:B1:D3:A3:E1:40:0F Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14770: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14771: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092832 (0x6715da0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:08:14 2016 Not After : Fri Jan 08 15:08:14 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:f9:ab:3d:d1:fa:87:38:31:3c:73:7b:4e:a2:63:5e: c2:7f:dc:49:2a:66:07:5e:86:86:67:4a:49:39:a0:4d: 16:d1:f1:19:9a:99:e0:b0:ed:df:db:d9:fa:95:5b:70: 33:89:b8:c6:6a:75:3a:aa:4e:94:13:6d:11:c7:8b:c2: 65:92:cf:d6:56:6d:50:06:e5:72:30:ff:ee:19:00:40: 62:ee:35:5a:78:3d:5f:d2:d7:76:e0:78:cc:3d:1c:ef: 07:76:6d:13:88:a9:2c:41:7c:e2:cd:0e:8d:1f:65:54: ed:5d:2a:60:02:f3:ac:f5:fa:af:11:90:4a:71:4b:8d: 49:27:f4:9d:1c:ef:31:a7:96:2e:fc:ae:a2:d8:b2:a3: d5:48:0d:e0:61:8e:d8:3c:f7:96:a2:3d:c3:82:7a:6a: 2e:64:da:77:a9:97:d7:e0:e1:66:5d:f3:7a:66:15:9a: 18:21:74:2e:2d:ec:44:b1:6e:f8:04:ef:26:d0:bd:02: 2e:bd:51:86:a2:9b:c2:97:b5:0e:c4:b3:c3:41:02:7d: 0c:46:44:e9:d0:0e:1c:e7:67:23:1f:d4:14:d4:9b:a6: a1:45:b4:76:c4:f5:56:26:56:cb:c7:4c:ce:2b:3c:b1: 5b:c4:99:a3:91:b0:22:45:81:22:95:05:95:d2:1e:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:82:bb:b9:9a:ea:ef:6c:b3:23:9e:14:bb:36:35:b5: 71:bb:38:1f:72:a0:63:ea:90:65:15:32:8e:ee:8d:a3: 8f:e8:3a:4d:89:d5:36:b4:cb:b2:7e:88:62:3a:77:0f: d8:21:82:3f:80:f9:9d:4b:62:36:31:7f:59:64:3c:38: 01:3d:e5:81:80:a0:38:36:21:6a:72:9d:cb:6c:cc:50: 82:8e:54:be:e8:a1:5f:27:2a:cb:ec:a9:d2:62:be:21: 99:23:48:09:a1:4a:f1:e1:e9:43:68:fc:1a:eb:8d:51: 39:fd:b9:e9:cd:87:d6:cf:0e:76:00:0c:58:67:07:ba: b3:90:0f:56:ed:4e:49:31:13:0f:19:ba:22:61:d9:03: 02:b8:e9:71:1e:e4:1f:47:4f:f3:d4:e9:78:a0:69:00: 4f:1c:b6:a5:e5:4a:a8:1a:f0:ee:48:77:cd:a9:8d:97: 8a:93:52:69:d0:83:e5:57:4d:b2:4e:1c:f7:ee:56:50: a6:df:38:57:75:5e:78:f4:fc:44:45:36:dc:34:eb:79: 9b:27:96:61:2c:dc:85:dc:53:be:89:9f:f2:ad:32:a9: ab:22:69:76:a0:5d:61:23:87:31:08:09:df:99:15:e8: 77:b9:aa:13:c1:65:70:7e:ab:72:c5:90:ca:a4:bf:57 Fingerprint (SHA-256): 38:C2:11:C0:9D:47:38:AF:66:99:69:76:25:C7:88:FC:AE:55:B1:77:EE:F6:B1:22:79:12:2B:CB:07:86:11:69 Fingerprint (SHA1): 81:51:46:F2:E0:94:A5:31:74:97:31:97:C2:BC:E0:74:20:EA:52:7E Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14772: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14773: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092833 (0x6715da1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 15:08:20 2016 Not After : Fri Jan 08 15:08:20 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:bd:bf:08:23:0b:c2:a7:9e:6d:7e:48:a8:d9:4e:1c: 21:3b:26:01:0e:a0:28:36:10:ff:49:94:77:44:95:e5: 43:9a:f3:98:cd:0d:90:3f:1d:31:f6:e3:71:27:a6:04: 1e:78:98:2d:ab:51:ae:a1:c9:fe:46:cd:90:59:87:50: 00:d5:6d:9d:48:33:75:ef:f2:5b:a6:56:18:98:8e:df: 8b:73:91:cf:f7:6e:cf:ce:97:29:68:9e:8f:57:16:76: cb:1a:6c:1d:d3:79:fb:64:dd:22:84:4a:b5:8a:da:69: 68:15:c3:ed:ad:50:c0:ff:ab:45:5f:e6:87:62:20:8f: 72:a3:64:0c:cd:77:ab:d3:64:05:36:a3:47:a9:c6:4d: 22:d2:f3:35:60:b4:70:2a:a1:84:85:51:aa:2b:2b:e5: 43:85:cc:fb:eb:fe:3f:fc:d5:a7:bf:bb:59:3f:2e:5c: 80:18:48:2a:7c:f6:aa:f2:84:7c:41:00:d5:e0:28:61: 1f:28:b5:85:8d:5d:a3:e7:9f:50:5f:c7:be:18:ae:bc: ed:ea:f4:1f:4c:dd:11:a8:ea:74:5b:f4:7f:6e:f5:4c: bc:57:40:b5:40:12:ac:f0:24:8d:11:5f:37:4c:d7:49: 75:f2:66:5c:ea:ee:dc:21:9b:b5:0a:ab:cd:68:1d:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:28:f2:74:42:52:45:ab:79:c4:5c:db:1a:8a:35:8a: f0:fb:94:78:c3:45:01:25:8f:36:ac:47:17:6e:38:79: cd:fd:b8:2d:1b:2c:f7:59:a9:7f:99:e2:ef:24:5d:b4: 0f:be:f2:2d:a4:a7:34:53:f7:fc:6f:f3:5c:e0:9b:da: 85:2c:07:39:21:32:bd:3b:8c:ec:73:a0:47:18:36:9b: 76:c5:cf:b8:70:29:81:4c:d3:f9:cb:67:84:57:d9:7f: 07:11:bf:fe:00:7f:0f:35:94:3f:4c:49:7e:26:96:82: 52:08:33:b0:c1:24:58:5e:c1:72:da:3e:89:05:20:e5: 2d:5d:cd:ac:8d:dc:d1:45:9a:6e:e2:08:32:b1:e5:b7: 7b:ae:fc:5e:6c:db:0d:16:8c:42:90:16:82:67:b9:93: 13:92:b9:b8:a8:0e:c8:36:92:96:87:14:db:58:0b:86: 78:40:82:17:8d:e2:3c:35:d3:b7:88:13:0f:19:33:5d: a0:4d:e1:6e:f2:23:0c:c6:ba:f7:0c:06:6e:ca:3d:80: 07:f3:d7:d5:f0:b4:53:72:ae:15:47:19:79:6c:b4:87: 70:6c:1f:31:2c:38:e4:5d:8a:e5:72:b0:fe:26:68:bc: 7d:ba:37:94:c8:68:af:6e:00:17:93:9e:f9:47:15:9a Fingerprint (SHA-256): 33:28:57:77:CE:A5:74:4B:D9:AC:03:25:1A:00:53:D7:79:68:36:D8:3B:6C:46:F9:5A:99:84:EA:3E:F1:26:8F Fingerprint (SHA1): 07:66:CD:A0:D6:91:E7:09:1A:F7:E0:AF:30:F0:E7:85:F2:46:36:B8 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #14774: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14775: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14776: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #14777: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14778: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092831 (0x6715d9f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:08:05 2016 Not After : Fri Jan 08 15:08:05 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:07:ff:70:69:f0:62:9c:d4:4a:11:a3:4d:ba:fe:57: 3b:a2:73:3a:e2:59:56:a0:ba:bd:d3:f6:6d:4d:47:58: d9:ce:95:ef:fe:6e:7c:dd:74:8c:99:9a:fe:1b:e6:65: 7b:49:6b:a4:21:d5:e7:69:86:71:2f:3b:05:81:58:69: 9d:d2:d1:62:ee:dc:06:2a:2c:72:60:d6:08:12:b6:68: 1c:0d:ec:b5:7a:66:4d:25:62:7e:4f:08:50:d9:13:9d: df:dc:e5:89:0e:ea:16:2d:c7:c2:50:41:c2:23:53:f6: 56:7f:40:0e:f6:99:c1:85:19:e4:bf:94:36:37:a2:ac: d1:2a:6f:0c:df:39:32:a6:92:7a:f5:07:38:4f:dc:b8: 64:03:b2:a9:f1:99:1f:89:c7:a9:1a:82:f9:84:07:86: 20:fe:31:75:dc:2e:61:65:0d:1c:f4:e2:cf:78:71:b3: 4c:e8:81:70:89:9d:8f:0d:28:7e:86:22:68:05:95:b3: 24:56:bf:a2:f1:c3:a5:8e:3c:90:98:c2:e9:12:b9:ae: f5:04:c2:9a:ec:63:22:95:66:b9:37:67:3f:a5:db:4f: 2f:1a:72:3b:e7:7e:b0:e9:9c:0b:94:d4:7e:66:41:97: 17:b9:4b:1c:f2:97:03:5a:59:b4:3b:af:a0:54:02:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:87:6d:d3:17:76:57:ee:51:bd:d5:9b:c8:db:8d:72: 20:dd:d8:d4:e0:86:85:21:7e:d7:bd:6c:1d:96:0c:1d: 3b:79:e7:d4:f1:1e:6b:e7:26:1c:46:db:cc:19:4a:06: e1:b7:20:56:ba:ff:bc:9a:10:81:32:fe:7b:5c:f5:14: a8:8b:75:6a:ab:ea:2d:6e:f2:2b:37:51:b9:02:7b:5a: 2e:30:2f:8e:0a:e8:d7:73:0d:54:b2:7e:03:b6:6d:9b: ab:82:ca:96:04:b1:9d:dc:29:0a:e2:1d:09:87:e4:75: b1:8f:b4:ac:29:09:11:62:11:df:cd:42:3a:45:8b:97: 2d:0f:75:c7:2f:31:ec:ed:9b:6b:64:9e:0d:51:3a:8e: 2a:f7:0e:9c:d7:ca:cc:11:f9:82:56:28:3d:60:bb:81: 1d:bc:10:ed:02:ce:98:c7:ea:e3:d9:08:36:d6:55:1d: ef:5b:5c:79:28:dc:0b:ed:1b:4c:a2:3f:31:04:ff:0f: 79:17:3d:fc:98:68:22:b9:bc:23:e4:a1:bd:cb:88:88: 6e:3f:e5:4f:24:24:04:55:fc:ee:2d:0a:9b:13:e0:44: 56:37:a3:a8:f9:d4:65:87:45:b7:89:d7:67:08:7e:18: 28:9c:0c:eb:22:6f:29:05:1c:86:5a:a9:38:72:be:46 Fingerprint (SHA-256): 93:60:F1:58:AD:0E:D1:FB:BB:66:1D:B5:ED:3A:4C:A1:87:8C:81:77:93:C5:F8:59:6A:E5:19:FF:D7:92:8B:1E Fingerprint (SHA1): 5C:CA:E2:D0:84:20:86:08:DF:56:57:17:B7:AC:B1:D3:A3:E1:40:0F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14779: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14780: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092832 (0x6715da0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:08:14 2016 Not After : Fri Jan 08 15:08:14 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:f9:ab:3d:d1:fa:87:38:31:3c:73:7b:4e:a2:63:5e: c2:7f:dc:49:2a:66:07:5e:86:86:67:4a:49:39:a0:4d: 16:d1:f1:19:9a:99:e0:b0:ed:df:db:d9:fa:95:5b:70: 33:89:b8:c6:6a:75:3a:aa:4e:94:13:6d:11:c7:8b:c2: 65:92:cf:d6:56:6d:50:06:e5:72:30:ff:ee:19:00:40: 62:ee:35:5a:78:3d:5f:d2:d7:76:e0:78:cc:3d:1c:ef: 07:76:6d:13:88:a9:2c:41:7c:e2:cd:0e:8d:1f:65:54: ed:5d:2a:60:02:f3:ac:f5:fa:af:11:90:4a:71:4b:8d: 49:27:f4:9d:1c:ef:31:a7:96:2e:fc:ae:a2:d8:b2:a3: d5:48:0d:e0:61:8e:d8:3c:f7:96:a2:3d:c3:82:7a:6a: 2e:64:da:77:a9:97:d7:e0:e1:66:5d:f3:7a:66:15:9a: 18:21:74:2e:2d:ec:44:b1:6e:f8:04:ef:26:d0:bd:02: 2e:bd:51:86:a2:9b:c2:97:b5:0e:c4:b3:c3:41:02:7d: 0c:46:44:e9:d0:0e:1c:e7:67:23:1f:d4:14:d4:9b:a6: a1:45:b4:76:c4:f5:56:26:56:cb:c7:4c:ce:2b:3c:b1: 5b:c4:99:a3:91:b0:22:45:81:22:95:05:95:d2:1e:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:82:bb:b9:9a:ea:ef:6c:b3:23:9e:14:bb:36:35:b5: 71:bb:38:1f:72:a0:63:ea:90:65:15:32:8e:ee:8d:a3: 8f:e8:3a:4d:89:d5:36:b4:cb:b2:7e:88:62:3a:77:0f: d8:21:82:3f:80:f9:9d:4b:62:36:31:7f:59:64:3c:38: 01:3d:e5:81:80:a0:38:36:21:6a:72:9d:cb:6c:cc:50: 82:8e:54:be:e8:a1:5f:27:2a:cb:ec:a9:d2:62:be:21: 99:23:48:09:a1:4a:f1:e1:e9:43:68:fc:1a:eb:8d:51: 39:fd:b9:e9:cd:87:d6:cf:0e:76:00:0c:58:67:07:ba: b3:90:0f:56:ed:4e:49:31:13:0f:19:ba:22:61:d9:03: 02:b8:e9:71:1e:e4:1f:47:4f:f3:d4:e9:78:a0:69:00: 4f:1c:b6:a5:e5:4a:a8:1a:f0:ee:48:77:cd:a9:8d:97: 8a:93:52:69:d0:83:e5:57:4d:b2:4e:1c:f7:ee:56:50: a6:df:38:57:75:5e:78:f4:fc:44:45:36:dc:34:eb:79: 9b:27:96:61:2c:dc:85:dc:53:be:89:9f:f2:ad:32:a9: ab:22:69:76:a0:5d:61:23:87:31:08:09:df:99:15:e8: 77:b9:aa:13:c1:65:70:7e:ab:72:c5:90:ca:a4:bf:57 Fingerprint (SHA-256): 38:C2:11:C0:9D:47:38:AF:66:99:69:76:25:C7:88:FC:AE:55:B1:77:EE:F6:B1:22:79:12:2B:CB:07:86:11:69 Fingerprint (SHA1): 81:51:46:F2:E0:94:A5:31:74:97:31:97:C2:BC:E0:74:20:EA:52:7E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14781: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14782: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092833 (0x6715da1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 15:08:20 2016 Not After : Fri Jan 08 15:08:20 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:bd:bf:08:23:0b:c2:a7:9e:6d:7e:48:a8:d9:4e:1c: 21:3b:26:01:0e:a0:28:36:10:ff:49:94:77:44:95:e5: 43:9a:f3:98:cd:0d:90:3f:1d:31:f6:e3:71:27:a6:04: 1e:78:98:2d:ab:51:ae:a1:c9:fe:46:cd:90:59:87:50: 00:d5:6d:9d:48:33:75:ef:f2:5b:a6:56:18:98:8e:df: 8b:73:91:cf:f7:6e:cf:ce:97:29:68:9e:8f:57:16:76: cb:1a:6c:1d:d3:79:fb:64:dd:22:84:4a:b5:8a:da:69: 68:15:c3:ed:ad:50:c0:ff:ab:45:5f:e6:87:62:20:8f: 72:a3:64:0c:cd:77:ab:d3:64:05:36:a3:47:a9:c6:4d: 22:d2:f3:35:60:b4:70:2a:a1:84:85:51:aa:2b:2b:e5: 43:85:cc:fb:eb:fe:3f:fc:d5:a7:bf:bb:59:3f:2e:5c: 80:18:48:2a:7c:f6:aa:f2:84:7c:41:00:d5:e0:28:61: 1f:28:b5:85:8d:5d:a3:e7:9f:50:5f:c7:be:18:ae:bc: ed:ea:f4:1f:4c:dd:11:a8:ea:74:5b:f4:7f:6e:f5:4c: bc:57:40:b5:40:12:ac:f0:24:8d:11:5f:37:4c:d7:49: 75:f2:66:5c:ea:ee:dc:21:9b:b5:0a:ab:cd:68:1d:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:28:f2:74:42:52:45:ab:79:c4:5c:db:1a:8a:35:8a: f0:fb:94:78:c3:45:01:25:8f:36:ac:47:17:6e:38:79: cd:fd:b8:2d:1b:2c:f7:59:a9:7f:99:e2:ef:24:5d:b4: 0f:be:f2:2d:a4:a7:34:53:f7:fc:6f:f3:5c:e0:9b:da: 85:2c:07:39:21:32:bd:3b:8c:ec:73:a0:47:18:36:9b: 76:c5:cf:b8:70:29:81:4c:d3:f9:cb:67:84:57:d9:7f: 07:11:bf:fe:00:7f:0f:35:94:3f:4c:49:7e:26:96:82: 52:08:33:b0:c1:24:58:5e:c1:72:da:3e:89:05:20:e5: 2d:5d:cd:ac:8d:dc:d1:45:9a:6e:e2:08:32:b1:e5:b7: 7b:ae:fc:5e:6c:db:0d:16:8c:42:90:16:82:67:b9:93: 13:92:b9:b8:a8:0e:c8:36:92:96:87:14:db:58:0b:86: 78:40:82:17:8d:e2:3c:35:d3:b7:88:13:0f:19:33:5d: a0:4d:e1:6e:f2:23:0c:c6:ba:f7:0c:06:6e:ca:3d:80: 07:f3:d7:d5:f0:b4:53:72:ae:15:47:19:79:6c:b4:87: 70:6c:1f:31:2c:38:e4:5d:8a:e5:72:b0:fe:26:68:bc: 7d:ba:37:94:c8:68:af:6e:00:17:93:9e:f9:47:15:9a Fingerprint (SHA-256): 33:28:57:77:CE:A5:74:4B:D9:AC:03:25:1A:00:53:D7:79:68:36:D8:3B:6C:46:F9:5A:99:84:EA:3E:F1:26:8F Fingerprint (SHA1): 07:66:CD:A0:D6:91:E7:09:1A:F7:E0:AF:30:F0:E7:85:F2:46:36:B8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #14783: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14784: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092831 (0x6715d9f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:08:05 2016 Not After : Fri Jan 08 15:08:05 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:07:ff:70:69:f0:62:9c:d4:4a:11:a3:4d:ba:fe:57: 3b:a2:73:3a:e2:59:56:a0:ba:bd:d3:f6:6d:4d:47:58: d9:ce:95:ef:fe:6e:7c:dd:74:8c:99:9a:fe:1b:e6:65: 7b:49:6b:a4:21:d5:e7:69:86:71:2f:3b:05:81:58:69: 9d:d2:d1:62:ee:dc:06:2a:2c:72:60:d6:08:12:b6:68: 1c:0d:ec:b5:7a:66:4d:25:62:7e:4f:08:50:d9:13:9d: df:dc:e5:89:0e:ea:16:2d:c7:c2:50:41:c2:23:53:f6: 56:7f:40:0e:f6:99:c1:85:19:e4:bf:94:36:37:a2:ac: d1:2a:6f:0c:df:39:32:a6:92:7a:f5:07:38:4f:dc:b8: 64:03:b2:a9:f1:99:1f:89:c7:a9:1a:82:f9:84:07:86: 20:fe:31:75:dc:2e:61:65:0d:1c:f4:e2:cf:78:71:b3: 4c:e8:81:70:89:9d:8f:0d:28:7e:86:22:68:05:95:b3: 24:56:bf:a2:f1:c3:a5:8e:3c:90:98:c2:e9:12:b9:ae: f5:04:c2:9a:ec:63:22:95:66:b9:37:67:3f:a5:db:4f: 2f:1a:72:3b:e7:7e:b0:e9:9c:0b:94:d4:7e:66:41:97: 17:b9:4b:1c:f2:97:03:5a:59:b4:3b:af:a0:54:02:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:87:6d:d3:17:76:57:ee:51:bd:d5:9b:c8:db:8d:72: 20:dd:d8:d4:e0:86:85:21:7e:d7:bd:6c:1d:96:0c:1d: 3b:79:e7:d4:f1:1e:6b:e7:26:1c:46:db:cc:19:4a:06: e1:b7:20:56:ba:ff:bc:9a:10:81:32:fe:7b:5c:f5:14: a8:8b:75:6a:ab:ea:2d:6e:f2:2b:37:51:b9:02:7b:5a: 2e:30:2f:8e:0a:e8:d7:73:0d:54:b2:7e:03:b6:6d:9b: ab:82:ca:96:04:b1:9d:dc:29:0a:e2:1d:09:87:e4:75: b1:8f:b4:ac:29:09:11:62:11:df:cd:42:3a:45:8b:97: 2d:0f:75:c7:2f:31:ec:ed:9b:6b:64:9e:0d:51:3a:8e: 2a:f7:0e:9c:d7:ca:cc:11:f9:82:56:28:3d:60:bb:81: 1d:bc:10:ed:02:ce:98:c7:ea:e3:d9:08:36:d6:55:1d: ef:5b:5c:79:28:dc:0b:ed:1b:4c:a2:3f:31:04:ff:0f: 79:17:3d:fc:98:68:22:b9:bc:23:e4:a1:bd:cb:88:88: 6e:3f:e5:4f:24:24:04:55:fc:ee:2d:0a:9b:13:e0:44: 56:37:a3:a8:f9:d4:65:87:45:b7:89:d7:67:08:7e:18: 28:9c:0c:eb:22:6f:29:05:1c:86:5a:a9:38:72:be:46 Fingerprint (SHA-256): 93:60:F1:58:AD:0E:D1:FB:BB:66:1D:B5:ED:3A:4C:A1:87:8C:81:77:93:C5:F8:59:6A:E5:19:FF:D7:92:8B:1E Fingerprint (SHA1): 5C:CA:E2:D0:84:20:86:08:DF:56:57:17:B7:AC:B1:D3:A3:E1:40:0F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14785: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092831 (0x6715d9f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:08:05 2016 Not After : Fri Jan 08 15:08:05 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:07:ff:70:69:f0:62:9c:d4:4a:11:a3:4d:ba:fe:57: 3b:a2:73:3a:e2:59:56:a0:ba:bd:d3:f6:6d:4d:47:58: d9:ce:95:ef:fe:6e:7c:dd:74:8c:99:9a:fe:1b:e6:65: 7b:49:6b:a4:21:d5:e7:69:86:71:2f:3b:05:81:58:69: 9d:d2:d1:62:ee:dc:06:2a:2c:72:60:d6:08:12:b6:68: 1c:0d:ec:b5:7a:66:4d:25:62:7e:4f:08:50:d9:13:9d: df:dc:e5:89:0e:ea:16:2d:c7:c2:50:41:c2:23:53:f6: 56:7f:40:0e:f6:99:c1:85:19:e4:bf:94:36:37:a2:ac: d1:2a:6f:0c:df:39:32:a6:92:7a:f5:07:38:4f:dc:b8: 64:03:b2:a9:f1:99:1f:89:c7:a9:1a:82:f9:84:07:86: 20:fe:31:75:dc:2e:61:65:0d:1c:f4:e2:cf:78:71:b3: 4c:e8:81:70:89:9d:8f:0d:28:7e:86:22:68:05:95:b3: 24:56:bf:a2:f1:c3:a5:8e:3c:90:98:c2:e9:12:b9:ae: f5:04:c2:9a:ec:63:22:95:66:b9:37:67:3f:a5:db:4f: 2f:1a:72:3b:e7:7e:b0:e9:9c:0b:94:d4:7e:66:41:97: 17:b9:4b:1c:f2:97:03:5a:59:b4:3b:af:a0:54:02:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:87:6d:d3:17:76:57:ee:51:bd:d5:9b:c8:db:8d:72: 20:dd:d8:d4:e0:86:85:21:7e:d7:bd:6c:1d:96:0c:1d: 3b:79:e7:d4:f1:1e:6b:e7:26:1c:46:db:cc:19:4a:06: e1:b7:20:56:ba:ff:bc:9a:10:81:32:fe:7b:5c:f5:14: a8:8b:75:6a:ab:ea:2d:6e:f2:2b:37:51:b9:02:7b:5a: 2e:30:2f:8e:0a:e8:d7:73:0d:54:b2:7e:03:b6:6d:9b: ab:82:ca:96:04:b1:9d:dc:29:0a:e2:1d:09:87:e4:75: b1:8f:b4:ac:29:09:11:62:11:df:cd:42:3a:45:8b:97: 2d:0f:75:c7:2f:31:ec:ed:9b:6b:64:9e:0d:51:3a:8e: 2a:f7:0e:9c:d7:ca:cc:11:f9:82:56:28:3d:60:bb:81: 1d:bc:10:ed:02:ce:98:c7:ea:e3:d9:08:36:d6:55:1d: ef:5b:5c:79:28:dc:0b:ed:1b:4c:a2:3f:31:04:ff:0f: 79:17:3d:fc:98:68:22:b9:bc:23:e4:a1:bd:cb:88:88: 6e:3f:e5:4f:24:24:04:55:fc:ee:2d:0a:9b:13:e0:44: 56:37:a3:a8:f9:d4:65:87:45:b7:89:d7:67:08:7e:18: 28:9c:0c:eb:22:6f:29:05:1c:86:5a:a9:38:72:be:46 Fingerprint (SHA-256): 93:60:F1:58:AD:0E:D1:FB:BB:66:1D:B5:ED:3A:4C:A1:87:8C:81:77:93:C5:F8:59:6A:E5:19:FF:D7:92:8B:1E Fingerprint (SHA1): 5C:CA:E2:D0:84:20:86:08:DF:56:57:17:B7:AC:B1:D3:A3:E1:40:0F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14786: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092832 (0x6715da0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:08:14 2016 Not After : Fri Jan 08 15:08:14 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:f9:ab:3d:d1:fa:87:38:31:3c:73:7b:4e:a2:63:5e: c2:7f:dc:49:2a:66:07:5e:86:86:67:4a:49:39:a0:4d: 16:d1:f1:19:9a:99:e0:b0:ed:df:db:d9:fa:95:5b:70: 33:89:b8:c6:6a:75:3a:aa:4e:94:13:6d:11:c7:8b:c2: 65:92:cf:d6:56:6d:50:06:e5:72:30:ff:ee:19:00:40: 62:ee:35:5a:78:3d:5f:d2:d7:76:e0:78:cc:3d:1c:ef: 07:76:6d:13:88:a9:2c:41:7c:e2:cd:0e:8d:1f:65:54: ed:5d:2a:60:02:f3:ac:f5:fa:af:11:90:4a:71:4b:8d: 49:27:f4:9d:1c:ef:31:a7:96:2e:fc:ae:a2:d8:b2:a3: d5:48:0d:e0:61:8e:d8:3c:f7:96:a2:3d:c3:82:7a:6a: 2e:64:da:77:a9:97:d7:e0:e1:66:5d:f3:7a:66:15:9a: 18:21:74:2e:2d:ec:44:b1:6e:f8:04:ef:26:d0:bd:02: 2e:bd:51:86:a2:9b:c2:97:b5:0e:c4:b3:c3:41:02:7d: 0c:46:44:e9:d0:0e:1c:e7:67:23:1f:d4:14:d4:9b:a6: a1:45:b4:76:c4:f5:56:26:56:cb:c7:4c:ce:2b:3c:b1: 5b:c4:99:a3:91:b0:22:45:81:22:95:05:95:d2:1e:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:82:bb:b9:9a:ea:ef:6c:b3:23:9e:14:bb:36:35:b5: 71:bb:38:1f:72:a0:63:ea:90:65:15:32:8e:ee:8d:a3: 8f:e8:3a:4d:89:d5:36:b4:cb:b2:7e:88:62:3a:77:0f: d8:21:82:3f:80:f9:9d:4b:62:36:31:7f:59:64:3c:38: 01:3d:e5:81:80:a0:38:36:21:6a:72:9d:cb:6c:cc:50: 82:8e:54:be:e8:a1:5f:27:2a:cb:ec:a9:d2:62:be:21: 99:23:48:09:a1:4a:f1:e1:e9:43:68:fc:1a:eb:8d:51: 39:fd:b9:e9:cd:87:d6:cf:0e:76:00:0c:58:67:07:ba: b3:90:0f:56:ed:4e:49:31:13:0f:19:ba:22:61:d9:03: 02:b8:e9:71:1e:e4:1f:47:4f:f3:d4:e9:78:a0:69:00: 4f:1c:b6:a5:e5:4a:a8:1a:f0:ee:48:77:cd:a9:8d:97: 8a:93:52:69:d0:83:e5:57:4d:b2:4e:1c:f7:ee:56:50: a6:df:38:57:75:5e:78:f4:fc:44:45:36:dc:34:eb:79: 9b:27:96:61:2c:dc:85:dc:53:be:89:9f:f2:ad:32:a9: ab:22:69:76:a0:5d:61:23:87:31:08:09:df:99:15:e8: 77:b9:aa:13:c1:65:70:7e:ab:72:c5:90:ca:a4:bf:57 Fingerprint (SHA-256): 38:C2:11:C0:9D:47:38:AF:66:99:69:76:25:C7:88:FC:AE:55:B1:77:EE:F6:B1:22:79:12:2B:CB:07:86:11:69 Fingerprint (SHA1): 81:51:46:F2:E0:94:A5:31:74:97:31:97:C2:BC:E0:74:20:EA:52:7E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14787: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092832 (0x6715da0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:08:14 2016 Not After : Fri Jan 08 15:08:14 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:f9:ab:3d:d1:fa:87:38:31:3c:73:7b:4e:a2:63:5e: c2:7f:dc:49:2a:66:07:5e:86:86:67:4a:49:39:a0:4d: 16:d1:f1:19:9a:99:e0:b0:ed:df:db:d9:fa:95:5b:70: 33:89:b8:c6:6a:75:3a:aa:4e:94:13:6d:11:c7:8b:c2: 65:92:cf:d6:56:6d:50:06:e5:72:30:ff:ee:19:00:40: 62:ee:35:5a:78:3d:5f:d2:d7:76:e0:78:cc:3d:1c:ef: 07:76:6d:13:88:a9:2c:41:7c:e2:cd:0e:8d:1f:65:54: ed:5d:2a:60:02:f3:ac:f5:fa:af:11:90:4a:71:4b:8d: 49:27:f4:9d:1c:ef:31:a7:96:2e:fc:ae:a2:d8:b2:a3: d5:48:0d:e0:61:8e:d8:3c:f7:96:a2:3d:c3:82:7a:6a: 2e:64:da:77:a9:97:d7:e0:e1:66:5d:f3:7a:66:15:9a: 18:21:74:2e:2d:ec:44:b1:6e:f8:04:ef:26:d0:bd:02: 2e:bd:51:86:a2:9b:c2:97:b5:0e:c4:b3:c3:41:02:7d: 0c:46:44:e9:d0:0e:1c:e7:67:23:1f:d4:14:d4:9b:a6: a1:45:b4:76:c4:f5:56:26:56:cb:c7:4c:ce:2b:3c:b1: 5b:c4:99:a3:91:b0:22:45:81:22:95:05:95:d2:1e:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:82:bb:b9:9a:ea:ef:6c:b3:23:9e:14:bb:36:35:b5: 71:bb:38:1f:72:a0:63:ea:90:65:15:32:8e:ee:8d:a3: 8f:e8:3a:4d:89:d5:36:b4:cb:b2:7e:88:62:3a:77:0f: d8:21:82:3f:80:f9:9d:4b:62:36:31:7f:59:64:3c:38: 01:3d:e5:81:80:a0:38:36:21:6a:72:9d:cb:6c:cc:50: 82:8e:54:be:e8:a1:5f:27:2a:cb:ec:a9:d2:62:be:21: 99:23:48:09:a1:4a:f1:e1:e9:43:68:fc:1a:eb:8d:51: 39:fd:b9:e9:cd:87:d6:cf:0e:76:00:0c:58:67:07:ba: b3:90:0f:56:ed:4e:49:31:13:0f:19:ba:22:61:d9:03: 02:b8:e9:71:1e:e4:1f:47:4f:f3:d4:e9:78:a0:69:00: 4f:1c:b6:a5:e5:4a:a8:1a:f0:ee:48:77:cd:a9:8d:97: 8a:93:52:69:d0:83:e5:57:4d:b2:4e:1c:f7:ee:56:50: a6:df:38:57:75:5e:78:f4:fc:44:45:36:dc:34:eb:79: 9b:27:96:61:2c:dc:85:dc:53:be:89:9f:f2:ad:32:a9: ab:22:69:76:a0:5d:61:23:87:31:08:09:df:99:15:e8: 77:b9:aa:13:c1:65:70:7e:ab:72:c5:90:ca:a4:bf:57 Fingerprint (SHA-256): 38:C2:11:C0:9D:47:38:AF:66:99:69:76:25:C7:88:FC:AE:55:B1:77:EE:F6:B1:22:79:12:2B:CB:07:86:11:69 Fingerprint (SHA1): 81:51:46:F2:E0:94:A5:31:74:97:31:97:C2:BC:E0:74:20:EA:52:7E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14788: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092833 (0x6715da1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 15:08:20 2016 Not After : Fri Jan 08 15:08:20 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:bd:bf:08:23:0b:c2:a7:9e:6d:7e:48:a8:d9:4e:1c: 21:3b:26:01:0e:a0:28:36:10:ff:49:94:77:44:95:e5: 43:9a:f3:98:cd:0d:90:3f:1d:31:f6:e3:71:27:a6:04: 1e:78:98:2d:ab:51:ae:a1:c9:fe:46:cd:90:59:87:50: 00:d5:6d:9d:48:33:75:ef:f2:5b:a6:56:18:98:8e:df: 8b:73:91:cf:f7:6e:cf:ce:97:29:68:9e:8f:57:16:76: cb:1a:6c:1d:d3:79:fb:64:dd:22:84:4a:b5:8a:da:69: 68:15:c3:ed:ad:50:c0:ff:ab:45:5f:e6:87:62:20:8f: 72:a3:64:0c:cd:77:ab:d3:64:05:36:a3:47:a9:c6:4d: 22:d2:f3:35:60:b4:70:2a:a1:84:85:51:aa:2b:2b:e5: 43:85:cc:fb:eb:fe:3f:fc:d5:a7:bf:bb:59:3f:2e:5c: 80:18:48:2a:7c:f6:aa:f2:84:7c:41:00:d5:e0:28:61: 1f:28:b5:85:8d:5d:a3:e7:9f:50:5f:c7:be:18:ae:bc: ed:ea:f4:1f:4c:dd:11:a8:ea:74:5b:f4:7f:6e:f5:4c: bc:57:40:b5:40:12:ac:f0:24:8d:11:5f:37:4c:d7:49: 75:f2:66:5c:ea:ee:dc:21:9b:b5:0a:ab:cd:68:1d:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:28:f2:74:42:52:45:ab:79:c4:5c:db:1a:8a:35:8a: f0:fb:94:78:c3:45:01:25:8f:36:ac:47:17:6e:38:79: cd:fd:b8:2d:1b:2c:f7:59:a9:7f:99:e2:ef:24:5d:b4: 0f:be:f2:2d:a4:a7:34:53:f7:fc:6f:f3:5c:e0:9b:da: 85:2c:07:39:21:32:bd:3b:8c:ec:73:a0:47:18:36:9b: 76:c5:cf:b8:70:29:81:4c:d3:f9:cb:67:84:57:d9:7f: 07:11:bf:fe:00:7f:0f:35:94:3f:4c:49:7e:26:96:82: 52:08:33:b0:c1:24:58:5e:c1:72:da:3e:89:05:20:e5: 2d:5d:cd:ac:8d:dc:d1:45:9a:6e:e2:08:32:b1:e5:b7: 7b:ae:fc:5e:6c:db:0d:16:8c:42:90:16:82:67:b9:93: 13:92:b9:b8:a8:0e:c8:36:92:96:87:14:db:58:0b:86: 78:40:82:17:8d:e2:3c:35:d3:b7:88:13:0f:19:33:5d: a0:4d:e1:6e:f2:23:0c:c6:ba:f7:0c:06:6e:ca:3d:80: 07:f3:d7:d5:f0:b4:53:72:ae:15:47:19:79:6c:b4:87: 70:6c:1f:31:2c:38:e4:5d:8a:e5:72:b0:fe:26:68:bc: 7d:ba:37:94:c8:68:af:6e:00:17:93:9e:f9:47:15:9a Fingerprint (SHA-256): 33:28:57:77:CE:A5:74:4B:D9:AC:03:25:1A:00:53:D7:79:68:36:D8:3B:6C:46:F9:5A:99:84:EA:3E:F1:26:8F Fingerprint (SHA1): 07:66:CD:A0:D6:91:E7:09:1A:F7:E0:AF:30:F0:E7:85:F2:46:36:B8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #14789: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092833 (0x6715da1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 15:08:20 2016 Not After : Fri Jan 08 15:08:20 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:bd:bf:08:23:0b:c2:a7:9e:6d:7e:48:a8:d9:4e:1c: 21:3b:26:01:0e:a0:28:36:10:ff:49:94:77:44:95:e5: 43:9a:f3:98:cd:0d:90:3f:1d:31:f6:e3:71:27:a6:04: 1e:78:98:2d:ab:51:ae:a1:c9:fe:46:cd:90:59:87:50: 00:d5:6d:9d:48:33:75:ef:f2:5b:a6:56:18:98:8e:df: 8b:73:91:cf:f7:6e:cf:ce:97:29:68:9e:8f:57:16:76: cb:1a:6c:1d:d3:79:fb:64:dd:22:84:4a:b5:8a:da:69: 68:15:c3:ed:ad:50:c0:ff:ab:45:5f:e6:87:62:20:8f: 72:a3:64:0c:cd:77:ab:d3:64:05:36:a3:47:a9:c6:4d: 22:d2:f3:35:60:b4:70:2a:a1:84:85:51:aa:2b:2b:e5: 43:85:cc:fb:eb:fe:3f:fc:d5:a7:bf:bb:59:3f:2e:5c: 80:18:48:2a:7c:f6:aa:f2:84:7c:41:00:d5:e0:28:61: 1f:28:b5:85:8d:5d:a3:e7:9f:50:5f:c7:be:18:ae:bc: ed:ea:f4:1f:4c:dd:11:a8:ea:74:5b:f4:7f:6e:f5:4c: bc:57:40:b5:40:12:ac:f0:24:8d:11:5f:37:4c:d7:49: 75:f2:66:5c:ea:ee:dc:21:9b:b5:0a:ab:cd:68:1d:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:28:f2:74:42:52:45:ab:79:c4:5c:db:1a:8a:35:8a: f0:fb:94:78:c3:45:01:25:8f:36:ac:47:17:6e:38:79: cd:fd:b8:2d:1b:2c:f7:59:a9:7f:99:e2:ef:24:5d:b4: 0f:be:f2:2d:a4:a7:34:53:f7:fc:6f:f3:5c:e0:9b:da: 85:2c:07:39:21:32:bd:3b:8c:ec:73:a0:47:18:36:9b: 76:c5:cf:b8:70:29:81:4c:d3:f9:cb:67:84:57:d9:7f: 07:11:bf:fe:00:7f:0f:35:94:3f:4c:49:7e:26:96:82: 52:08:33:b0:c1:24:58:5e:c1:72:da:3e:89:05:20:e5: 2d:5d:cd:ac:8d:dc:d1:45:9a:6e:e2:08:32:b1:e5:b7: 7b:ae:fc:5e:6c:db:0d:16:8c:42:90:16:82:67:b9:93: 13:92:b9:b8:a8:0e:c8:36:92:96:87:14:db:58:0b:86: 78:40:82:17:8d:e2:3c:35:d3:b7:88:13:0f:19:33:5d: a0:4d:e1:6e:f2:23:0c:c6:ba:f7:0c:06:6e:ca:3d:80: 07:f3:d7:d5:f0:b4:53:72:ae:15:47:19:79:6c:b4:87: 70:6c:1f:31:2c:38:e4:5d:8a:e5:72:b0:fe:26:68:bc: 7d:ba:37:94:c8:68:af:6e:00:17:93:9e:f9:47:15:9a Fingerprint (SHA-256): 33:28:57:77:CE:A5:74:4B:D9:AC:03:25:1A:00:53:D7:79:68:36:D8:3B:6C:46:F9:5A:99:84:EA:3E:F1:26:8F Fingerprint (SHA1): 07:66:CD:A0:D6:91:E7:09:1A:F7:E0:AF:30:F0:E7:85:F2:46:36:B8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #14790: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #14791: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092836 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14792: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #14793: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14794: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14795: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108092837 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14796: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14797: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14798: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14799: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108092838 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14800: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14801: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #14802: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14803: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 108092839 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14804: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14805: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #14806: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14807: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108092840 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14808: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14809: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #14810: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14811: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108092841 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14812: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14813: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #14814: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14815: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 108092842 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14816: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14817: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14818: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #14819: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #14820: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14821: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #14822: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092836 (0x6715da4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:08:57 2016 Not After : Fri Jan 08 15:08:57 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:c9:b5:b6:c2:e1:9d:d1:ac:bc:a0:3d:ba:c4:c5:13: 15:a5:43:4d:92:eb:ff:63:aa:38:20:48:c1:ec:8f:d1: 04:50:db:91:0d:68:f6:5e:46:48:18:43:d9:26:ad:35: b2:c4:e0:01:20:b5:3a:d8:59:e7:e7:a3:a7:5e:2a:e6: 81:2c:d7:ec:78:19:13:96:49:c5:d5:be:7b:c3:99:88: aa:3c:eb:c1:78:9c:e2:af:e1:b7:fb:af:6d:93:eb:33: cb:8e:46:3d:6d:7a:87:52:ef:c8:3c:71:df:6a:76:00: af:d0:bb:47:a4:32:fb:78:e9:18:3e:04:d2:fe:29:35: 33:6f:72:1d:35:fb:55:9e:a5:fe:06:2a:a9:3e:5e:4a: ce:d9:77:60:dd:f2:0e:9f:e3:fd:3d:88:09:00:fc:d4: 66:51:9d:07:95:c6:a5:96:da:bb:17:7b:7a:b7:74:97: 67:8a:06:89:df:3c:72:48:6d:f0:84:e7:b1:d6:4c:3a: 12:5c:de:eb:2e:a8:88:3f:17:2f:fe:96:ff:df:24:d7: ca:f7:69:7d:e0:18:9b:39:a1:dd:52:65:1c:45:6d:7c: d4:6a:b7:8a:92:97:59:a0:00:81:ef:84:79:98:ef:77: 46:96:84:90:8f:04:89:35:41:c7:b6:45:cc:63:99:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:dd:6d:af:51:ab:57:4a:3e:31:40:3b:75:ef:f3:2a: f9:68:9d:2f:af:3d:35:df:67:6f:07:6f:22:9a:c0:6f: e8:a4:25:de:80:eb:90:db:de:ea:d0:ee:df:e4:8e:f1: a7:d4:9e:8f:64:cf:2c:91:a5:ec:ad:1c:f3:c5:18:72: 3c:c0:b4:7f:e0:7c:4d:9a:21:52:9b:cd:43:d5:dc:80: 99:c4:1a:d7:87:01:d0:1b:0b:ac:45:5e:5b:6e:78:34: 4b:52:df:3e:ea:25:ba:52:24:9b:fc:fb:fb:10:b7:7d: 13:38:31:4e:50:84:45:bb:41:6e:7d:89:8b:6c:de:e8: 8b:ca:bd:c5:83:be:c1:8c:1a:9e:a0:78:81:f3:79:aa: 5b:26:c8:75:11:91:5e:41:b1:f6:84:21:43:74:5f:fe: 2b:05:7d:c7:09:1c:09:64:d1:78:ef:0d:54:78:74:04: 5f:50:b5:74:14:e6:7b:7d:f6:73:54:84:0c:c7:4f:a8: 89:b5:b7:1e:f6:93:92:b8:c0:3e:30:df:60:aa:f3:9d: 10:ca:67:b7:ef:68:5d:44:1b:f0:ff:a2:d6:60:24:f9: de:43:92:59:5d:7d:5c:b1:4c:bb:84:fe:d9:c1:65:a5: 88:9a:0b:21:a3:aa:f9:98:55:d9:44:c1:d4:53:a7:49 Fingerprint (SHA-256): 73:70:13:91:07:60:B2:2B:C2:49:20:0E:77:18:64:D2:05:56:12:6E:30:37:C6:B5:9C:64:F5:96:2E:A8:A4:19 Fingerprint (SHA1): 58:8D:99:6B:2F:00:A3:C6:CD:F8:D3:5D:14:F9:06:BC:04:6A:42:F4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14823: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14824: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14825: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14826: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092836 (0x6715da4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:08:57 2016 Not After : Fri Jan 08 15:08:57 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:c9:b5:b6:c2:e1:9d:d1:ac:bc:a0:3d:ba:c4:c5:13: 15:a5:43:4d:92:eb:ff:63:aa:38:20:48:c1:ec:8f:d1: 04:50:db:91:0d:68:f6:5e:46:48:18:43:d9:26:ad:35: b2:c4:e0:01:20:b5:3a:d8:59:e7:e7:a3:a7:5e:2a:e6: 81:2c:d7:ec:78:19:13:96:49:c5:d5:be:7b:c3:99:88: aa:3c:eb:c1:78:9c:e2:af:e1:b7:fb:af:6d:93:eb:33: cb:8e:46:3d:6d:7a:87:52:ef:c8:3c:71:df:6a:76:00: af:d0:bb:47:a4:32:fb:78:e9:18:3e:04:d2:fe:29:35: 33:6f:72:1d:35:fb:55:9e:a5:fe:06:2a:a9:3e:5e:4a: ce:d9:77:60:dd:f2:0e:9f:e3:fd:3d:88:09:00:fc:d4: 66:51:9d:07:95:c6:a5:96:da:bb:17:7b:7a:b7:74:97: 67:8a:06:89:df:3c:72:48:6d:f0:84:e7:b1:d6:4c:3a: 12:5c:de:eb:2e:a8:88:3f:17:2f:fe:96:ff:df:24:d7: ca:f7:69:7d:e0:18:9b:39:a1:dd:52:65:1c:45:6d:7c: d4:6a:b7:8a:92:97:59:a0:00:81:ef:84:79:98:ef:77: 46:96:84:90:8f:04:89:35:41:c7:b6:45:cc:63:99:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:dd:6d:af:51:ab:57:4a:3e:31:40:3b:75:ef:f3:2a: f9:68:9d:2f:af:3d:35:df:67:6f:07:6f:22:9a:c0:6f: e8:a4:25:de:80:eb:90:db:de:ea:d0:ee:df:e4:8e:f1: a7:d4:9e:8f:64:cf:2c:91:a5:ec:ad:1c:f3:c5:18:72: 3c:c0:b4:7f:e0:7c:4d:9a:21:52:9b:cd:43:d5:dc:80: 99:c4:1a:d7:87:01:d0:1b:0b:ac:45:5e:5b:6e:78:34: 4b:52:df:3e:ea:25:ba:52:24:9b:fc:fb:fb:10:b7:7d: 13:38:31:4e:50:84:45:bb:41:6e:7d:89:8b:6c:de:e8: 8b:ca:bd:c5:83:be:c1:8c:1a:9e:a0:78:81:f3:79:aa: 5b:26:c8:75:11:91:5e:41:b1:f6:84:21:43:74:5f:fe: 2b:05:7d:c7:09:1c:09:64:d1:78:ef:0d:54:78:74:04: 5f:50:b5:74:14:e6:7b:7d:f6:73:54:84:0c:c7:4f:a8: 89:b5:b7:1e:f6:93:92:b8:c0:3e:30:df:60:aa:f3:9d: 10:ca:67:b7:ef:68:5d:44:1b:f0:ff:a2:d6:60:24:f9: de:43:92:59:5d:7d:5c:b1:4c:bb:84:fe:d9:c1:65:a5: 88:9a:0b:21:a3:aa:f9:98:55:d9:44:c1:d4:53:a7:49 Fingerprint (SHA-256): 73:70:13:91:07:60:B2:2B:C2:49:20:0E:77:18:64:D2:05:56:12:6E:30:37:C6:B5:9C:64:F5:96:2E:A8:A4:19 Fingerprint (SHA1): 58:8D:99:6B:2F:00:A3:C6:CD:F8:D3:5D:14:F9:06:BC:04:6A:42:F4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14827: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14828: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #14829: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092843 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14830: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #14831: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14832: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14833: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108092844 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14834: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14835: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #14836: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14837: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 108092845 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14838: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14839: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #14840: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14841: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 108092846 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14842: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14843: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14844: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14845: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 108092847 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14846: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14847: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #14848: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14849: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 108092848 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14850: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14851: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #14852: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14853: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 108092849 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14854: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14855: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14856: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14857: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 108092850 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14858: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14859: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #14860: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14861: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 108092851 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14862: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14863: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #14864: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14865: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 108092852 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14866: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14867: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #14868: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14869: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 108092853 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14870: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14871: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #14872: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14873: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 108092854 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14874: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14875: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #14876: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14877: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 108092855 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14878: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14879: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #14880: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14881: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 108092856 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14882: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14883: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #14884: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14885: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 108092857 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14886: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14887: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #14888: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14889: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 108092858 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14890: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14891: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #14892: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14893: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 108092859 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14894: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14895: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #14896: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14897: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 108092860 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14898: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14899: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #14900: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14901: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 108092861 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14902: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14903: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #14904: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14905: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 108092862 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14906: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14907: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #14908: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14909: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 108092863 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14910: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14911: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #14912: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14913: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 108092864 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14914: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14915: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #14916: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14917: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 108092865 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14918: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14919: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #14920: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14921: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 108092866 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14922: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14923: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #14924: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14925: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 108092867 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14926: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14927: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #14928: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14929: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 108092868 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14930: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14931: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #14932: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14933: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 108092869 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14934: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14935: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #14936: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14937: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 108092870 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14938: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14939: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #14940: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14941: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 108092871 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14942: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14943: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #14944: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14945: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 108092872 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14946: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14947: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14948: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092843 (0x6715dab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:11:12 2016 Not After : Fri Jan 08 15:11:12 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:6b:da:ec:ea:76:af:2a:e8:15:50:5b:b4:1e:0e:8a: ef:45:68:5c:cd:6f:f9:61:84:2f:a5:df:39:e2:ad:3a: 7e:8a:4b:73:b4:aa:68:5e:d3:bd:07:5f:d0:50:5f:d3: 1b:2b:3e:c1:7d:62:d4:0c:bb:7a:eb:6e:1a:39:86:df: ff:d3:dd:43:b3:11:6c:93:99:a3:59:0e:ec:af:3d:8d: aa:e8:a5:97:c8:cf:96:df:92:cb:88:45:b4:cd:61:07: 68:fe:2f:33:86:52:90:03:c0:6f:88:60:a7:70:48:d3: 12:2a:c9:0d:b9:2b:b5:7b:7c:58:a0:61:6e:8d:ff:eb: 40:b0:9b:72:a0:04:2d:03:74:0a:89:f5:ba:6c:27:2c: 04:65:44:25:a6:76:35:08:3c:b5:3e:22:4e:85:fd:7a: e1:3e:56:aa:3c:ca:52:0d:0f:ac:cd:fa:b2:80:aa:f8: 02:14:47:4a:2d:6f:39:12:9b:1b:96:9b:79:38:07:a4: 49:83:b1:67:53:19:14:b5:01:f1:f6:76:04:4f:c9:2a: 6e:d2:58:f7:08:0d:c6:f3:2b:92:1a:3c:7c:3a:2c:7e: aa:3e:74:55:bc:73:64:41:63:7f:1f:6f:3c:c6:c7:2f: 44:aa:66:45:b4:9c:ae:61:37:17:3d:c4:14:36:30:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:cf:60:6c:99:c8:86:3a:57:32:96:7a:b9:fc:80:05: a3:9f:f0:c4:33:94:33:73:93:ef:8f:1c:ef:ff:ed:8b: 63:db:f1:d8:d3:b9:4a:6e:7d:fc:3e:e1:86:ef:09:22: 8c:1b:25:11:39:6d:48:e0:e0:0a:66:87:d8:05:0d:78: 74:83:62:a0:77:ee:f7:22:bb:df:e9:88:d4:ea:14:5a: f8:97:2e:f1:e5:b8:d0:1e:92:41:7b:e4:ad:01:8c:b0: e4:ad:e3:71:04:3b:68:b2:ef:11:30:23:c8:68:9a:28: fb:7a:05:58:14:18:50:89:97:b8:02:0a:11:e1:d0:17: 0a:40:33:24:09:42:6a:54:ff:c5:66:a7:c0:28:c4:89: c7:cf:8f:52:15:40:17:88:b4:f7:9b:bd:92:fd:04:72: 59:3e:ef:0e:be:cc:4c:d1:d7:10:dd:64:d6:20:59:e2: 78:de:18:e2:81:3e:c6:7a:c1:5d:fb:20:5c:49:30:db: 78:e3:2d:c3:e3:eb:fd:e2:2d:41:7f:10:2b:0e:96:a6: e5:05:00:60:e6:f9:b4:07:34:2d:41:5a:68:6d:b1:16: 00:1e:f9:b9:64:7a:7e:ef:af:21:cc:e9:6b:da:4b:e4: 6c:63:c5:3e:ca:43:6c:ed:5c:ea:e3:7c:dc:88:68:ee Fingerprint (SHA-256): A4:94:1D:55:F9:5C:A8:25:0E:29:EC:86:4F:3B:49:63:0C:C5:AB:4F:14:DC:57:5E:52:59:A5:32:0F:52:1B:D7 Fingerprint (SHA1): 1C:8A:A3:61:95:65:08:19:09:25:19:4C:89:78:4B:53:DB:08:85:EF Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14949: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14950: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092843 (0x6715dab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:11:12 2016 Not After : Fri Jan 08 15:11:12 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:6b:da:ec:ea:76:af:2a:e8:15:50:5b:b4:1e:0e:8a: ef:45:68:5c:cd:6f:f9:61:84:2f:a5:df:39:e2:ad:3a: 7e:8a:4b:73:b4:aa:68:5e:d3:bd:07:5f:d0:50:5f:d3: 1b:2b:3e:c1:7d:62:d4:0c:bb:7a:eb:6e:1a:39:86:df: ff:d3:dd:43:b3:11:6c:93:99:a3:59:0e:ec:af:3d:8d: aa:e8:a5:97:c8:cf:96:df:92:cb:88:45:b4:cd:61:07: 68:fe:2f:33:86:52:90:03:c0:6f:88:60:a7:70:48:d3: 12:2a:c9:0d:b9:2b:b5:7b:7c:58:a0:61:6e:8d:ff:eb: 40:b0:9b:72:a0:04:2d:03:74:0a:89:f5:ba:6c:27:2c: 04:65:44:25:a6:76:35:08:3c:b5:3e:22:4e:85:fd:7a: e1:3e:56:aa:3c:ca:52:0d:0f:ac:cd:fa:b2:80:aa:f8: 02:14:47:4a:2d:6f:39:12:9b:1b:96:9b:79:38:07:a4: 49:83:b1:67:53:19:14:b5:01:f1:f6:76:04:4f:c9:2a: 6e:d2:58:f7:08:0d:c6:f3:2b:92:1a:3c:7c:3a:2c:7e: aa:3e:74:55:bc:73:64:41:63:7f:1f:6f:3c:c6:c7:2f: 44:aa:66:45:b4:9c:ae:61:37:17:3d:c4:14:36:30:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:cf:60:6c:99:c8:86:3a:57:32:96:7a:b9:fc:80:05: a3:9f:f0:c4:33:94:33:73:93:ef:8f:1c:ef:ff:ed:8b: 63:db:f1:d8:d3:b9:4a:6e:7d:fc:3e:e1:86:ef:09:22: 8c:1b:25:11:39:6d:48:e0:e0:0a:66:87:d8:05:0d:78: 74:83:62:a0:77:ee:f7:22:bb:df:e9:88:d4:ea:14:5a: f8:97:2e:f1:e5:b8:d0:1e:92:41:7b:e4:ad:01:8c:b0: e4:ad:e3:71:04:3b:68:b2:ef:11:30:23:c8:68:9a:28: fb:7a:05:58:14:18:50:89:97:b8:02:0a:11:e1:d0:17: 0a:40:33:24:09:42:6a:54:ff:c5:66:a7:c0:28:c4:89: c7:cf:8f:52:15:40:17:88:b4:f7:9b:bd:92:fd:04:72: 59:3e:ef:0e:be:cc:4c:d1:d7:10:dd:64:d6:20:59:e2: 78:de:18:e2:81:3e:c6:7a:c1:5d:fb:20:5c:49:30:db: 78:e3:2d:c3:e3:eb:fd:e2:2d:41:7f:10:2b:0e:96:a6: e5:05:00:60:e6:f9:b4:07:34:2d:41:5a:68:6d:b1:16: 00:1e:f9:b9:64:7a:7e:ef:af:21:cc:e9:6b:da:4b:e4: 6c:63:c5:3e:ca:43:6c:ed:5c:ea:e3:7c:dc:88:68:ee Fingerprint (SHA-256): A4:94:1D:55:F9:5C:A8:25:0E:29:EC:86:4F:3B:49:63:0C:C5:AB:4F:14:DC:57:5E:52:59:A5:32:0F:52:1B:D7 Fingerprint (SHA1): 1C:8A:A3:61:95:65:08:19:09:25:19:4C:89:78:4B:53:DB:08:85:EF Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14951: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14952: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14953: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14954: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092843 (0x6715dab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:11:12 2016 Not After : Fri Jan 08 15:11:12 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:6b:da:ec:ea:76:af:2a:e8:15:50:5b:b4:1e:0e:8a: ef:45:68:5c:cd:6f:f9:61:84:2f:a5:df:39:e2:ad:3a: 7e:8a:4b:73:b4:aa:68:5e:d3:bd:07:5f:d0:50:5f:d3: 1b:2b:3e:c1:7d:62:d4:0c:bb:7a:eb:6e:1a:39:86:df: ff:d3:dd:43:b3:11:6c:93:99:a3:59:0e:ec:af:3d:8d: aa:e8:a5:97:c8:cf:96:df:92:cb:88:45:b4:cd:61:07: 68:fe:2f:33:86:52:90:03:c0:6f:88:60:a7:70:48:d3: 12:2a:c9:0d:b9:2b:b5:7b:7c:58:a0:61:6e:8d:ff:eb: 40:b0:9b:72:a0:04:2d:03:74:0a:89:f5:ba:6c:27:2c: 04:65:44:25:a6:76:35:08:3c:b5:3e:22:4e:85:fd:7a: e1:3e:56:aa:3c:ca:52:0d:0f:ac:cd:fa:b2:80:aa:f8: 02:14:47:4a:2d:6f:39:12:9b:1b:96:9b:79:38:07:a4: 49:83:b1:67:53:19:14:b5:01:f1:f6:76:04:4f:c9:2a: 6e:d2:58:f7:08:0d:c6:f3:2b:92:1a:3c:7c:3a:2c:7e: aa:3e:74:55:bc:73:64:41:63:7f:1f:6f:3c:c6:c7:2f: 44:aa:66:45:b4:9c:ae:61:37:17:3d:c4:14:36:30:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:cf:60:6c:99:c8:86:3a:57:32:96:7a:b9:fc:80:05: a3:9f:f0:c4:33:94:33:73:93:ef:8f:1c:ef:ff:ed:8b: 63:db:f1:d8:d3:b9:4a:6e:7d:fc:3e:e1:86:ef:09:22: 8c:1b:25:11:39:6d:48:e0:e0:0a:66:87:d8:05:0d:78: 74:83:62:a0:77:ee:f7:22:bb:df:e9:88:d4:ea:14:5a: f8:97:2e:f1:e5:b8:d0:1e:92:41:7b:e4:ad:01:8c:b0: e4:ad:e3:71:04:3b:68:b2:ef:11:30:23:c8:68:9a:28: fb:7a:05:58:14:18:50:89:97:b8:02:0a:11:e1:d0:17: 0a:40:33:24:09:42:6a:54:ff:c5:66:a7:c0:28:c4:89: c7:cf:8f:52:15:40:17:88:b4:f7:9b:bd:92:fd:04:72: 59:3e:ef:0e:be:cc:4c:d1:d7:10:dd:64:d6:20:59:e2: 78:de:18:e2:81:3e:c6:7a:c1:5d:fb:20:5c:49:30:db: 78:e3:2d:c3:e3:eb:fd:e2:2d:41:7f:10:2b:0e:96:a6: e5:05:00:60:e6:f9:b4:07:34:2d:41:5a:68:6d:b1:16: 00:1e:f9:b9:64:7a:7e:ef:af:21:cc:e9:6b:da:4b:e4: 6c:63:c5:3e:ca:43:6c:ed:5c:ea:e3:7c:dc:88:68:ee Fingerprint (SHA-256): A4:94:1D:55:F9:5C:A8:25:0E:29:EC:86:4F:3B:49:63:0C:C5:AB:4F:14:DC:57:5E:52:59:A5:32:0F:52:1B:D7 Fingerprint (SHA1): 1C:8A:A3:61:95:65:08:19:09:25:19:4C:89:78:4B:53:DB:08:85:EF Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14955: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14956: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14957: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14958: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092843 (0x6715dab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:11:12 2016 Not After : Fri Jan 08 15:11:12 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:6b:da:ec:ea:76:af:2a:e8:15:50:5b:b4:1e:0e:8a: ef:45:68:5c:cd:6f:f9:61:84:2f:a5:df:39:e2:ad:3a: 7e:8a:4b:73:b4:aa:68:5e:d3:bd:07:5f:d0:50:5f:d3: 1b:2b:3e:c1:7d:62:d4:0c:bb:7a:eb:6e:1a:39:86:df: ff:d3:dd:43:b3:11:6c:93:99:a3:59:0e:ec:af:3d:8d: aa:e8:a5:97:c8:cf:96:df:92:cb:88:45:b4:cd:61:07: 68:fe:2f:33:86:52:90:03:c0:6f:88:60:a7:70:48:d3: 12:2a:c9:0d:b9:2b:b5:7b:7c:58:a0:61:6e:8d:ff:eb: 40:b0:9b:72:a0:04:2d:03:74:0a:89:f5:ba:6c:27:2c: 04:65:44:25:a6:76:35:08:3c:b5:3e:22:4e:85:fd:7a: e1:3e:56:aa:3c:ca:52:0d:0f:ac:cd:fa:b2:80:aa:f8: 02:14:47:4a:2d:6f:39:12:9b:1b:96:9b:79:38:07:a4: 49:83:b1:67:53:19:14:b5:01:f1:f6:76:04:4f:c9:2a: 6e:d2:58:f7:08:0d:c6:f3:2b:92:1a:3c:7c:3a:2c:7e: aa:3e:74:55:bc:73:64:41:63:7f:1f:6f:3c:c6:c7:2f: 44:aa:66:45:b4:9c:ae:61:37:17:3d:c4:14:36:30:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:cf:60:6c:99:c8:86:3a:57:32:96:7a:b9:fc:80:05: a3:9f:f0:c4:33:94:33:73:93:ef:8f:1c:ef:ff:ed:8b: 63:db:f1:d8:d3:b9:4a:6e:7d:fc:3e:e1:86:ef:09:22: 8c:1b:25:11:39:6d:48:e0:e0:0a:66:87:d8:05:0d:78: 74:83:62:a0:77:ee:f7:22:bb:df:e9:88:d4:ea:14:5a: f8:97:2e:f1:e5:b8:d0:1e:92:41:7b:e4:ad:01:8c:b0: e4:ad:e3:71:04:3b:68:b2:ef:11:30:23:c8:68:9a:28: fb:7a:05:58:14:18:50:89:97:b8:02:0a:11:e1:d0:17: 0a:40:33:24:09:42:6a:54:ff:c5:66:a7:c0:28:c4:89: c7:cf:8f:52:15:40:17:88:b4:f7:9b:bd:92:fd:04:72: 59:3e:ef:0e:be:cc:4c:d1:d7:10:dd:64:d6:20:59:e2: 78:de:18:e2:81:3e:c6:7a:c1:5d:fb:20:5c:49:30:db: 78:e3:2d:c3:e3:eb:fd:e2:2d:41:7f:10:2b:0e:96:a6: e5:05:00:60:e6:f9:b4:07:34:2d:41:5a:68:6d:b1:16: 00:1e:f9:b9:64:7a:7e:ef:af:21:cc:e9:6b:da:4b:e4: 6c:63:c5:3e:ca:43:6c:ed:5c:ea:e3:7c:dc:88:68:ee Fingerprint (SHA-256): A4:94:1D:55:F9:5C:A8:25:0E:29:EC:86:4F:3B:49:63:0C:C5:AB:4F:14:DC:57:5E:52:59:A5:32:0F:52:1B:D7 Fingerprint (SHA1): 1C:8A:A3:61:95:65:08:19:09:25:19:4C:89:78:4B:53:DB:08:85:EF Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14959: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092843 (0x6715dab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:11:12 2016 Not After : Fri Jan 08 15:11:12 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:6b:da:ec:ea:76:af:2a:e8:15:50:5b:b4:1e:0e:8a: ef:45:68:5c:cd:6f:f9:61:84:2f:a5:df:39:e2:ad:3a: 7e:8a:4b:73:b4:aa:68:5e:d3:bd:07:5f:d0:50:5f:d3: 1b:2b:3e:c1:7d:62:d4:0c:bb:7a:eb:6e:1a:39:86:df: ff:d3:dd:43:b3:11:6c:93:99:a3:59:0e:ec:af:3d:8d: aa:e8:a5:97:c8:cf:96:df:92:cb:88:45:b4:cd:61:07: 68:fe:2f:33:86:52:90:03:c0:6f:88:60:a7:70:48:d3: 12:2a:c9:0d:b9:2b:b5:7b:7c:58:a0:61:6e:8d:ff:eb: 40:b0:9b:72:a0:04:2d:03:74:0a:89:f5:ba:6c:27:2c: 04:65:44:25:a6:76:35:08:3c:b5:3e:22:4e:85:fd:7a: e1:3e:56:aa:3c:ca:52:0d:0f:ac:cd:fa:b2:80:aa:f8: 02:14:47:4a:2d:6f:39:12:9b:1b:96:9b:79:38:07:a4: 49:83:b1:67:53:19:14:b5:01:f1:f6:76:04:4f:c9:2a: 6e:d2:58:f7:08:0d:c6:f3:2b:92:1a:3c:7c:3a:2c:7e: aa:3e:74:55:bc:73:64:41:63:7f:1f:6f:3c:c6:c7:2f: 44:aa:66:45:b4:9c:ae:61:37:17:3d:c4:14:36:30:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:cf:60:6c:99:c8:86:3a:57:32:96:7a:b9:fc:80:05: a3:9f:f0:c4:33:94:33:73:93:ef:8f:1c:ef:ff:ed:8b: 63:db:f1:d8:d3:b9:4a:6e:7d:fc:3e:e1:86:ef:09:22: 8c:1b:25:11:39:6d:48:e0:e0:0a:66:87:d8:05:0d:78: 74:83:62:a0:77:ee:f7:22:bb:df:e9:88:d4:ea:14:5a: f8:97:2e:f1:e5:b8:d0:1e:92:41:7b:e4:ad:01:8c:b0: e4:ad:e3:71:04:3b:68:b2:ef:11:30:23:c8:68:9a:28: fb:7a:05:58:14:18:50:89:97:b8:02:0a:11:e1:d0:17: 0a:40:33:24:09:42:6a:54:ff:c5:66:a7:c0:28:c4:89: c7:cf:8f:52:15:40:17:88:b4:f7:9b:bd:92:fd:04:72: 59:3e:ef:0e:be:cc:4c:d1:d7:10:dd:64:d6:20:59:e2: 78:de:18:e2:81:3e:c6:7a:c1:5d:fb:20:5c:49:30:db: 78:e3:2d:c3:e3:eb:fd:e2:2d:41:7f:10:2b:0e:96:a6: e5:05:00:60:e6:f9:b4:07:34:2d:41:5a:68:6d:b1:16: 00:1e:f9:b9:64:7a:7e:ef:af:21:cc:e9:6b:da:4b:e4: 6c:63:c5:3e:ca:43:6c:ed:5c:ea:e3:7c:dc:88:68:ee Fingerprint (SHA-256): A4:94:1D:55:F9:5C:A8:25:0E:29:EC:86:4F:3B:49:63:0C:C5:AB:4F:14:DC:57:5E:52:59:A5:32:0F:52:1B:D7 Fingerprint (SHA1): 1C:8A:A3:61:95:65:08:19:09:25:19:4C:89:78:4B:53:DB:08:85:EF Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14960: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14961: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092843 (0x6715dab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:11:12 2016 Not After : Fri Jan 08 15:11:12 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:6b:da:ec:ea:76:af:2a:e8:15:50:5b:b4:1e:0e:8a: ef:45:68:5c:cd:6f:f9:61:84:2f:a5:df:39:e2:ad:3a: 7e:8a:4b:73:b4:aa:68:5e:d3:bd:07:5f:d0:50:5f:d3: 1b:2b:3e:c1:7d:62:d4:0c:bb:7a:eb:6e:1a:39:86:df: ff:d3:dd:43:b3:11:6c:93:99:a3:59:0e:ec:af:3d:8d: aa:e8:a5:97:c8:cf:96:df:92:cb:88:45:b4:cd:61:07: 68:fe:2f:33:86:52:90:03:c0:6f:88:60:a7:70:48:d3: 12:2a:c9:0d:b9:2b:b5:7b:7c:58:a0:61:6e:8d:ff:eb: 40:b0:9b:72:a0:04:2d:03:74:0a:89:f5:ba:6c:27:2c: 04:65:44:25:a6:76:35:08:3c:b5:3e:22:4e:85:fd:7a: e1:3e:56:aa:3c:ca:52:0d:0f:ac:cd:fa:b2:80:aa:f8: 02:14:47:4a:2d:6f:39:12:9b:1b:96:9b:79:38:07:a4: 49:83:b1:67:53:19:14:b5:01:f1:f6:76:04:4f:c9:2a: 6e:d2:58:f7:08:0d:c6:f3:2b:92:1a:3c:7c:3a:2c:7e: aa:3e:74:55:bc:73:64:41:63:7f:1f:6f:3c:c6:c7:2f: 44:aa:66:45:b4:9c:ae:61:37:17:3d:c4:14:36:30:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:cf:60:6c:99:c8:86:3a:57:32:96:7a:b9:fc:80:05: a3:9f:f0:c4:33:94:33:73:93:ef:8f:1c:ef:ff:ed:8b: 63:db:f1:d8:d3:b9:4a:6e:7d:fc:3e:e1:86:ef:09:22: 8c:1b:25:11:39:6d:48:e0:e0:0a:66:87:d8:05:0d:78: 74:83:62:a0:77:ee:f7:22:bb:df:e9:88:d4:ea:14:5a: f8:97:2e:f1:e5:b8:d0:1e:92:41:7b:e4:ad:01:8c:b0: e4:ad:e3:71:04:3b:68:b2:ef:11:30:23:c8:68:9a:28: fb:7a:05:58:14:18:50:89:97:b8:02:0a:11:e1:d0:17: 0a:40:33:24:09:42:6a:54:ff:c5:66:a7:c0:28:c4:89: c7:cf:8f:52:15:40:17:88:b4:f7:9b:bd:92:fd:04:72: 59:3e:ef:0e:be:cc:4c:d1:d7:10:dd:64:d6:20:59:e2: 78:de:18:e2:81:3e:c6:7a:c1:5d:fb:20:5c:49:30:db: 78:e3:2d:c3:e3:eb:fd:e2:2d:41:7f:10:2b:0e:96:a6: e5:05:00:60:e6:f9:b4:07:34:2d:41:5a:68:6d:b1:16: 00:1e:f9:b9:64:7a:7e:ef:af:21:cc:e9:6b:da:4b:e4: 6c:63:c5:3e:ca:43:6c:ed:5c:ea:e3:7c:dc:88:68:ee Fingerprint (SHA-256): A4:94:1D:55:F9:5C:A8:25:0E:29:EC:86:4F:3B:49:63:0C:C5:AB:4F:14:DC:57:5E:52:59:A5:32:0F:52:1B:D7 Fingerprint (SHA1): 1C:8A:A3:61:95:65:08:19:09:25:19:4C:89:78:4B:53:DB:08:85:EF Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14962: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14963: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14964: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14965: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092843 (0x6715dab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:11:12 2016 Not After : Fri Jan 08 15:11:12 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:6b:da:ec:ea:76:af:2a:e8:15:50:5b:b4:1e:0e:8a: ef:45:68:5c:cd:6f:f9:61:84:2f:a5:df:39:e2:ad:3a: 7e:8a:4b:73:b4:aa:68:5e:d3:bd:07:5f:d0:50:5f:d3: 1b:2b:3e:c1:7d:62:d4:0c:bb:7a:eb:6e:1a:39:86:df: ff:d3:dd:43:b3:11:6c:93:99:a3:59:0e:ec:af:3d:8d: aa:e8:a5:97:c8:cf:96:df:92:cb:88:45:b4:cd:61:07: 68:fe:2f:33:86:52:90:03:c0:6f:88:60:a7:70:48:d3: 12:2a:c9:0d:b9:2b:b5:7b:7c:58:a0:61:6e:8d:ff:eb: 40:b0:9b:72:a0:04:2d:03:74:0a:89:f5:ba:6c:27:2c: 04:65:44:25:a6:76:35:08:3c:b5:3e:22:4e:85:fd:7a: e1:3e:56:aa:3c:ca:52:0d:0f:ac:cd:fa:b2:80:aa:f8: 02:14:47:4a:2d:6f:39:12:9b:1b:96:9b:79:38:07:a4: 49:83:b1:67:53:19:14:b5:01:f1:f6:76:04:4f:c9:2a: 6e:d2:58:f7:08:0d:c6:f3:2b:92:1a:3c:7c:3a:2c:7e: aa:3e:74:55:bc:73:64:41:63:7f:1f:6f:3c:c6:c7:2f: 44:aa:66:45:b4:9c:ae:61:37:17:3d:c4:14:36:30:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:cf:60:6c:99:c8:86:3a:57:32:96:7a:b9:fc:80:05: a3:9f:f0:c4:33:94:33:73:93:ef:8f:1c:ef:ff:ed:8b: 63:db:f1:d8:d3:b9:4a:6e:7d:fc:3e:e1:86:ef:09:22: 8c:1b:25:11:39:6d:48:e0:e0:0a:66:87:d8:05:0d:78: 74:83:62:a0:77:ee:f7:22:bb:df:e9:88:d4:ea:14:5a: f8:97:2e:f1:e5:b8:d0:1e:92:41:7b:e4:ad:01:8c:b0: e4:ad:e3:71:04:3b:68:b2:ef:11:30:23:c8:68:9a:28: fb:7a:05:58:14:18:50:89:97:b8:02:0a:11:e1:d0:17: 0a:40:33:24:09:42:6a:54:ff:c5:66:a7:c0:28:c4:89: c7:cf:8f:52:15:40:17:88:b4:f7:9b:bd:92:fd:04:72: 59:3e:ef:0e:be:cc:4c:d1:d7:10:dd:64:d6:20:59:e2: 78:de:18:e2:81:3e:c6:7a:c1:5d:fb:20:5c:49:30:db: 78:e3:2d:c3:e3:eb:fd:e2:2d:41:7f:10:2b:0e:96:a6: e5:05:00:60:e6:f9:b4:07:34:2d:41:5a:68:6d:b1:16: 00:1e:f9:b9:64:7a:7e:ef:af:21:cc:e9:6b:da:4b:e4: 6c:63:c5:3e:ca:43:6c:ed:5c:ea:e3:7c:dc:88:68:ee Fingerprint (SHA-256): A4:94:1D:55:F9:5C:A8:25:0E:29:EC:86:4F:3B:49:63:0C:C5:AB:4F:14:DC:57:5E:52:59:A5:32:0F:52:1B:D7 Fingerprint (SHA1): 1C:8A:A3:61:95:65:08:19:09:25:19:4C:89:78:4B:53:DB:08:85:EF Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14966: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092843 (0x6715dab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:11:12 2016 Not After : Fri Jan 08 15:11:12 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:6b:da:ec:ea:76:af:2a:e8:15:50:5b:b4:1e:0e:8a: ef:45:68:5c:cd:6f:f9:61:84:2f:a5:df:39:e2:ad:3a: 7e:8a:4b:73:b4:aa:68:5e:d3:bd:07:5f:d0:50:5f:d3: 1b:2b:3e:c1:7d:62:d4:0c:bb:7a:eb:6e:1a:39:86:df: ff:d3:dd:43:b3:11:6c:93:99:a3:59:0e:ec:af:3d:8d: aa:e8:a5:97:c8:cf:96:df:92:cb:88:45:b4:cd:61:07: 68:fe:2f:33:86:52:90:03:c0:6f:88:60:a7:70:48:d3: 12:2a:c9:0d:b9:2b:b5:7b:7c:58:a0:61:6e:8d:ff:eb: 40:b0:9b:72:a0:04:2d:03:74:0a:89:f5:ba:6c:27:2c: 04:65:44:25:a6:76:35:08:3c:b5:3e:22:4e:85:fd:7a: e1:3e:56:aa:3c:ca:52:0d:0f:ac:cd:fa:b2:80:aa:f8: 02:14:47:4a:2d:6f:39:12:9b:1b:96:9b:79:38:07:a4: 49:83:b1:67:53:19:14:b5:01:f1:f6:76:04:4f:c9:2a: 6e:d2:58:f7:08:0d:c6:f3:2b:92:1a:3c:7c:3a:2c:7e: aa:3e:74:55:bc:73:64:41:63:7f:1f:6f:3c:c6:c7:2f: 44:aa:66:45:b4:9c:ae:61:37:17:3d:c4:14:36:30:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:cf:60:6c:99:c8:86:3a:57:32:96:7a:b9:fc:80:05: a3:9f:f0:c4:33:94:33:73:93:ef:8f:1c:ef:ff:ed:8b: 63:db:f1:d8:d3:b9:4a:6e:7d:fc:3e:e1:86:ef:09:22: 8c:1b:25:11:39:6d:48:e0:e0:0a:66:87:d8:05:0d:78: 74:83:62:a0:77:ee:f7:22:bb:df:e9:88:d4:ea:14:5a: f8:97:2e:f1:e5:b8:d0:1e:92:41:7b:e4:ad:01:8c:b0: e4:ad:e3:71:04:3b:68:b2:ef:11:30:23:c8:68:9a:28: fb:7a:05:58:14:18:50:89:97:b8:02:0a:11:e1:d0:17: 0a:40:33:24:09:42:6a:54:ff:c5:66:a7:c0:28:c4:89: c7:cf:8f:52:15:40:17:88:b4:f7:9b:bd:92:fd:04:72: 59:3e:ef:0e:be:cc:4c:d1:d7:10:dd:64:d6:20:59:e2: 78:de:18:e2:81:3e:c6:7a:c1:5d:fb:20:5c:49:30:db: 78:e3:2d:c3:e3:eb:fd:e2:2d:41:7f:10:2b:0e:96:a6: e5:05:00:60:e6:f9:b4:07:34:2d:41:5a:68:6d:b1:16: 00:1e:f9:b9:64:7a:7e:ef:af:21:cc:e9:6b:da:4b:e4: 6c:63:c5:3e:ca:43:6c:ed:5c:ea:e3:7c:dc:88:68:ee Fingerprint (SHA-256): A4:94:1D:55:F9:5C:A8:25:0E:29:EC:86:4F:3B:49:63:0C:C5:AB:4F:14:DC:57:5E:52:59:A5:32:0F:52:1B:D7 Fingerprint (SHA1): 1C:8A:A3:61:95:65:08:19:09:25:19:4C:89:78:4B:53:DB:08:85:EF Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14967: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092843 (0x6715dab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:11:12 2016 Not After : Fri Jan 08 15:11:12 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:6b:da:ec:ea:76:af:2a:e8:15:50:5b:b4:1e:0e:8a: ef:45:68:5c:cd:6f:f9:61:84:2f:a5:df:39:e2:ad:3a: 7e:8a:4b:73:b4:aa:68:5e:d3:bd:07:5f:d0:50:5f:d3: 1b:2b:3e:c1:7d:62:d4:0c:bb:7a:eb:6e:1a:39:86:df: ff:d3:dd:43:b3:11:6c:93:99:a3:59:0e:ec:af:3d:8d: aa:e8:a5:97:c8:cf:96:df:92:cb:88:45:b4:cd:61:07: 68:fe:2f:33:86:52:90:03:c0:6f:88:60:a7:70:48:d3: 12:2a:c9:0d:b9:2b:b5:7b:7c:58:a0:61:6e:8d:ff:eb: 40:b0:9b:72:a0:04:2d:03:74:0a:89:f5:ba:6c:27:2c: 04:65:44:25:a6:76:35:08:3c:b5:3e:22:4e:85:fd:7a: e1:3e:56:aa:3c:ca:52:0d:0f:ac:cd:fa:b2:80:aa:f8: 02:14:47:4a:2d:6f:39:12:9b:1b:96:9b:79:38:07:a4: 49:83:b1:67:53:19:14:b5:01:f1:f6:76:04:4f:c9:2a: 6e:d2:58:f7:08:0d:c6:f3:2b:92:1a:3c:7c:3a:2c:7e: aa:3e:74:55:bc:73:64:41:63:7f:1f:6f:3c:c6:c7:2f: 44:aa:66:45:b4:9c:ae:61:37:17:3d:c4:14:36:30:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:cf:60:6c:99:c8:86:3a:57:32:96:7a:b9:fc:80:05: a3:9f:f0:c4:33:94:33:73:93:ef:8f:1c:ef:ff:ed:8b: 63:db:f1:d8:d3:b9:4a:6e:7d:fc:3e:e1:86:ef:09:22: 8c:1b:25:11:39:6d:48:e0:e0:0a:66:87:d8:05:0d:78: 74:83:62:a0:77:ee:f7:22:bb:df:e9:88:d4:ea:14:5a: f8:97:2e:f1:e5:b8:d0:1e:92:41:7b:e4:ad:01:8c:b0: e4:ad:e3:71:04:3b:68:b2:ef:11:30:23:c8:68:9a:28: fb:7a:05:58:14:18:50:89:97:b8:02:0a:11:e1:d0:17: 0a:40:33:24:09:42:6a:54:ff:c5:66:a7:c0:28:c4:89: c7:cf:8f:52:15:40:17:88:b4:f7:9b:bd:92:fd:04:72: 59:3e:ef:0e:be:cc:4c:d1:d7:10:dd:64:d6:20:59:e2: 78:de:18:e2:81:3e:c6:7a:c1:5d:fb:20:5c:49:30:db: 78:e3:2d:c3:e3:eb:fd:e2:2d:41:7f:10:2b:0e:96:a6: e5:05:00:60:e6:f9:b4:07:34:2d:41:5a:68:6d:b1:16: 00:1e:f9:b9:64:7a:7e:ef:af:21:cc:e9:6b:da:4b:e4: 6c:63:c5:3e:ca:43:6c:ed:5c:ea:e3:7c:dc:88:68:ee Fingerprint (SHA-256): A4:94:1D:55:F9:5C:A8:25:0E:29:EC:86:4F:3B:49:63:0C:C5:AB:4F:14:DC:57:5E:52:59:A5:32:0F:52:1B:D7 Fingerprint (SHA1): 1C:8A:A3:61:95:65:08:19:09:25:19:4C:89:78:4B:53:DB:08:85:EF Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14968: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092843 (0x6715dab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:11:12 2016 Not After : Fri Jan 08 15:11:12 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:6b:da:ec:ea:76:af:2a:e8:15:50:5b:b4:1e:0e:8a: ef:45:68:5c:cd:6f:f9:61:84:2f:a5:df:39:e2:ad:3a: 7e:8a:4b:73:b4:aa:68:5e:d3:bd:07:5f:d0:50:5f:d3: 1b:2b:3e:c1:7d:62:d4:0c:bb:7a:eb:6e:1a:39:86:df: ff:d3:dd:43:b3:11:6c:93:99:a3:59:0e:ec:af:3d:8d: aa:e8:a5:97:c8:cf:96:df:92:cb:88:45:b4:cd:61:07: 68:fe:2f:33:86:52:90:03:c0:6f:88:60:a7:70:48:d3: 12:2a:c9:0d:b9:2b:b5:7b:7c:58:a0:61:6e:8d:ff:eb: 40:b0:9b:72:a0:04:2d:03:74:0a:89:f5:ba:6c:27:2c: 04:65:44:25:a6:76:35:08:3c:b5:3e:22:4e:85:fd:7a: e1:3e:56:aa:3c:ca:52:0d:0f:ac:cd:fa:b2:80:aa:f8: 02:14:47:4a:2d:6f:39:12:9b:1b:96:9b:79:38:07:a4: 49:83:b1:67:53:19:14:b5:01:f1:f6:76:04:4f:c9:2a: 6e:d2:58:f7:08:0d:c6:f3:2b:92:1a:3c:7c:3a:2c:7e: aa:3e:74:55:bc:73:64:41:63:7f:1f:6f:3c:c6:c7:2f: 44:aa:66:45:b4:9c:ae:61:37:17:3d:c4:14:36:30:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:cf:60:6c:99:c8:86:3a:57:32:96:7a:b9:fc:80:05: a3:9f:f0:c4:33:94:33:73:93:ef:8f:1c:ef:ff:ed:8b: 63:db:f1:d8:d3:b9:4a:6e:7d:fc:3e:e1:86:ef:09:22: 8c:1b:25:11:39:6d:48:e0:e0:0a:66:87:d8:05:0d:78: 74:83:62:a0:77:ee:f7:22:bb:df:e9:88:d4:ea:14:5a: f8:97:2e:f1:e5:b8:d0:1e:92:41:7b:e4:ad:01:8c:b0: e4:ad:e3:71:04:3b:68:b2:ef:11:30:23:c8:68:9a:28: fb:7a:05:58:14:18:50:89:97:b8:02:0a:11:e1:d0:17: 0a:40:33:24:09:42:6a:54:ff:c5:66:a7:c0:28:c4:89: c7:cf:8f:52:15:40:17:88:b4:f7:9b:bd:92:fd:04:72: 59:3e:ef:0e:be:cc:4c:d1:d7:10:dd:64:d6:20:59:e2: 78:de:18:e2:81:3e:c6:7a:c1:5d:fb:20:5c:49:30:db: 78:e3:2d:c3:e3:eb:fd:e2:2d:41:7f:10:2b:0e:96:a6: e5:05:00:60:e6:f9:b4:07:34:2d:41:5a:68:6d:b1:16: 00:1e:f9:b9:64:7a:7e:ef:af:21:cc:e9:6b:da:4b:e4: 6c:63:c5:3e:ca:43:6c:ed:5c:ea:e3:7c:dc:88:68:ee Fingerprint (SHA-256): A4:94:1D:55:F9:5C:A8:25:0E:29:EC:86:4F:3B:49:63:0C:C5:AB:4F:14:DC:57:5E:52:59:A5:32:0F:52:1B:D7 Fingerprint (SHA1): 1C:8A:A3:61:95:65:08:19:09:25:19:4C:89:78:4B:53:DB:08:85:EF Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14969: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092843 (0x6715dab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:11:12 2016 Not After : Fri Jan 08 15:11:12 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:6b:da:ec:ea:76:af:2a:e8:15:50:5b:b4:1e:0e:8a: ef:45:68:5c:cd:6f:f9:61:84:2f:a5:df:39:e2:ad:3a: 7e:8a:4b:73:b4:aa:68:5e:d3:bd:07:5f:d0:50:5f:d3: 1b:2b:3e:c1:7d:62:d4:0c:bb:7a:eb:6e:1a:39:86:df: ff:d3:dd:43:b3:11:6c:93:99:a3:59:0e:ec:af:3d:8d: aa:e8:a5:97:c8:cf:96:df:92:cb:88:45:b4:cd:61:07: 68:fe:2f:33:86:52:90:03:c0:6f:88:60:a7:70:48:d3: 12:2a:c9:0d:b9:2b:b5:7b:7c:58:a0:61:6e:8d:ff:eb: 40:b0:9b:72:a0:04:2d:03:74:0a:89:f5:ba:6c:27:2c: 04:65:44:25:a6:76:35:08:3c:b5:3e:22:4e:85:fd:7a: e1:3e:56:aa:3c:ca:52:0d:0f:ac:cd:fa:b2:80:aa:f8: 02:14:47:4a:2d:6f:39:12:9b:1b:96:9b:79:38:07:a4: 49:83:b1:67:53:19:14:b5:01:f1:f6:76:04:4f:c9:2a: 6e:d2:58:f7:08:0d:c6:f3:2b:92:1a:3c:7c:3a:2c:7e: aa:3e:74:55:bc:73:64:41:63:7f:1f:6f:3c:c6:c7:2f: 44:aa:66:45:b4:9c:ae:61:37:17:3d:c4:14:36:30:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:cf:60:6c:99:c8:86:3a:57:32:96:7a:b9:fc:80:05: a3:9f:f0:c4:33:94:33:73:93:ef:8f:1c:ef:ff:ed:8b: 63:db:f1:d8:d3:b9:4a:6e:7d:fc:3e:e1:86:ef:09:22: 8c:1b:25:11:39:6d:48:e0:e0:0a:66:87:d8:05:0d:78: 74:83:62:a0:77:ee:f7:22:bb:df:e9:88:d4:ea:14:5a: f8:97:2e:f1:e5:b8:d0:1e:92:41:7b:e4:ad:01:8c:b0: e4:ad:e3:71:04:3b:68:b2:ef:11:30:23:c8:68:9a:28: fb:7a:05:58:14:18:50:89:97:b8:02:0a:11:e1:d0:17: 0a:40:33:24:09:42:6a:54:ff:c5:66:a7:c0:28:c4:89: c7:cf:8f:52:15:40:17:88:b4:f7:9b:bd:92:fd:04:72: 59:3e:ef:0e:be:cc:4c:d1:d7:10:dd:64:d6:20:59:e2: 78:de:18:e2:81:3e:c6:7a:c1:5d:fb:20:5c:49:30:db: 78:e3:2d:c3:e3:eb:fd:e2:2d:41:7f:10:2b:0e:96:a6: e5:05:00:60:e6:f9:b4:07:34:2d:41:5a:68:6d:b1:16: 00:1e:f9:b9:64:7a:7e:ef:af:21:cc:e9:6b:da:4b:e4: 6c:63:c5:3e:ca:43:6c:ed:5c:ea:e3:7c:dc:88:68:ee Fingerprint (SHA-256): A4:94:1D:55:F9:5C:A8:25:0E:29:EC:86:4F:3B:49:63:0C:C5:AB:4F:14:DC:57:5E:52:59:A5:32:0F:52:1B:D7 Fingerprint (SHA1): 1C:8A:A3:61:95:65:08:19:09:25:19:4C:89:78:4B:53:DB:08:85:EF Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14970: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092843 (0x6715dab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:11:12 2016 Not After : Fri Jan 08 15:11:12 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:6b:da:ec:ea:76:af:2a:e8:15:50:5b:b4:1e:0e:8a: ef:45:68:5c:cd:6f:f9:61:84:2f:a5:df:39:e2:ad:3a: 7e:8a:4b:73:b4:aa:68:5e:d3:bd:07:5f:d0:50:5f:d3: 1b:2b:3e:c1:7d:62:d4:0c:bb:7a:eb:6e:1a:39:86:df: ff:d3:dd:43:b3:11:6c:93:99:a3:59:0e:ec:af:3d:8d: aa:e8:a5:97:c8:cf:96:df:92:cb:88:45:b4:cd:61:07: 68:fe:2f:33:86:52:90:03:c0:6f:88:60:a7:70:48:d3: 12:2a:c9:0d:b9:2b:b5:7b:7c:58:a0:61:6e:8d:ff:eb: 40:b0:9b:72:a0:04:2d:03:74:0a:89:f5:ba:6c:27:2c: 04:65:44:25:a6:76:35:08:3c:b5:3e:22:4e:85:fd:7a: e1:3e:56:aa:3c:ca:52:0d:0f:ac:cd:fa:b2:80:aa:f8: 02:14:47:4a:2d:6f:39:12:9b:1b:96:9b:79:38:07:a4: 49:83:b1:67:53:19:14:b5:01:f1:f6:76:04:4f:c9:2a: 6e:d2:58:f7:08:0d:c6:f3:2b:92:1a:3c:7c:3a:2c:7e: aa:3e:74:55:bc:73:64:41:63:7f:1f:6f:3c:c6:c7:2f: 44:aa:66:45:b4:9c:ae:61:37:17:3d:c4:14:36:30:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:cf:60:6c:99:c8:86:3a:57:32:96:7a:b9:fc:80:05: a3:9f:f0:c4:33:94:33:73:93:ef:8f:1c:ef:ff:ed:8b: 63:db:f1:d8:d3:b9:4a:6e:7d:fc:3e:e1:86:ef:09:22: 8c:1b:25:11:39:6d:48:e0:e0:0a:66:87:d8:05:0d:78: 74:83:62:a0:77:ee:f7:22:bb:df:e9:88:d4:ea:14:5a: f8:97:2e:f1:e5:b8:d0:1e:92:41:7b:e4:ad:01:8c:b0: e4:ad:e3:71:04:3b:68:b2:ef:11:30:23:c8:68:9a:28: fb:7a:05:58:14:18:50:89:97:b8:02:0a:11:e1:d0:17: 0a:40:33:24:09:42:6a:54:ff:c5:66:a7:c0:28:c4:89: c7:cf:8f:52:15:40:17:88:b4:f7:9b:bd:92:fd:04:72: 59:3e:ef:0e:be:cc:4c:d1:d7:10:dd:64:d6:20:59:e2: 78:de:18:e2:81:3e:c6:7a:c1:5d:fb:20:5c:49:30:db: 78:e3:2d:c3:e3:eb:fd:e2:2d:41:7f:10:2b:0e:96:a6: e5:05:00:60:e6:f9:b4:07:34:2d:41:5a:68:6d:b1:16: 00:1e:f9:b9:64:7a:7e:ef:af:21:cc:e9:6b:da:4b:e4: 6c:63:c5:3e:ca:43:6c:ed:5c:ea:e3:7c:dc:88:68:ee Fingerprint (SHA-256): A4:94:1D:55:F9:5C:A8:25:0E:29:EC:86:4F:3B:49:63:0C:C5:AB:4F:14:DC:57:5E:52:59:A5:32:0F:52:1B:D7 Fingerprint (SHA1): 1C:8A:A3:61:95:65:08:19:09:25:19:4C:89:78:4B:53:DB:08:85:EF Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14971: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14972: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14973: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092873 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14974: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14975: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #14976: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14977: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 108092874 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14978: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14979: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #14980: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14981: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 108092875 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14982: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14983: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #14984: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14985: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 108092876 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14986: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14987: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #14988: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14989: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 108092877 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14990: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14991: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #14992: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14993: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 108092878 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14994: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14995: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #14996: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14997: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 108092879 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14998: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14999: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15000: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092873 (0x6715dc9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:18:13 2016 Not After : Fri Jan 08 15:18:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:a5:5e:e8:cb:a0:62:10:27:41:ae:c9:72:e8:e3:99: 8a:45:1f:81:e8:f1:ee:07:02:d3:36:83:ef:b7:b0:e1: ba:85:7b:17:52:56:20:5a:d6:3a:75:57:ca:30:51:50: e9:bb:22:85:1a:99:51:95:eb:36:ec:35:03:08:a9:23: 7f:c6:90:70:c3:14:49:3a:c4:f6:61:7f:bc:fd:5a:d1: 15:a6:49:87:88:35:1c:11:83:8f:b2:d1:f5:fd:3a:43: 1b:73:a1:1d:c3:9d:b7:a5:10:b0:14:74:26:53:d9:4d: d7:f8:70:af:74:fb:75:66:73:59:b0:7f:4c:4c:49:c7: c7:c7:e8:ec:6b:19:c8:a0:2c:4f:87:87:0d:f1:ca:ed: e5:6c:e9:ee:58:5a:bd:f1:34:26:66:1c:54:11:a2:3b: d8:6a:34:0a:f6:f3:01:09:13:1e:5b:a4:2f:52:bb:b7: 2e:7f:fa:f6:85:d3:c4:24:d4:80:27:1c:d8:aa:04:ab: 00:c0:2f:43:cc:56:61:12:6a:12:82:70:e1:cb:e1:4f: 7f:16:58:ea:e4:54:81:78:e2:78:eb:ac:c7:1b:86:45: 69:ae:c3:aa:f0:8d:47:f0:06:aa:48:de:9f:4e:cd:11: f1:d8:de:96:fe:34:0e:45:63:2c:bd:41:4c:17:41:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:6f:f2:8c:6a:73:40:72:8c:20:75:8a:1e:38:0b:91: 68:23:6e:68:8c:da:5d:7b:2d:a0:4d:9a:47:7c:1a:49: e0:f8:ff:15:1f:27:b3:d2:0b:0a:a0:69:24:c0:44:0d: 8a:60:15:05:30:84:46:19:0a:08:34:4c:14:45:cb:e0: 31:01:c8:b8:22:9f:b6:a6:69:02:2f:9d:85:8e:42:e9: cd:59:e3:f6:be:1a:f3:25:cd:1a:b0:3a:2d:7f:be:e6: cb:0b:58:b5:a3:45:ba:2b:f8:fb:00:39:c9:f9:1e:f7: c6:94:af:70:a5:12:fe:9a:98:20:b0:a2:b9:d2:c4:99: 33:6d:51:d1:08:b0:d8:4d:43:c9:6d:af:4f:33:47:5b: 49:2b:82:25:c6:eb:0c:f8:d6:81:a3:c4:69:f8:e4:04: 9b:2e:2b:52:a7:a7:63:06:b0:8b:26:2e:67:da:88:56: 2d:99:ec:c0:c6:3b:8e:c1:f0:8e:ae:d7:84:df:46:19: 43:73:69:f5:44:2f:20:7f:d5:c9:3a:92:ac:bc:b0:f0: 33:29:1e:85:44:0a:b2:0b:a5:d6:78:80:c8:76:2e:a4: e6:07:0a:d0:14:e2:99:47:c0:c0:96:0c:01:1f:84:83: 19:ca:a0:ab:cf:61:e5:be:46:9c:35:f6:61:26:6a:2c Fingerprint (SHA-256): 0A:AF:DB:35:44:84:0A:BC:6F:0E:8D:1A:EB:AC:CF:7D:16:DB:9E:37:3F:2D:32:43:77:18:E1:73:CF:EC:5C:94 Fingerprint (SHA1): 4D:3A:80:87:FA:31:6C:C4:DF:87:FC:8C:56:F2:3A:47:BE:08:A3:FC Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #15001: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15002: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15003: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #15004: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092873 (0x6715dc9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:18:13 2016 Not After : Fri Jan 08 15:18:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:a5:5e:e8:cb:a0:62:10:27:41:ae:c9:72:e8:e3:99: 8a:45:1f:81:e8:f1:ee:07:02:d3:36:83:ef:b7:b0:e1: ba:85:7b:17:52:56:20:5a:d6:3a:75:57:ca:30:51:50: e9:bb:22:85:1a:99:51:95:eb:36:ec:35:03:08:a9:23: 7f:c6:90:70:c3:14:49:3a:c4:f6:61:7f:bc:fd:5a:d1: 15:a6:49:87:88:35:1c:11:83:8f:b2:d1:f5:fd:3a:43: 1b:73:a1:1d:c3:9d:b7:a5:10:b0:14:74:26:53:d9:4d: d7:f8:70:af:74:fb:75:66:73:59:b0:7f:4c:4c:49:c7: c7:c7:e8:ec:6b:19:c8:a0:2c:4f:87:87:0d:f1:ca:ed: e5:6c:e9:ee:58:5a:bd:f1:34:26:66:1c:54:11:a2:3b: d8:6a:34:0a:f6:f3:01:09:13:1e:5b:a4:2f:52:bb:b7: 2e:7f:fa:f6:85:d3:c4:24:d4:80:27:1c:d8:aa:04:ab: 00:c0:2f:43:cc:56:61:12:6a:12:82:70:e1:cb:e1:4f: 7f:16:58:ea:e4:54:81:78:e2:78:eb:ac:c7:1b:86:45: 69:ae:c3:aa:f0:8d:47:f0:06:aa:48:de:9f:4e:cd:11: f1:d8:de:96:fe:34:0e:45:63:2c:bd:41:4c:17:41:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:6f:f2:8c:6a:73:40:72:8c:20:75:8a:1e:38:0b:91: 68:23:6e:68:8c:da:5d:7b:2d:a0:4d:9a:47:7c:1a:49: e0:f8:ff:15:1f:27:b3:d2:0b:0a:a0:69:24:c0:44:0d: 8a:60:15:05:30:84:46:19:0a:08:34:4c:14:45:cb:e0: 31:01:c8:b8:22:9f:b6:a6:69:02:2f:9d:85:8e:42:e9: cd:59:e3:f6:be:1a:f3:25:cd:1a:b0:3a:2d:7f:be:e6: cb:0b:58:b5:a3:45:ba:2b:f8:fb:00:39:c9:f9:1e:f7: c6:94:af:70:a5:12:fe:9a:98:20:b0:a2:b9:d2:c4:99: 33:6d:51:d1:08:b0:d8:4d:43:c9:6d:af:4f:33:47:5b: 49:2b:82:25:c6:eb:0c:f8:d6:81:a3:c4:69:f8:e4:04: 9b:2e:2b:52:a7:a7:63:06:b0:8b:26:2e:67:da:88:56: 2d:99:ec:c0:c6:3b:8e:c1:f0:8e:ae:d7:84:df:46:19: 43:73:69:f5:44:2f:20:7f:d5:c9:3a:92:ac:bc:b0:f0: 33:29:1e:85:44:0a:b2:0b:a5:d6:78:80:c8:76:2e:a4: e6:07:0a:d0:14:e2:99:47:c0:c0:96:0c:01:1f:84:83: 19:ca:a0:ab:cf:61:e5:be:46:9c:35:f6:61:26:6a:2c Fingerprint (SHA-256): 0A:AF:DB:35:44:84:0A:BC:6F:0E:8D:1A:EB:AC:CF:7D:16:DB:9E:37:3F:2D:32:43:77:18:E1:73:CF:EC:5C:94 Fingerprint (SHA1): 4D:3A:80:87:FA:31:6C:C4:DF:87:FC:8C:56:F2:3A:47:BE:08:A3:FC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #15005: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15006: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15007: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15008: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092880 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15009: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15010: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15011: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15012: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108092881 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #15013: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15014: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15015: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15016: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108092882 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15017: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15018: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #15019: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15020: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108092883 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15021: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15022: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15023: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #15024: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #15025: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #15026: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092880 (0x6715dd0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:19:32 2016 Not After : Fri Jan 08 15:19:32 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:0b:e6:e1:95:2e:8f:ae:01:09:21:cc:0f:ff:e2:ac: 46:4e:bb:6e:c1:c4:39:58:bc:d7:24:61:54:df:4b:ee: 47:7f:96:10:fb:86:6e:13:11:d5:5a:7a:8a:16:30:f2: 2a:e9:3b:f4:a6:7d:17:25:f7:37:a4:65:2d:83:ea:db: 42:46:b2:00:18:f5:02:72:5f:05:09:24:cb:df:3a:f5: 9c:b8:14:43:02:e3:03:e4:a7:88:19:a8:6e:c1:f1:8c: 6a:81:9e:49:fe:dd:45:51:18:3f:0d:23:a3:4a:10:a9: 44:5a:95:42:6d:7f:40:f3:7d:72:0e:59:b8:69:42:58: 34:fa:cc:9c:36:60:12:d9:64:76:f5:cf:53:e7:98:e1: 0c:53:3b:6a:b2:55:f5:d0:7e:f9:1f:04:98:9f:58:5a: 61:f4:ea:b3:c3:2d:a1:76:95:ea:81:ad:2a:7d:00:a6: e9:a0:b2:32:f4:1a:d5:61:72:39:59:ce:08:7e:8e:db: 41:f5:27:3d:d7:5c:d9:6a:cf:c9:91:60:26:a6:85:69: c8:e1:1e:e5:4d:a8:c3:39:47:cd:f5:52:9b:0d:34:3b: ca:2a:9c:fd:18:92:8e:f9:a0:9f:17:6c:31:c5:c5:f4: 12:97:56:96:07:1e:38:f5:98:ab:78:9e:28:88:fa:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:d9:b6:f9:74:de:52:21:41:11:14:00:54:97:73:bd: ae:ab:9c:a7:98:6d:5f:2d:2c:08:78:82:55:0c:c7:d2: 9c:05:11:a5:bf:88:75:cc:1e:20:64:8d:23:b7:fd:97: 28:bb:d4:94:bd:d4:76:b7:96:a4:d0:4f:a1:1e:8c:0c: b2:8c:c5:6d:02:6f:bb:e0:30:f2:20:36:0c:64:f3:72: c8:c0:e9:5c:2e:32:97:e8:6c:9e:85:68:e3:77:01:eb: ec:7b:bb:1b:c1:c4:8a:f7:d8:83:36:63:02:8f:ce:7a: de:37:ba:45:bb:4d:4f:e0:e3:0e:56:9c:55:5a:2c:7c: 46:93:d6:e4:c6:7c:8d:67:c2:50:a4:83:78:63:0b:1e: 6d:6b:a4:67:74:5f:4f:46:f2:03:42:59:0e:3c:4a:8b: 90:31:7c:ad:da:c4:1a:a0:1c:10:c1:5a:6b:b2:e9:4d: ac:91:14:5d:e7:25:9f:cb:76:8b:06:18:1b:d6:ce:5b: 3e:20:58:94:dc:1c:5c:73:3c:1e:0b:ff:fb:34:23:c7: 53:12:4d:2e:92:d1:8d:ec:36:cf:f6:7a:7d:57:86:8c: 07:50:93:24:6a:4d:1f:7b:28:ce:fe:b8:c1:b6:f8:0e: 05:95:3a:75:6c:13:82:10:66:14:40:25:dc:f4:f9:4a Fingerprint (SHA-256): 57:42:63:D0:8E:03:30:E3:AE:C8:97:02:92:D7:75:F1:AC:B0:63:E8:B6:4F:F6:F9:8F:A3:CC:D4:B6:E1:8C:37 Fingerprint (SHA1): 38:E0:E7:E4:D3:88:E2:26:FD:F2:41:BF:B0:15:1B:AC:40:CB:2B:19 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15027: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15028: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15029: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092881 (0x6715dd1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:19:44 2016 Not After : Fri Jan 08 15:19:44 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:a8:d7:47:1a:e4:aa:24:4b:84:31:ce:26:9a:c4:4d: 5f:b3:e6:8f:89:0f:73:ca:ca:d0:53:ab:7c:5b:28:c2: 86:42:fc:30:c9:dd:45:92:61:68:04:90:d2:22:9f:0a: 91:7a:9e:71:c3:12:37:b3:17:c3:b0:b9:da:94:94:b9: 1c:ae:3b:0e:70:e0:4f:36:45:b0:2d:7c:1f:3f:50:79: 23:38:6d:d3:63:9b:cf:f1:44:d2:7e:8b:68:23:c2:e5: ed:31:8f:46:d0:7e:34:8d:06:0c:42:f7:72:6a:00:93: 4b:50:5a:ce:d4:1e:cc:40:72:3b:a8:25:c7:56:c9:6e: e4:59:bb:56:e4:c0:4d:e1:f2:d6:fb:77:f7:71:70:d2: 0e:1f:75:47:b4:7e:1f:f7:6f:c0:b5:fb:09:4c:3e:95: b9:8b:51:75:ae:d1:a0:61:2d:4d:6d:3c:24:ad:e2:0d: 42:cc:4a:92:69:1c:7a:eb:7e:4f:f7:7c:79:76:6c:75: b5:88:ba:4c:08:f9:20:ad:7f:8e:39:0d:cd:9b:21:ba: 2c:aa:ae:54:6f:ef:44:05:15:df:4a:85:0f:6b:1d:22: 34:e5:2d:8b:b9:47:61:b2:8d:e9:4f:06:52:32:82:cc: a7:ab:00:a1:fb:b9:2b:d2:3d:eb:6a:81:05:42:8d:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:4d:39:a1:81:4e:f7:34:31:cf:d9:d0:74:37:7e:30: 3e:c9:4f:60:e2:9d:b6:d7:08:37:bb:88:71:fb:24:25: 5d:e2:e1:e0:c1:a0:60:95:ae:f8:85:45:7e:3e:0e:2f: f6:e3:9a:54:f8:69:21:f3:b1:b3:1f:bd:fe:f5:bd:12: d5:ec:7f:01:0b:d7:82:be:75:1e:25:bb:ea:d4:24:a3: ac:f4:5e:8a:90:41:30:a8:77:a6:4d:32:43:5d:e3:30: b3:61:cf:f6:b7:b6:09:74:75:bb:9f:a7:15:3e:d1:64: ce:03:61:3d:e3:c1:91:c0:a7:e8:25:1a:3e:44:f0:f4: 76:ad:e2:22:38:71:f9:46:9a:c5:51:57:de:65:31:b3: 3d:73:a6:3a:23:fb:1b:4d:e8:5b:3e:8f:4e:63:fc:3f: de:48:64:a9:8b:16:c3:53:a6:51:35:50:b7:e7:ac:40: 85:50:77:42:37:cf:94:ac:f0:79:9c:49:de:e7:1d:77: 12:2c:de:f9:1b:bd:c0:98:d7:a4:0e:0a:7b:83:03:aa: a6:29:5e:97:bd:92:52:54:5a:5c:63:1c:35:98:b6:26: 3f:f4:ea:c0:3b:bc:3a:65:a1:32:74:2c:20:d9:61:7b: 1a:a5:2e:f9:77:60:e0:1a:9d:db:ec:98:ec:b9:0d:23 Fingerprint (SHA-256): 75:8E:7E:32:97:92:AD:4A:AA:E2:7A:C7:41:25:11:0F:42:28:88:32:32:B9:45:9D:54:71:DF:16:85:B0:14:00 Fingerprint (SHA1): BA:B0:4E:2E:D3:43:34:14:76:54:98:68:7C:9A:F8:60:E3:A7:51:A9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #15030: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15031: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092882 (0x6715dd2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 15:20:07 2016 Not After : Fri Jan 08 15:20:07 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:7d:30:83:22:c1:cf:f8:1d:34:d1:ed:c9:a4:66:59: b3:d5:b1:b7:42:c1:e8:4a:75:6d:68:ec:c4:b6:35:15: 24:2b:28:1d:06:51:35:4b:69:4d:45:cd:61:8c:dd:f7: 4d:20:4d:e4:04:5f:71:3b:ff:6e:48:bf:de:2f:ab:07: df:d4:c7:34:c7:f3:33:c1:be:71:50:72:93:3a:42:57: 58:a6:7e:be:e6:1c:11:52:75:06:6d:3c:6b:d6:62:d7: 7f:e1:89:da:ac:19:20:77:eb:71:86:4b:6e:fb:93:ba: 6d:e3:a1:14:2c:55:6e:b3:1e:2d:f6:c1:87:f8:13:90: 9a:bc:2a:08:4a:05:64:02:d1:6d:65:82:5c:4a:41:38: 31:61:4b:ef:44:ce:aa:6b:e9:a5:48:b8:b3:86:11:18: 7d:82:0a:f7:2a:b0:d0:ff:7d:9d:71:a2:1b:92:40:78: ff:8f:64:c7:ca:f9:3c:a8:8f:52:49:53:c8:13:a8:7e: 09:e0:78:5d:b1:bd:c1:de:94:e3:8d:ba:08:39:e9:ce: 02:e3:24:21:72:2d:db:cd:e2:f4:3f:06:6e:ca:b8:54: 17:75:d2:da:d3:d7:41:19:9c:d2:2f:e3:bd:5b:18:4f: b7:69:b1:65:d1:2d:b1:a4:c1:ab:6d:58:a7:fa:0f:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:af:04:f2:e2:02:10:00:a5:2e:e6:87:3c:d9:64:7b: 82:c5:64:22:ec:f5:79:c0:66:f6:96:b8:1d:24:97:1b: 04:61:9f:ce:f5:9c:bb:c9:d9:9c:4f:43:47:bb:86:63: 82:1e:41:3a:9f:38:c7:10:b3:7d:cc:13:b1:2f:e4:64: c8:fb:13:aa:e9:5e:1c:68:fd:83:e1:e2:92:f4:7c:e5: 75:50:70:aa:14:62:67:8d:9c:9a:35:5d:c8:5d:fc:5c: ec:7d:68:4e:4b:58:1d:84:d5:82:73:f3:5e:1b:6f:23: ad:37:c1:e8:fd:4b:50:f8:21:27:76:32:2d:48:5e:d6: 85:d4:b5:ee:aa:94:3f:01:b9:eb:16:10:3b:58:ad:7a: 79:24:14:bd:33:77:05:79:55:e2:d1:e6:65:c7:e1:f9: 15:fd:a4:5b:e4:03:52:e7:6e:db:84:4b:c7:95:82:40: f4:c5:96:f7:05:20:11:e9:75:a6:7f:ca:23:57:77:15: ea:3d:ea:c5:1b:f5:2b:34:6d:35:cf:d4:f6:22:67:dd: 0f:5e:cd:a7:fd:e0:04:97:d0:fa:fe:d1:14:a0:8b:4c: 67:45:7e:63:80:c6:58:01:e5:47:97:44:bf:f1:ea:e5: e5:96:15:48:1f:ab:d6:0e:5f:1d:bf:9c:47:96:ae:1c Fingerprint (SHA-256): 8E:45:EF:1B:D8:10:25:86:A1:1B:92:C7:7E:43:06:1A:F3:6A:1B:FE:0A:E3:42:C5:9D:D3:A7:FA:F7:E5:31:72 Fingerprint (SHA1): 84:76:0A:C3:09:5D:50:1E:F0:83:95:31:45:48:62:DE:30:E3:25:87 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #15032: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15033: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092884 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15034: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15035: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15036: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15037: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108092885 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15038: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15039: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15040: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15041: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108092886 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #15042: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15043: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #15044: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15045: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 108092887 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15046: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15047: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #15048: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15049: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 108092888 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15050: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15051: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15052: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #15053: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #15054: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #15055: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #15056: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092884 (0x6715dd4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:20:37 2016 Not After : Fri Jan 08 15:20:37 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:6d:30:58:5b:92:13:be:3b:18:ac:19:23:24:3c:c5: de:e3:90:e2:a5:d8:4e:81:de:e6:46:e9:a3:99:40:c0: 0e:ef:6c:eb:b4:2a:dd:87:67:27:d9:28:0d:eb:30:dc: 75:6a:b9:17:00:76:a3:9d:d5:f9:4a:d1:8e:0d:f6:24: d5:71:e0:b7:7e:dd:a8:43:3c:7a:82:28:28:4f:db:55: 38:20:28:7b:13:7e:a9:f0:81:a8:c0:1d:f8:af:d6:c3: 9c:e5:75:dc:aa:67:65:37:5f:7a:53:e6:00:d6:64:c9: 8e:70:4f:f0:c7:c3:00:4d:b5:87:7b:3b:66:6c:0b:1e: 5c:ae:ca:e0:2e:d7:cd:41:ab:30:bc:dd:30:47:e5:0b: 20:21:76:c7:06:41:63:3f:c1:31:3d:df:35:13:ed:91: 33:f9:cc:b4:a4:db:50:c0:26:04:e6:14:6a:98:c2:80: 28:1e:db:e4:36:85:cc:f2:78:18:a4:c2:6b:b8:4f:20: 77:5a:92:9d:d8:b4:c3:0f:f4:af:a7:fa:97:9f:0d:00: 76:91:e9:74:fa:2c:83:a0:a9:e1:4f:e0:5c:8d:0e:74: 33:5d:22:07:24:b9:a5:6f:4e:8e:41:aa:a6:ec:e4:49: cd:68:82:79:c2:e2:76:f6:57:3d:83:cc:bb:d4:73:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:3d:50:36:fe:1f:0d:49:0b:76:bd:0e:e9:48:7e:86: 28:2c:16:0b:36:13:b1:f2:2d:1b:d7:7e:0c:fc:db:36: ba:2f:18:24:34:64:af:ce:9c:8f:bc:fc:32:1d:d6:d3: 48:61:09:d9:a0:19:d3:2e:bb:53:90:3c:ab:41:dd:8a: 8e:55:6e:93:43:2b:5c:f3:42:e4:c4:6d:70:e4:d9:a1: 52:de:08:f0:07:40:38:74:9e:16:b7:e7:50:ba:77:7d: 35:f7:76:57:99:df:58:b0:9f:be:f6:8e:49:88:3e:79: dd:fa:06:fb:e8:ac:39:4c:f2:91:ab:00:57:4b:7d:39: 5c:94:59:38:f5:3d:58:b1:85:8c:a5:5d:34:f2:82:e0: f3:4d:f5:9d:58:25:7b:25:74:24:28:c4:f8:1f:5f:bb: b2:37:76:43:8b:2e:d8:47:24:3f:aa:c6:4a:bc:29:fb: ce:03:2b:36:82:ce:e3:58:4c:67:f7:02:3f:a5:a6:2d: b8:09:98:44:15:a9:27:a4:a4:26:7a:e9:f4:7f:88:2c: 4f:50:f6:61:54:5b:54:93:ac:e5:e3:17:f9:be:39:74: 3c:04:fb:4a:b2:ea:3b:23:a8:82:fa:1c:78:70:36:09: 05:6e:6c:2e:77:08:2c:2a:94:41:a6:6d:84:68:cb:88 Fingerprint (SHA-256): 8B:92:84:AC:A2:0D:40:3D:E3:37:9F:85:BB:F4:96:D5:06:59:E8:74:41:37:F2:06:CB:A3:A6:AC:A9:9A:E2:E5 Fingerprint (SHA1): 9E:87:FA:5C:A3:10:F2:2C:76:E9:B1:FF:48:43:15:37:D7:D4:32:01 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15057: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15058: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092885 (0x6715dd5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:20:49 2016 Not After : Fri Jan 08 15:20:49 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:30:67:a4:13:ee:02:de:65:9a:c4:c6:1c:56:cb:43: 9c:e7:f9:61:5a:4f:2f:da:81:13:4f:df:5d:d5:65:3c: f2:50:64:6d:9a:81:97:2e:80:c1:da:26:71:b1:93:7f: 6b:03:98:90:b5:d8:53:a9:49:87:25:23:b7:44:ef:4b: fd:93:ff:0a:a1:3e:07:2d:6a:b2:65:cf:6b:e8:d5:e4: 7e:c4:ee:dd:c2:34:88:6b:a3:ac:ea:2a:53:9e:e4:31: 6c:e9:1e:a2:70:02:46:90:3b:2f:df:d6:16:42:4c:c2: 4b:22:eb:39:d3:33:82:bd:0e:d8:8b:17:55:90:af:3c: c9:ec:a4:3c:c2:08:fe:89:4e:4c:c2:df:cb:4c:88:37: 25:99:a8:c8:84:8e:0b:9f:92:02:18:a5:f6:e5:4d:34: c9:47:c9:fa:07:15:6b:97:aa:6f:31:9a:f5:bf:1e:7c: ca:f3:af:87:0e:8e:80:14:56:a5:80:11:df:e0:87:65: d1:b6:5d:6f:8a:06:7b:c0:6c:66:33:c3:d7:0b:d1:05: b9:d0:61:c3:4b:d5:82:1e:dd:78:20:8f:95:cd:81:77: 82:3c:e8:e7:db:60:49:99:1f:17:ad:7d:4c:f0:1a:74: da:a1:81:8c:8a:a3:7d:0a:7a:cc:f1:86:94:76:df:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:e2:c9:b1:a4:c6:81:68:a9:bd:9b:61:e5:b7:dd:fd: 43:0c:59:4f:50:3f:0d:a0:df:59:c0:2d:e2:ee:b0:ac: 8a:ca:be:ab:61:ca:23:f5:8c:19:8f:47:02:06:74:86: 74:c3:28:fc:49:16:91:c8:72:6c:e7:82:b4:88:3c:39: c8:c2:55:8f:3d:bf:d3:68:ce:e1:4f:b5:7f:90:9b:ea: b0:3e:c3:d3:c7:42:68:9b:d9:e0:72:89:34:9c:91:42: dc:ab:d6:72:bb:ad:c9:f2:24:a1:11:e2:9e:5e:64:fb: bc:6a:7a:77:71:1b:f0:15:cc:7a:38:41:19:a3:54:9b: 9f:f2:f0:65:b8:b4:1a:07:3e:a1:a3:06:0d:01:50:82: 42:ed:15:61:ae:d1:12:34:e1:f7:0d:6c:78:0e:9c:08: 78:75:d8:1d:2c:1b:da:03:e9:8e:fb:15:72:46:1f:16: 64:96:58:b3:00:87:13:ec:7d:ba:00:3b:4a:fa:97:96: 9e:c6:af:dd:70:11:2b:61:a9:28:9c:b4:8f:e0:94:3a: 60:db:98:14:dc:9c:91:01:79:c0:6d:fd:3a:05:fe:1c: c1:5a:0e:c8:b6:e4:b1:0e:cb:ac:d7:9c:73:56:de:ec: c8:57:4a:3f:78:2c:90:50:9f:a1:04:8a:db:95:0d:8d Fingerprint (SHA-256): 69:1A:CA:53:47:9A:81:0B:E2:14:71:DF:35:99:8F:D6:44:55:0A:A9:C3:A1:D6:D6:C9:30:1F:16:79:65:15:E8 Fingerprint (SHA1): FF:0F:03:66:10:B3:01:57:3C:75:7F:69:FC:65:D6:75:1B:01:0D:1C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #15059: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15060: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15061: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092886 (0x6715dd6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 15:20:57 2016 Not After : Fri Jan 08 15:20:57 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:71:9d:0a:13:0f:e9:07:ed:e7:1c:10:3c:08:74:60: 6c:fe:c5:60:ea:5c:36:92:7b:b4:1a:59:a5:98:80:18: 3b:60:d9:c1:6d:25:c5:41:64:e1:e8:c5:ab:ff:5f:5f: ed:36:eb:26:1b:68:5f:03:96:93:74:33:64:cd:b3:c3: 4d:89:01:68:fa:ff:ee:b8:34:87:57:34:e0:87:f2:99: ac:8b:c6:2c:07:55:2c:e6:e5:55:e4:a2:41:84:c9:c1: e7:5e:a9:8e:2e:6d:ea:14:7b:c1:0c:1f:d5:05:63:98: 26:2b:a1:da:08:e4:ab:91:fb:bd:d0:6c:a0:9f:87:28: f0:19:29:ad:0e:92:bc:d3:d0:9b:bc:a8:3d:88:1b:6e: 3d:dd:8f:a5:59:a0:1a:b9:4b:11:45:5c:21:f6:27:e6: d3:c9:d6:4c:1a:d7:20:da:33:9a:95:ef:51:3d:bd:60: b3:d5:0b:0f:56:75:0d:2c:e5:63:5f:a4:be:ff:8d:a1: 1c:50:d3:ba:61:96:18:19:ec:71:61:67:3a:52:3b:9e: cd:86:54:7f:a8:d7:cd:64:25:0c:96:51:6a:31:7c:ba: 08:be:5c:04:f1:8d:d4:b0:53:19:d2:63:83:71:50:20: 6d:c3:f8:d2:37:c3:c8:45:8f:46:17:64:62:19:f8:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:09:71:3c:b2:01:3a:ae:f7:c7:6a:9c:f5:ab:10:e5: 10:b2:86:98:b2:23:be:36:87:8e:bb:3d:22:0c:43:55: 44:23:b7:c5:b3:50:6c:56:bc:3c:fd:02:71:d7:4a:5c: a5:a3:af:b2:3c:53:64:cf:26:8f:9f:98:ac:ac:4e:1c: 88:21:62:14:2a:f2:53:bf:77:44:49:54:ad:4d:d3:4f: 0e:53:b1:aa:9b:1a:68:c4:bc:e5:ce:72:bc:d9:7b:f3: 93:00:45:bd:00:a3:65:e3:79:8b:f8:70:a7:42:e7:23: d2:2a:14:20:a4:ab:c7:57:a0:e6:0e:5d:a2:65:f3:eb: 10:ee:89:31:94:3f:a0:25:a8:1f:2e:f1:b2:70:53:6d: 8f:64:3f:be:0d:df:5e:c1:40:49:8d:3f:f7:d7:6f:59: 8a:d0:42:23:51:b1:dd:17:f8:5a:ff:0b:e6:4b:d2:bc: f8:9d:9e:ab:73:4e:a1:cb:b9:e6:7f:c6:8c:51:64:ee: 27:8e:90:c4:54:b0:d0:13:58:89:6e:5d:15:23:9b:65: c7:9f:26:3d:4d:da:ce:5a:70:ff:54:1d:ba:df:38:82: bc:3f:9f:cd:44:15:0f:62:47:ec:0c:14:0e:4e:17:a3: a2:4e:8e:61:0f:9c:b4:66:37:19:6c:e7:6f:ab:05:b3 Fingerprint (SHA-256): 11:87:D6:E6:1A:C1:BC:A9:58:32:0A:68:BC:6E:66:03:D0:96:CB:00:C4:02:7F:5F:22:CB:46:7C:4D:3B:83:FF Fingerprint (SHA1): 7F:29:71:99:13:6B:78:9F:B1:97:EA:2A:B5:8A:14:58:A5:26:2F:B9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #15062: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15063: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092889 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15064: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15065: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15066: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15067: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108092890 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15068: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15069: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15070: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15071: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108092891 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA1Root-108092668.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15072: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15073: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #15074: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15075: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108092892 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15076: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15077: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #15078: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092889 (0x6715dd9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:21:35 2016 Not After : Fri Jan 08 15:21:35 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f0:4b:3f:08:9d:82:74:b3:8e:cd:fb:f4:e2:a3:4f:92: fc:98:4c:3d:bf:f1:3e:2c:38:3e:9b:c4:85:56:b1:1d: 82:75:cb:99:21:93:6d:df:10:c6:e2:33:e7:22:01:52: a7:81:53:e9:c0:c2:e7:85:80:ac:dc:50:13:f6:af:5a: 7c:bb:78:4f:22:ad:f2:38:7d:e8:d2:5e:35:36:79:d7: d8:36:30:0a:27:d2:0f:11:4e:20:cd:c6:19:25:f1:c1: bc:03:a3:12:a7:be:23:54:69:b8:a6:d9:84:74:a2:60: f7:1c:e7:8c:34:be:16:90:4b:38:67:6f:f6:fb:85:b9: d1:76:26:73:a1:b3:7b:76:ab:ad:76:c5:ba:f2:aa:49: a5:49:88:44:93:80:72:ab:66:ac:a1:39:cd:8d:92:56: 18:4a:b1:48:45:9c:05:86:30:78:57:67:34:fc:07:b9: e7:e1:5a:60:ca:5e:b7:4d:e9:30:8e:bf:e8:3e:2c:b0: 99:14:a6:0e:f5:92:89:93:e0:0e:5f:3a:34:10:83:a1: 04:96:bc:55:4a:d2:79:5e:38:50:5c:da:8d:12:42:1f: ac:86:08:1d:55:66:2d:a6:17:f1:52:cb:58:b1:c6:cb: 3b:24:85:d8:f1:69:10:ed:7c:69:e0:77:ba:5a:06:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:e5:9e:fa:02:8e:43:3c:b7:8b:6f:fc:ba:32:e9:f6: 36:5b:49:18:19:4d:05:85:96:12:7c:14:7d:a9:c3:e5: 9e:ca:cd:83:0e:a0:c5:bc:4c:5e:1b:57:2d:9e:88:94: 2f:ba:c9:6c:2b:a1:bc:a0:e4:dd:07:a9:67:25:cf:3c: 86:4e:8b:d5:39:86:9f:59:8f:66:59:1c:19:b2:b4:0f: 07:01:15:e2:fc:be:81:87:e5:7d:91:26:75:05:bf:a6: 0f:05:a1:44:e8:52:93:32:35:e9:4f:76:ac:5b:c2:8c: d2:4a:34:eb:f3:67:24:b2:ed:8b:a1:27:dd:66:fb:48: 60:c7:f2:dd:57:68:1a:49:43:7b:1b:73:97:21:98:70: 82:c0:42:de:2e:04:ae:21:3e:81:92:5e:b3:2a:69:5c: d2:ac:54:d6:10:20:a5:f2:f6:e2:59:51:e0:63:4c:f4: fa:b4:27:f3:c2:b9:ec:cf:83:f2:90:a3:68:ed:3d:f1: e6:82:c7:d3:ae:7a:33:6f:69:6c:40:d7:15:4c:55:a4: 1f:2d:d9:8b:6f:6e:88:e3:e1:1c:e9:98:67:1d:c7:fd: 92:05:4c:48:3f:4b:e2:b2:cd:88:54:3a:98:16:4c:5e: fd:b5:c2:2c:8e:ff:b8:a9:2a:8a:5f:75:82:c6:e2:3f Fingerprint (SHA-256): E0:07:97:53:05:A7:37:04:26:2E:4E:38:B5:3C:01:E5:67:82:38:07:74:B4:DC:19:83:47:BC:4E:FB:9D:1E:3B Fingerprint (SHA1): 42:02:89:5C:E6:A4:1F:BF:81:2D:77:F6:35:41:A1:1C:D3:B5:61:B6 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15079: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #15080: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092893 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15081: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #15082: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #15083: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092894 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15084: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #15085: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #15086: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15087: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108092895 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15088: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15089: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108092896 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15090: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15091: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #15092: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15093: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15094: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108092897 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-Bridge-108092669.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15095: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15096: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15097: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15098: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108092898 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15099: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15100: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #15101: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092893 (0x6715ddd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 15:22:30 2016 Not After : Fri Jan 08 15:22:30 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:a6:17:77:34:97:8a:f0:bb:ca:e8:09:a6:22:55:b5: 13:dd:8a:9b:0c:0d:3d:54:bc:9f:18:f9:5c:3e:d0:6a: 0e:60:71:98:3c:ad:f2:aa:f1:0d:7b:72:4f:bc:f7:c3: af:8d:dc:ea:f5:60:16:20:dc:b9:62:e1:fb:16:53:3d: 6d:84:ce:d4:8b:c4:51:0e:62:f7:91:f5:a7:a7:7f:38: 7a:90:25:59:ff:3c:dc:6d:52:d8:60:ae:bf:85:d0:4d: b1:f1:b2:9a:5b:53:10:f0:f0:53:bf:33:0d:db:6e:7f: 7e:5f:d9:53:f3:24:81:64:56:a5:e0:16:5e:8b:ad:19: 16:79:7f:cf:27:13:2a:41:b5:38:64:7d:7a:65:70:2f: 6b:3c:b0:40:21:08:10:fc:5d:83:c6:d2:aa:22:3e:e9: 8b:fd:f8:6e:46:8c:7e:84:c6:34:78:61:96:50:b6:08: 8a:d4:a9:ad:38:f9:08:a2:c7:84:8f:3e:9b:f9:b9:5d: 6d:cf:80:6d:e6:b1:01:62:ee:68:00:6d:ca:b0:f4:11: 75:46:54:b5:b4:58:42:b2:77:d3:fa:cd:b5:0a:4a:6c: 4d:b3:50:49:aa:36:22:69:81:28:85:48:59:bd:62:45: 1a:50:6d:62:ad:07:f0:d7:89:4f:22:1f:79:7e:58:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:e4:64:0e:29:e3:6f:84:3c:5b:0e:9b:69:99:00:4c: 43:22:4c:fd:67:56:73:2c:dc:0a:c4:06:94:b8:b3:e7: 37:c9:13:42:f0:e0:47:fd:41:47:d8:85:e4:6a:e5:1e: 8d:05:32:37:bf:a1:9c:01:a4:92:ec:4f:3d:3f:ad:a5: cc:c9:84:7c:3a:d9:1d:d3:d2:91:65:00:5a:3b:dc:34: be:0f:1d:cc:17:25:4b:ea:8e:03:f3:8b:89:bf:64:4f: 65:9e:5c:17:b5:2e:18:39:b7:06:d0:49:b3:57:eb:0e: d6:c8:8d:35:92:d6:d2:ec:6c:00:a4:49:69:7b:04:61: e2:57:12:11:54:bf:1f:76:b8:d2:3e:cb:50:9d:08:95: 54:c6:38:4f:c5:cf:18:b3:95:40:d9:5f:41:a9:e5:78: ed:39:34:0e:37:eb:ee:e1:a4:ca:17:f9:6c:eb:31:71: 45:48:7e:03:e5:13:2d:6d:4e:2d:a3:70:09:13:28:69: f0:7b:cd:86:20:72:c8:6e:4d:e1:5a:14:14:ee:ff:8f: b6:0d:46:f7:56:22:43:eb:94:0b:1e:63:e7:e6:dd:bb: 98:80:bc:e0:fb:17:af:01:bb:ea:af:db:86:3c:8b:b6: 19:34:6d:d7:c2:bf:7a:59:71:4d:39:48:4b:b9:07:56 Fingerprint (SHA-256): 60:B6:97:6A:CE:0C:54:FE:52:6B:57:DF:4D:3E:21:1E:DC:0D:3A:22:B5:3F:F6:4C:30:00:B0:91:25:34:03:D0 Fingerprint (SHA1): 05:34:1F:F3:30:0C:0C:23:17:2A:AB:7B:4E:A4:13:18:5E:79:36:8B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15102: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092894 (0x6715dde) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 15:22:45 2016 Not After : Fri Jan 08 15:22:45 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:3b:70:42:41:72:e8:6c:93:05:7d:ca:e1:9e:40:1e: 4c:17:4a:7e:de:8e:50:99:8f:93:da:35:37:55:fa:21: b0:c6:36:22:96:82:94:14:dd:89:9d:86:18:3b:d4:93: 11:0a:96:d0:90:d0:7c:61:37:a2:2c:d0:1d:3f:25:35: fa:c7:01:35:df:51:ac:9f:90:75:0c:43:6e:df:92:ec: 91:1b:8d:f2:1f:1a:ae:04:f6:8a:aa:65:8b:e5:70:01: 6e:78:ae:8e:95:92:4a:50:3a:0d:e9:48:c0:81:ee:dc: 97:0c:b5:9a:03:7a:24:0c:09:9a:fa:b1:45:06:26:19: ed:39:27:20:fe:09:07:ab:62:33:d7:b2:df:4d:31:c5: 8a:1a:ed:38:48:3b:91:21:09:59:f1:b8:4d:78:c0:06: ad:99:8b:d5:36:94:0f:b3:38:d9:fa:ed:4f:45:ec:68: e6:15:2a:e1:6f:23:b3:74:a2:5a:69:3d:e6:80:fc:2a: 95:19:7d:01:c2:26:56:7a:bb:55:ec:8d:cc:04:7c:55: 7d:4e:ba:58:62:86:14:83:54:6d:0f:67:96:d4:11:5d: c9:7d:fb:64:dc:31:97:f1:38:15:0c:0e:57:0e:6d:15: 5c:8e:3f:fc:0c:16:e7:38:e3:a3:3c:55:03:fe:56:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:31:58:dd:05:df:d2:e1:3a:0a:7a:f3:99:59:e2:b5: aa:b1:7a:bf:80:db:11:0e:71:eb:d8:e5:f5:8f:5f:66: de:41:5e:4b:e3:c3:60:15:f6:e6:0d:fb:6e:b9:b8:15: 13:2a:80:ba:8c:04:d5:21:9b:ec:9a:c3:29:31:03:c6: ba:15:78:9f:75:64:30:36:05:23:bb:f6:37:f2:5a:de: 30:d2:f6:a5:03:67:fe:b9:1d:4a:68:25:b1:86:e5:dc: 20:51:80:dc:cc:bc:c1:4a:2a:e8:76:e2:b5:cf:f4:a4: 16:89:d7:3e:23:22:d4:56:75:49:49:da:03:e2:45:ce: 41:bd:da:73:e0:0e:da:3f:89:f2:a6:42:a1:d0:f5:8d: d2:d0:72:80:7a:77:db:4f:81:bd:0e:3e:fe:be:5b:40: 01:31:5b:28:75:46:ef:f9:95:88:4d:54:be:d1:27:5f: 22:4e:38:92:27:18:60:d8:5a:69:09:53:04:92:9f:b5: 0e:14:fd:32:d2:dd:dd:94:c1:60:e6:85:6a:46:10:05: 50:26:b1:99:ef:03:97:4b:4c:bc:26:24:be:5b:4f:b9: a2:c2:f7:7b:f9:86:4f:70:3d:40:64:9c:58:1a:f6:83: 4e:23:dc:fc:a5:5c:fb:be:a2:fc:ed:cf:1c:10:34:68 Fingerprint (SHA-256): F5:9B:42:01:F4:80:B6:7F:74:9F:C5:50:BB:4D:F3:BD:CC:C8:71:6F:BC:0B:E0:55:6C:19:25:9F:B8:5C:1C:00 Fingerprint (SHA1): FB:BC:66:B8:72:1C:EF:C4:29:3B:2E:FC:08:F0:2F:46:C6:66:63:A3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15103: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092894 (0x6715dde) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 15:22:45 2016 Not After : Fri Jan 08 15:22:45 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:3b:70:42:41:72:e8:6c:93:05:7d:ca:e1:9e:40:1e: 4c:17:4a:7e:de:8e:50:99:8f:93:da:35:37:55:fa:21: b0:c6:36:22:96:82:94:14:dd:89:9d:86:18:3b:d4:93: 11:0a:96:d0:90:d0:7c:61:37:a2:2c:d0:1d:3f:25:35: fa:c7:01:35:df:51:ac:9f:90:75:0c:43:6e:df:92:ec: 91:1b:8d:f2:1f:1a:ae:04:f6:8a:aa:65:8b:e5:70:01: 6e:78:ae:8e:95:92:4a:50:3a:0d:e9:48:c0:81:ee:dc: 97:0c:b5:9a:03:7a:24:0c:09:9a:fa:b1:45:06:26:19: ed:39:27:20:fe:09:07:ab:62:33:d7:b2:df:4d:31:c5: 8a:1a:ed:38:48:3b:91:21:09:59:f1:b8:4d:78:c0:06: ad:99:8b:d5:36:94:0f:b3:38:d9:fa:ed:4f:45:ec:68: e6:15:2a:e1:6f:23:b3:74:a2:5a:69:3d:e6:80:fc:2a: 95:19:7d:01:c2:26:56:7a:bb:55:ec:8d:cc:04:7c:55: 7d:4e:ba:58:62:86:14:83:54:6d:0f:67:96:d4:11:5d: c9:7d:fb:64:dc:31:97:f1:38:15:0c:0e:57:0e:6d:15: 5c:8e:3f:fc:0c:16:e7:38:e3:a3:3c:55:03:fe:56:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:31:58:dd:05:df:d2:e1:3a:0a:7a:f3:99:59:e2:b5: aa:b1:7a:bf:80:db:11:0e:71:eb:d8:e5:f5:8f:5f:66: de:41:5e:4b:e3:c3:60:15:f6:e6:0d:fb:6e:b9:b8:15: 13:2a:80:ba:8c:04:d5:21:9b:ec:9a:c3:29:31:03:c6: ba:15:78:9f:75:64:30:36:05:23:bb:f6:37:f2:5a:de: 30:d2:f6:a5:03:67:fe:b9:1d:4a:68:25:b1:86:e5:dc: 20:51:80:dc:cc:bc:c1:4a:2a:e8:76:e2:b5:cf:f4:a4: 16:89:d7:3e:23:22:d4:56:75:49:49:da:03:e2:45:ce: 41:bd:da:73:e0:0e:da:3f:89:f2:a6:42:a1:d0:f5:8d: d2:d0:72:80:7a:77:db:4f:81:bd:0e:3e:fe:be:5b:40: 01:31:5b:28:75:46:ef:f9:95:88:4d:54:be:d1:27:5f: 22:4e:38:92:27:18:60:d8:5a:69:09:53:04:92:9f:b5: 0e:14:fd:32:d2:dd:dd:94:c1:60:e6:85:6a:46:10:05: 50:26:b1:99:ef:03:97:4b:4c:bc:26:24:be:5b:4f:b9: a2:c2:f7:7b:f9:86:4f:70:3d:40:64:9c:58:1a:f6:83: 4e:23:dc:fc:a5:5c:fb:be:a2:fc:ed:cf:1c:10:34:68 Fingerprint (SHA-256): F5:9B:42:01:F4:80:B6:7F:74:9F:C5:50:BB:4D:F3:BD:CC:C8:71:6F:BC:0B:E0:55:6C:19:25:9F:B8:5C:1C:00 Fingerprint (SHA1): FB:BC:66:B8:72:1C:EF:C4:29:3B:2E:FC:08:F0:2F:46:C6:66:63:A3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15104: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #15105: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092899 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15106: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #15107: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #15108: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092900 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15109: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #15110: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #15111: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15112: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108092901 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15113: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15114: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108092902 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15115: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15116: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #15117: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15118: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15119: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108092903 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-Bridge-108092670.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15120: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15121: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15122: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15123: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108092904 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15124: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15125: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15126: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15127: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108092905 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-BridgeNavy-108092671.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15128: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15129: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15130: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15131: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108092906 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15132: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15133: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #15134: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092899 (0x6715de3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 15:23:37 2016 Not After : Fri Jan 08 15:23:37 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:9e:96:2c:46:57:f4:7d:fc:b9:85:1e:5f:96:84:95: 10:8e:c2:d1:e1:f9:56:62:30:c1:4b:a5:a9:c5:85:55: a2:11:06:bd:7d:37:07:1e:fc:ac:62:c4:12:1e:00:7c: 7c:68:22:8e:cd:7b:e2:46:b4:7f:af:28:af:f6:95:83: 26:e0:53:09:7e:60:8b:af:6e:ce:08:0f:ad:28:db:49: 97:8a:61:10:5b:10:53:8d:b6:ab:38:78:77:f5:cc:8b: 7f:1d:b8:33:c5:a2:78:bb:8f:b4:2b:22:93:a3:b0:40: 78:5b:9a:3d:64:1a:ed:f0:9d:b0:b5:e4:7c:6a:54:71: 0f:a0:bf:48:b2:41:cd:ed:02:f4:c0:61:d6:fa:7c:16: c6:50:f9:18:ae:94:69:4a:15:11:39:1e:89:dc:9d:b1: a3:16:81:91:15:aa:8f:ae:aa:6a:3a:64:f2:ae:68:ae: 9e:34:2c:92:d4:44:a4:b8:ae:2d:9d:34:f2:84:9c:47: bf:69:2b:7b:22:c0:0e:e2:f9:7f:8f:03:6f:2e:73:dd: 78:84:23:b6:1b:16:0c:b0:7d:86:b7:ed:5f:6c:cc:59: f7:a1:b0:1b:3e:81:4a:fe:e3:44:80:16:17:f2:62:1c: 55:e3:49:c2:4a:86:9d:57:fd:78:e3:21:78:fd:06:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:72:a1:8c:b5:72:ff:88:e0:44:97:59:2e:44:06:a2: 9a:ac:b8:d6:8b:7a:50:8a:dc:5d:4e:be:5d:9d:f1:fc: 1e:0f:4d:6d:40:31:4b:32:5a:c5:92:82:d8:c9:c0:48: 6b:fa:35:5c:7f:58:e3:9e:22:0e:6e:06:4d:0f:c0:5b: d6:10:de:f1:76:b7:b2:6f:0b:44:53:23:6e:c7:eb:4b: 2e:a0:73:a5:ce:aa:b0:8a:01:5e:6a:f4:13:03:f8:3a: ea:ea:7c:cb:a8:b9:59:fc:04:cb:70:f0:51:e1:fe:fe: ce:c2:a5:e5:0f:65:fb:60:61:5e:3c:a5:78:3c:03:63: c0:61:f6:2d:41:9e:95:55:67:02:53:49:4b:84:91:ca: 4c:18:1b:6c:e8:fa:8d:df:21:c8:09:48:14:95:6e:14: 7c:fe:f0:28:f0:9b:a2:d0:d4:c3:93:fd:50:e7:0f:1d: 7b:08:3d:65:31:43:63:4e:52:d9:49:45:5a:32:9a:1d: 18:34:31:ac:8b:03:cf:24:a1:6a:b0:19:7a:7c:e2:ea: 78:c0:6e:00:87:52:61:18:23:a5:be:51:de:9b:94:eb: b0:a2:0b:40:50:3b:99:a9:05:6c:53:75:e8:cf:2a:c5: 59:f6:35:f6:c5:ee:09:28:6d:a7:c1:85:86:fc:1d:1d Fingerprint (SHA-256): 68:69:0F:A2:7C:65:60:95:B9:30:A7:5A:96:4C:CA:53:9B:B8:5A:57:0F:44:BA:3E:07:77:40:86:A4:DF:22:C5 Fingerprint (SHA1): 2C:F1:A0:1C:B2:9D:20:B3:9E:58:CF:13:AB:3A:FE:06:B8:65:0E:C8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15135: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092900 (0x6715de4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 15:23:50 2016 Not After : Fri Jan 08 15:23:50 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:86:f6:f4:b9:11:1f:98:22:c2:bb:49:28:b8:df:7c: 1c:bf:a4:5f:ce:77:af:d9:85:4c:9b:76:f3:78:d4:72: 02:b8:e2:76:f2:27:21:88:e2:34:26:e7:91:6d:92:b9: 8c:a3:d2:88:3a:98:75:80:32:c9:87:e8:4f:f2:3e:40: 9a:b3:7b:6b:c9:72:54:69:03:18:d7:b2:9a:22:59:ea: 6d:0b:2b:0c:47:7c:7b:09:a9:ae:c6:a5:05:60:67:13: e5:53:cc:1b:20:75:26:25:e5:fb:49:f6:67:85:c1:42: bf:84:b8:c7:98:85:ee:dc:85:00:1a:f4:2f:45:50:84: 9e:d4:7f:c6:8d:01:d9:83:62:e2:9e:2d:db:f7:6a:a6: fa:de:27:bf:12:64:9e:b0:13:06:cb:a8:f5:56:dc:ef: fb:ca:e6:dd:a0:c6:ca:03:ce:11:c8:83:c9:48:1c:2f: 79:e4:e2:32:e8:5f:8b:f9:1e:66:c1:21:7f:24:16:54: f6:60:0f:73:34:5a:e2:a9:a3:b1:d7:fa:f5:33:8d:3a: 3a:e1:8b:71:bc:76:cb:92:b2:28:a5:1c:83:f9:02:db: 7f:fd:f0:f9:5c:c2:a4:4f:91:7c:df:e4:2f:d9:eb:c2: db:93:60:5d:1d:fa:5f:ab:b3:02:8f:34:1a:8e:33:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:1b:dc:ed:d6:dc:84:20:ca:98:36:8d:51:4c:17:fc: 02:ac:03:ea:04:43:89:ee:c1:9c:3a:61:14:27:b9:57: 31:46:01:37:04:e2:f8:4a:8b:a3:41:54:86:78:ce:e1: 40:a7:80:57:b1:c7:f0:1d:48:5b:0d:94:ec:5d:1a:5e: b6:b1:d7:30:49:05:c4:07:a0:49:25:c6:2c:28:49:ce: a9:b5:ba:76:65:eb:a9:59:59:f7:15:71:f8:fa:01:72: 33:b1:00:68:cc:32:1d:ac:e4:f4:c7:01:95:ef:5e:16: c3:09:88:7c:62:ba:7f:d6:24:ee:28:e6:9b:e3:8b:d9: d5:05:cc:19:1d:1e:e9:7b:0b:1c:da:d3:c0:00:a7:1d: 79:10:56:04:99:b9:50:20:d5:c2:10:c4:0b:39:d8:98: 48:53:cd:f5:ba:cf:96:65:e0:db:57:83:11:06:7e:e7: d5:5a:bb:4b:cc:2e:7d:02:2e:a3:d8:dc:5b:a3:01:c9: 7d:87:13:6f:7d:aa:95:a3:d2:7f:84:e2:8d:4e:87:44: a9:a7:33:79:c0:5b:9f:27:ef:2a:6a:6b:25:03:01:4f: 67:74:af:ed:8e:84:b7:2e:df:dc:c9:a6:39:8e:d8:3f: bb:ec:7b:f3:6d:14:2b:cc:e2:e3:fa:ac:89:89:c2:33 Fingerprint (SHA-256): C1:2B:3F:4A:46:63:BA:9D:D2:58:BD:12:A7:16:A7:90:46:5E:97:FF:47:69:9E:A7:BC:C6:75:C7:08:2A:C7:DD Fingerprint (SHA1): 52:27:1E:00:23:0F:BE:04:3D:14:8F:FC:47:64:94:09:89:80:2E:1B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15136: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092900 (0x6715de4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 15:23:50 2016 Not After : Fri Jan 08 15:23:50 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:86:f6:f4:b9:11:1f:98:22:c2:bb:49:28:b8:df:7c: 1c:bf:a4:5f:ce:77:af:d9:85:4c:9b:76:f3:78:d4:72: 02:b8:e2:76:f2:27:21:88:e2:34:26:e7:91:6d:92:b9: 8c:a3:d2:88:3a:98:75:80:32:c9:87:e8:4f:f2:3e:40: 9a:b3:7b:6b:c9:72:54:69:03:18:d7:b2:9a:22:59:ea: 6d:0b:2b:0c:47:7c:7b:09:a9:ae:c6:a5:05:60:67:13: e5:53:cc:1b:20:75:26:25:e5:fb:49:f6:67:85:c1:42: bf:84:b8:c7:98:85:ee:dc:85:00:1a:f4:2f:45:50:84: 9e:d4:7f:c6:8d:01:d9:83:62:e2:9e:2d:db:f7:6a:a6: fa:de:27:bf:12:64:9e:b0:13:06:cb:a8:f5:56:dc:ef: fb:ca:e6:dd:a0:c6:ca:03:ce:11:c8:83:c9:48:1c:2f: 79:e4:e2:32:e8:5f:8b:f9:1e:66:c1:21:7f:24:16:54: f6:60:0f:73:34:5a:e2:a9:a3:b1:d7:fa:f5:33:8d:3a: 3a:e1:8b:71:bc:76:cb:92:b2:28:a5:1c:83:f9:02:db: 7f:fd:f0:f9:5c:c2:a4:4f:91:7c:df:e4:2f:d9:eb:c2: db:93:60:5d:1d:fa:5f:ab:b3:02:8f:34:1a:8e:33:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:1b:dc:ed:d6:dc:84:20:ca:98:36:8d:51:4c:17:fc: 02:ac:03:ea:04:43:89:ee:c1:9c:3a:61:14:27:b9:57: 31:46:01:37:04:e2:f8:4a:8b:a3:41:54:86:78:ce:e1: 40:a7:80:57:b1:c7:f0:1d:48:5b:0d:94:ec:5d:1a:5e: b6:b1:d7:30:49:05:c4:07:a0:49:25:c6:2c:28:49:ce: a9:b5:ba:76:65:eb:a9:59:59:f7:15:71:f8:fa:01:72: 33:b1:00:68:cc:32:1d:ac:e4:f4:c7:01:95:ef:5e:16: c3:09:88:7c:62:ba:7f:d6:24:ee:28:e6:9b:e3:8b:d9: d5:05:cc:19:1d:1e:e9:7b:0b:1c:da:d3:c0:00:a7:1d: 79:10:56:04:99:b9:50:20:d5:c2:10:c4:0b:39:d8:98: 48:53:cd:f5:ba:cf:96:65:e0:db:57:83:11:06:7e:e7: d5:5a:bb:4b:cc:2e:7d:02:2e:a3:d8:dc:5b:a3:01:c9: 7d:87:13:6f:7d:aa:95:a3:d2:7f:84:e2:8d:4e:87:44: a9:a7:33:79:c0:5b:9f:27:ef:2a:6a:6b:25:03:01:4f: 67:74:af:ed:8e:84:b7:2e:df:dc:c9:a6:39:8e:d8:3f: bb:ec:7b:f3:6d:14:2b:cc:e2:e3:fa:ac:89:89:c2:33 Fingerprint (SHA-256): C1:2B:3F:4A:46:63:BA:9D:D2:58:BD:12:A7:16:A7:90:46:5E:97:FF:47:69:9E:A7:BC:C6:75:C7:08:2A:C7:DD Fingerprint (SHA1): 52:27:1E:00:23:0F:BE:04:3D:14:8F:FC:47:64:94:09:89:80:2E:1B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15137: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #15138: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092899 (0x6715de3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 15:23:37 2016 Not After : Fri Jan 08 15:23:37 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:9e:96:2c:46:57:f4:7d:fc:b9:85:1e:5f:96:84:95: 10:8e:c2:d1:e1:f9:56:62:30:c1:4b:a5:a9:c5:85:55: a2:11:06:bd:7d:37:07:1e:fc:ac:62:c4:12:1e:00:7c: 7c:68:22:8e:cd:7b:e2:46:b4:7f:af:28:af:f6:95:83: 26:e0:53:09:7e:60:8b:af:6e:ce:08:0f:ad:28:db:49: 97:8a:61:10:5b:10:53:8d:b6:ab:38:78:77:f5:cc:8b: 7f:1d:b8:33:c5:a2:78:bb:8f:b4:2b:22:93:a3:b0:40: 78:5b:9a:3d:64:1a:ed:f0:9d:b0:b5:e4:7c:6a:54:71: 0f:a0:bf:48:b2:41:cd:ed:02:f4:c0:61:d6:fa:7c:16: c6:50:f9:18:ae:94:69:4a:15:11:39:1e:89:dc:9d:b1: a3:16:81:91:15:aa:8f:ae:aa:6a:3a:64:f2:ae:68:ae: 9e:34:2c:92:d4:44:a4:b8:ae:2d:9d:34:f2:84:9c:47: bf:69:2b:7b:22:c0:0e:e2:f9:7f:8f:03:6f:2e:73:dd: 78:84:23:b6:1b:16:0c:b0:7d:86:b7:ed:5f:6c:cc:59: f7:a1:b0:1b:3e:81:4a:fe:e3:44:80:16:17:f2:62:1c: 55:e3:49:c2:4a:86:9d:57:fd:78:e3:21:78:fd:06:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:72:a1:8c:b5:72:ff:88:e0:44:97:59:2e:44:06:a2: 9a:ac:b8:d6:8b:7a:50:8a:dc:5d:4e:be:5d:9d:f1:fc: 1e:0f:4d:6d:40:31:4b:32:5a:c5:92:82:d8:c9:c0:48: 6b:fa:35:5c:7f:58:e3:9e:22:0e:6e:06:4d:0f:c0:5b: d6:10:de:f1:76:b7:b2:6f:0b:44:53:23:6e:c7:eb:4b: 2e:a0:73:a5:ce:aa:b0:8a:01:5e:6a:f4:13:03:f8:3a: ea:ea:7c:cb:a8:b9:59:fc:04:cb:70:f0:51:e1:fe:fe: ce:c2:a5:e5:0f:65:fb:60:61:5e:3c:a5:78:3c:03:63: c0:61:f6:2d:41:9e:95:55:67:02:53:49:4b:84:91:ca: 4c:18:1b:6c:e8:fa:8d:df:21:c8:09:48:14:95:6e:14: 7c:fe:f0:28:f0:9b:a2:d0:d4:c3:93:fd:50:e7:0f:1d: 7b:08:3d:65:31:43:63:4e:52:d9:49:45:5a:32:9a:1d: 18:34:31:ac:8b:03:cf:24:a1:6a:b0:19:7a:7c:e2:ea: 78:c0:6e:00:87:52:61:18:23:a5:be:51:de:9b:94:eb: b0:a2:0b:40:50:3b:99:a9:05:6c:53:75:e8:cf:2a:c5: 59:f6:35:f6:c5:ee:09:28:6d:a7:c1:85:86:fc:1d:1d Fingerprint (SHA-256): 68:69:0F:A2:7C:65:60:95:B9:30:A7:5A:96:4C:CA:53:9B:B8:5A:57:0F:44:BA:3E:07:77:40:86:A4:DF:22:C5 Fingerprint (SHA1): 2C:F1:A0:1C:B2:9D:20:B3:9E:58:CF:13:AB:3A:FE:06:B8:65:0E:C8 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15139: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092900 (0x6715de4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 15:23:50 2016 Not After : Fri Jan 08 15:23:50 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:86:f6:f4:b9:11:1f:98:22:c2:bb:49:28:b8:df:7c: 1c:bf:a4:5f:ce:77:af:d9:85:4c:9b:76:f3:78:d4:72: 02:b8:e2:76:f2:27:21:88:e2:34:26:e7:91:6d:92:b9: 8c:a3:d2:88:3a:98:75:80:32:c9:87:e8:4f:f2:3e:40: 9a:b3:7b:6b:c9:72:54:69:03:18:d7:b2:9a:22:59:ea: 6d:0b:2b:0c:47:7c:7b:09:a9:ae:c6:a5:05:60:67:13: e5:53:cc:1b:20:75:26:25:e5:fb:49:f6:67:85:c1:42: bf:84:b8:c7:98:85:ee:dc:85:00:1a:f4:2f:45:50:84: 9e:d4:7f:c6:8d:01:d9:83:62:e2:9e:2d:db:f7:6a:a6: fa:de:27:bf:12:64:9e:b0:13:06:cb:a8:f5:56:dc:ef: fb:ca:e6:dd:a0:c6:ca:03:ce:11:c8:83:c9:48:1c:2f: 79:e4:e2:32:e8:5f:8b:f9:1e:66:c1:21:7f:24:16:54: f6:60:0f:73:34:5a:e2:a9:a3:b1:d7:fa:f5:33:8d:3a: 3a:e1:8b:71:bc:76:cb:92:b2:28:a5:1c:83:f9:02:db: 7f:fd:f0:f9:5c:c2:a4:4f:91:7c:df:e4:2f:d9:eb:c2: db:93:60:5d:1d:fa:5f:ab:b3:02:8f:34:1a:8e:33:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:1b:dc:ed:d6:dc:84:20:ca:98:36:8d:51:4c:17:fc: 02:ac:03:ea:04:43:89:ee:c1:9c:3a:61:14:27:b9:57: 31:46:01:37:04:e2:f8:4a:8b:a3:41:54:86:78:ce:e1: 40:a7:80:57:b1:c7:f0:1d:48:5b:0d:94:ec:5d:1a:5e: b6:b1:d7:30:49:05:c4:07:a0:49:25:c6:2c:28:49:ce: a9:b5:ba:76:65:eb:a9:59:59:f7:15:71:f8:fa:01:72: 33:b1:00:68:cc:32:1d:ac:e4:f4:c7:01:95:ef:5e:16: c3:09:88:7c:62:ba:7f:d6:24:ee:28:e6:9b:e3:8b:d9: d5:05:cc:19:1d:1e:e9:7b:0b:1c:da:d3:c0:00:a7:1d: 79:10:56:04:99:b9:50:20:d5:c2:10:c4:0b:39:d8:98: 48:53:cd:f5:ba:cf:96:65:e0:db:57:83:11:06:7e:e7: d5:5a:bb:4b:cc:2e:7d:02:2e:a3:d8:dc:5b:a3:01:c9: 7d:87:13:6f:7d:aa:95:a3:d2:7f:84:e2:8d:4e:87:44: a9:a7:33:79:c0:5b:9f:27:ef:2a:6a:6b:25:03:01:4f: 67:74:af:ed:8e:84:b7:2e:df:dc:c9:a6:39:8e:d8:3f: bb:ec:7b:f3:6d:14:2b:cc:e2:e3:fa:ac:89:89:c2:33 Fingerprint (SHA-256): C1:2B:3F:4A:46:63:BA:9D:D2:58:BD:12:A7:16:A7:90:46:5E:97:FF:47:69:9E:A7:BC:C6:75:C7:08:2A:C7:DD Fingerprint (SHA1): 52:27:1E:00:23:0F:BE:04:3D:14:8F:FC:47:64:94:09:89:80:2E:1B Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15140: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092900 (0x6715de4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 15:23:50 2016 Not After : Fri Jan 08 15:23:50 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:86:f6:f4:b9:11:1f:98:22:c2:bb:49:28:b8:df:7c: 1c:bf:a4:5f:ce:77:af:d9:85:4c:9b:76:f3:78:d4:72: 02:b8:e2:76:f2:27:21:88:e2:34:26:e7:91:6d:92:b9: 8c:a3:d2:88:3a:98:75:80:32:c9:87:e8:4f:f2:3e:40: 9a:b3:7b:6b:c9:72:54:69:03:18:d7:b2:9a:22:59:ea: 6d:0b:2b:0c:47:7c:7b:09:a9:ae:c6:a5:05:60:67:13: e5:53:cc:1b:20:75:26:25:e5:fb:49:f6:67:85:c1:42: bf:84:b8:c7:98:85:ee:dc:85:00:1a:f4:2f:45:50:84: 9e:d4:7f:c6:8d:01:d9:83:62:e2:9e:2d:db:f7:6a:a6: fa:de:27:bf:12:64:9e:b0:13:06:cb:a8:f5:56:dc:ef: fb:ca:e6:dd:a0:c6:ca:03:ce:11:c8:83:c9:48:1c:2f: 79:e4:e2:32:e8:5f:8b:f9:1e:66:c1:21:7f:24:16:54: f6:60:0f:73:34:5a:e2:a9:a3:b1:d7:fa:f5:33:8d:3a: 3a:e1:8b:71:bc:76:cb:92:b2:28:a5:1c:83:f9:02:db: 7f:fd:f0:f9:5c:c2:a4:4f:91:7c:df:e4:2f:d9:eb:c2: db:93:60:5d:1d:fa:5f:ab:b3:02:8f:34:1a:8e:33:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:1b:dc:ed:d6:dc:84:20:ca:98:36:8d:51:4c:17:fc: 02:ac:03:ea:04:43:89:ee:c1:9c:3a:61:14:27:b9:57: 31:46:01:37:04:e2:f8:4a:8b:a3:41:54:86:78:ce:e1: 40:a7:80:57:b1:c7:f0:1d:48:5b:0d:94:ec:5d:1a:5e: b6:b1:d7:30:49:05:c4:07:a0:49:25:c6:2c:28:49:ce: a9:b5:ba:76:65:eb:a9:59:59:f7:15:71:f8:fa:01:72: 33:b1:00:68:cc:32:1d:ac:e4:f4:c7:01:95:ef:5e:16: c3:09:88:7c:62:ba:7f:d6:24:ee:28:e6:9b:e3:8b:d9: d5:05:cc:19:1d:1e:e9:7b:0b:1c:da:d3:c0:00:a7:1d: 79:10:56:04:99:b9:50:20:d5:c2:10:c4:0b:39:d8:98: 48:53:cd:f5:ba:cf:96:65:e0:db:57:83:11:06:7e:e7: d5:5a:bb:4b:cc:2e:7d:02:2e:a3:d8:dc:5b:a3:01:c9: 7d:87:13:6f:7d:aa:95:a3:d2:7f:84:e2:8d:4e:87:44: a9:a7:33:79:c0:5b:9f:27:ef:2a:6a:6b:25:03:01:4f: 67:74:af:ed:8e:84:b7:2e:df:dc:c9:a6:39:8e:d8:3f: bb:ec:7b:f3:6d:14:2b:cc:e2:e3:fa:ac:89:89:c2:33 Fingerprint (SHA-256): C1:2B:3F:4A:46:63:BA:9D:D2:58:BD:12:A7:16:A7:90:46:5E:97:FF:47:69:9E:A7:BC:C6:75:C7:08:2A:C7:DD Fingerprint (SHA1): 52:27:1E:00:23:0F:BE:04:3D:14:8F:FC:47:64:94:09:89:80:2E:1B Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15141: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #15142: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092907 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15143: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #15144: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #15145: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092908 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15146: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #15147: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #15148: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15149: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 108092909 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15150: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15151: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #15152: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15153: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 108092910 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15154: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15155: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #15156: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15157: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 108092911 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #15158: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15159: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 108092912 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #15160: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15161: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #15162: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15163: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15164: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108092913 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15165: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15166: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15167: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15168: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108092914 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15169: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15170: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15171: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15172: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108092915 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15173: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15174: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15175: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15176: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108092916 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15177: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15178: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15179: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092907 (0x6715deb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 15:25:06 2016 Not After : Fri Jan 08 15:25:06 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:87:3c:a6:3c:5e:8b:6c:87:2f:44:24:94:1b:d7:3e: db:09:5f:56:cd:66:37:17:0c:0b:a0:e2:b2:f4:ca:78: c0:f3:5f:86:06:ee:0f:72:ee:8d:d3:ca:76:b4:db:5a: c8:1d:08:3f:4f:72:f9:a8:8e:05:d5:09:22:d2:e5:03: 29:93:b9:33:43:9b:8d:f1:0e:97:b8:3c:b0:2f:ce:b6: ee:14:8c:63:3f:db:93:84:97:90:93:ee:30:ed:25:f1: c0:8d:af:c4:ce:1d:96:2e:1f:03:47:fc:b1:d9:4b:ba: 4c:6d:dc:66:ae:7d:80:ca:43:62:e5:6f:15:3d:aa:8b: a7:b3:ff:2e:76:a9:07:0d:c4:1b:77:1b:4a:5e:4c:b3: f9:19:18:27:88:20:ea:65:79:48:e1:88:98:c6:c2:93: 81:e5:76:6c:69:eb:a8:ee:27:05:64:08:be:28:28:16: f4:d3:35:71:8f:24:69:4a:4a:2b:04:f0:1d:45:34:a3: ef:44:6e:a1:a5:8e:1f:cb:39:93:db:dd:09:80:49:53: 5a:e9:0a:6b:00:df:ef:c5:2e:38:92:6d:00:a9:2c:ba: b0:d2:fa:79:09:ca:e1:98:70:24:fd:2f:d1:5f:3a:0b: e6:6f:42:7d:ca:c7:11:5b:52:7c:c5:f2:89:91:6e:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:f0:b9:6a:cb:29:a0:6b:f0:83:8f:b4:07:9a:50:95: d3:81:7d:30:4c:17:46:c2:94:3c:d8:0c:b5:dd:9b:9e: d8:06:91:5e:44:bc:fb:0a:5f:93:8c:80:25:05:eb:f4: a9:da:cf:cd:f1:b6:3f:ac:c6:2f:6c:4c:d1:d8:a1:aa: 83:28:20:50:e9:3a:d7:ab:e5:72:2d:e3:90:4a:ce:99: 78:2b:21:16:72:ca:0e:ec:cc:56:1a:b3:7a:9b:82:d2: ab:13:30:66:73:0d:38:52:b7:a5:0b:a0:4d:a7:da:9b: 76:51:48:e7:bf:2c:90:cf:94:d9:bf:8a:06:24:b3:81: 6b:42:2c:49:20:f9:81:d8:de:12:8b:c9:02:71:8d:e4: cb:35:f0:6c:8d:0c:0c:b3:96:69:59:c0:71:ac:8e:db: b4:cf:5e:e7:ac:f5:01:aa:88:58:94:0e:6e:3c:eb:2d: e9:bb:67:32:04:e9:da:67:47:bd:11:37:e5:84:cc:65: 2a:ea:93:5a:0e:18:71:10:66:eb:69:7f:a5:c8:32:c2: bc:8d:e9:54:b8:04:ed:59:3a:3b:50:43:d6:6f:a8:85: 74:d0:47:4e:56:79:a9:ac:ee:79:13:8b:71:89:a5:17: af:ed:9f:eb:8e:dd:4c:ba:83:ac:86:75:54:f3:03:01 Fingerprint (SHA-256): 2F:6A:39:CC:66:14:75:06:64:09:DE:1E:7F:15:63:E9:A1:3F:6A:41:2A:E9:7C:2B:74:77:24:C8:D2:D7:6E:0B Fingerprint (SHA1): E6:3B:D8:79:5A:E3:5F:AE:BB:3A:F0:AE:E8:C1:1F:7A:9E:F2:75:4C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #15180: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15181: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15182: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15183: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15184: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15185: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15186: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15187: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15188: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092908 (0x6715dec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 15:25:12 2016 Not After : Fri Jan 08 15:25:12 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:dd:e3:c4:b5:a6:57:a5:1b:4f:91:56:18:90:4a:dd: c4:17:eb:55:71:56:99:e9:4b:a5:d2:b9:23:34:9b:17: 01:b8:54:aa:8f:3b:0c:4a:d2:1a:cd:88:85:11:2e:c4: 47:70:d3:18:76:73:01:28:11:35:eb:8e:22:86:9d:da: 64:83:51:c4:a7:c8:b1:9b:a0:ce:ed:f0:29:45:43:d5: 7c:de:67:dd:37:05:d7:ed:d0:1d:2e:99:a6:28:f0:90: 61:4a:65:c5:66:04:43:4b:de:4a:8e:9c:57:f4:c4:1d: 49:31:66:18:46:68:7e:60:93:22:32:ae:32:e2:49:8f: 1b:f7:fe:37:86:03:aa:01:bc:28:3e:5a:a0:a0:94:5f: e7:b6:aa:b1:c3:f8:9c:1b:54:eb:83:67:c2:3f:bc:d1: 25:e8:b8:a4:fc:5b:92:02:4a:cf:03:92:7f:aa:b6:96: 77:bb:80:b9:7f:97:55:32:9f:61:50:83:83:8c:41:26: a3:ec:1e:e5:b9:57:bf:19:84:1a:ce:d4:6d:4a:b4:08: dd:e0:c5:f8:ce:27:0a:41:ae:bd:a0:78:ad:3d:22:94: 55:6f:98:bc:41:3b:bf:2a:c9:97:db:b7:f4:84:ec:57: 36:74:e8:6a:83:ea:48:7f:54:4d:15:49:1f:af:2e:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:75:b9:44:54:e3:ba:3a:1b:93:c0:74:2a:f2:14:8f: 6d:9a:8d:98:e9:63:88:45:0b:5e:29:5f:12:dd:54:46: dd:09:74:ae:16:d8:8b:ec:d7:90:e5:8b:7c:de:a9:60: c0:15:71:0d:36:43:86:a3:06:9b:a2:38:db:74:e5:d4: 97:b2:82:9f:65:2a:ec:2a:85:54:1e:b2:8a:f1:3e:7c: 34:94:16:28:48:96:a1:52:56:ba:83:a1:66:7e:a1:fe: 94:31:de:7c:a8:ef:bb:67:55:ef:76:d8:59:25:c2:1b: 07:82:35:ab:a2:58:18:74:77:e3:48:a7:30:6c:2e:24: bd:7c:36:f9:fb:5c:0d:e5:2c:c4:4d:72:22:1f:c0:be: 62:ba:18:58:83:92:e5:f1:18:e8:a3:73:84:3f:fb:e3: d0:b0:1b:bd:d0:4f:f4:00:1c:8b:72:a2:fb:d6:a9:dd: 3b:1c:13:d4:ee:57:b8:5a:e4:f6:04:7e:e3:1d:1d:f6: 6b:0b:ca:d3:c7:c4:33:af:56:f2:eb:06:07:5c:3a:22: 2c:53:78:29:d0:0b:eb:45:fa:86:46:44:92:c4:9f:5b: ad:52:9a:e0:00:8a:b5:ac:39:42:c9:26:7e:10:d0:d0: 66:8d:a1:6c:b2:47:08:7f:49:c8:06:60:ce:9b:10:43 Fingerprint (SHA-256): B2:62:76:C6:58:14:26:FA:8D:DC:B7:C7:01:9A:6B:75:B3:AF:DC:CE:18:C5:DD:B9:16:5F:40:1A:39:92:CB:63 Fingerprint (SHA1): 7F:9F:CD:C2:B5:51:D5:59:2A:56:C1:DB:0E:AF:C6:F6:55:AD:D1:4B Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #15189: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15190: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15191: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15192: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15193: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15194: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15195: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #15196: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #15197: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #15198: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #15199: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #15200: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #15201: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #15202: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #15203: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #15204: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #15205: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #15206: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15207: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092917 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15208: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15209: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15210: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15211: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108092918 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15212: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15213: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15214: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15215: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108092919 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15216: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15217: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15218: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15219: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 108092920 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15220: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15221: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15222: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15223: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108092921 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15224: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15225: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #15226: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15227: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 108092922 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15228: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15229: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #15230: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15231: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 108092923 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15232: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15233: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #15234: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15235: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 108092924 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15236: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15237: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #15238: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15239: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 108092925 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15240: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15241: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15242: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092917 (0x6715df5) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:27:24 2016 Not After : Fri Jan 08 15:27:24 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 10:a4:18:73:c0:66:aa:73:08:46:88:4e:68:ad:fd:4a: b0:a3:1e:5a:c5:5f:21:82:5d:2f:e0:e9:0f:2b:5b:f9: 6c:7a:77:7d:85:74:45:15:d3:9f:0f:22:67:7b:14:36: c7:61:0e:ee:16:c4:ad:54:40:41:a8:48:17:77:80:f8: ba:f2:47:2d:30:56:6f:df:da:5d:c3:64:49:d8:f0:a0: 04:6d:a6:a2:8e:5c:80:b6:a4:58:f7:54:35:60:a7:88: ff:ad:f3:43:e2:42:88:4b:9b:51:01:1b:14:a6:e4:2c: a9:31:5f:a6:84:a1:f8:96:c5:43:35:63:ee:ec:88:87: c9:80:a9:6f:a9:75:ca:e3:ee:39:c9:d2:33:37:2b:10: 4f:fe:03:27:95:ba:40:25:f7:7d:72:85:d1:3c:f4:39: 5e:55:b3:aa:cc:57:49:50:7d:26:7b:58:62:00:e3:0f: de:ee:4e:63:92:d2:a3:db:aa:1e:62:0a:f0:2a:36:f3: 46:62:5d:21:34:68:46:87:a6:17:d9:9b:da:c7:05:9f: 49:3e:77:d6:e9:56:65:85:b4:5e:30:ae:ab:94:f3:13: b7:a5:25:2f:f7:f2:2f:e2:1b:f4:1c:94:2d:17:cc:00: de:69:3c:34:74:0e:a7:bc:48:d0:1d:95:10:55:e2:c7 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:6a:18:0b:dd:36:5c:a0:38:28:a2:4f:db: 71:e9:77:45:3e:b7:67:6b:7a:8c:29:aa:9d:ff:b1:5e: 02:1d:00:c9:d0:61:93:88:64:18:61:c4:95:64:e0:93: a5:39:98:2a:8a:1e:70:03:12:a2:3a:6f:4f:80:b9 Fingerprint (SHA-256): 19:F9:9B:26:C7:11:8B:D7:9D:88:91:90:74:B5:3E:C7:36:F3:8B:5B:60:F8:D3:91:47:B7:9C:6A:2B:2B:E1:84 Fingerprint (SHA1): E9:2E:94:58:CC:12:68:2D:F0:A9:9D:C3:3F:E2:64:16:FE:A2:84:54 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15243: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092917 (0x6715df5) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:27:24 2016 Not After : Fri Jan 08 15:27:24 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 10:a4:18:73:c0:66:aa:73:08:46:88:4e:68:ad:fd:4a: b0:a3:1e:5a:c5:5f:21:82:5d:2f:e0:e9:0f:2b:5b:f9: 6c:7a:77:7d:85:74:45:15:d3:9f:0f:22:67:7b:14:36: c7:61:0e:ee:16:c4:ad:54:40:41:a8:48:17:77:80:f8: ba:f2:47:2d:30:56:6f:df:da:5d:c3:64:49:d8:f0:a0: 04:6d:a6:a2:8e:5c:80:b6:a4:58:f7:54:35:60:a7:88: ff:ad:f3:43:e2:42:88:4b:9b:51:01:1b:14:a6:e4:2c: a9:31:5f:a6:84:a1:f8:96:c5:43:35:63:ee:ec:88:87: c9:80:a9:6f:a9:75:ca:e3:ee:39:c9:d2:33:37:2b:10: 4f:fe:03:27:95:ba:40:25:f7:7d:72:85:d1:3c:f4:39: 5e:55:b3:aa:cc:57:49:50:7d:26:7b:58:62:00:e3:0f: de:ee:4e:63:92:d2:a3:db:aa:1e:62:0a:f0:2a:36:f3: 46:62:5d:21:34:68:46:87:a6:17:d9:9b:da:c7:05:9f: 49:3e:77:d6:e9:56:65:85:b4:5e:30:ae:ab:94:f3:13: b7:a5:25:2f:f7:f2:2f:e2:1b:f4:1c:94:2d:17:cc:00: de:69:3c:34:74:0e:a7:bc:48:d0:1d:95:10:55:e2:c7 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:6a:18:0b:dd:36:5c:a0:38:28:a2:4f:db: 71:e9:77:45:3e:b7:67:6b:7a:8c:29:aa:9d:ff:b1:5e: 02:1d:00:c9:d0:61:93:88:64:18:61:c4:95:64:e0:93: a5:39:98:2a:8a:1e:70:03:12:a2:3a:6f:4f:80:b9 Fingerprint (SHA-256): 19:F9:9B:26:C7:11:8B:D7:9D:88:91:90:74:B5:3E:C7:36:F3:8B:5B:60:F8:D3:91:47:B7:9C:6A:2B:2B:E1:84 Fingerprint (SHA1): E9:2E:94:58:CC:12:68:2D:F0:A9:9D:C3:3F:E2:64:16:FE:A2:84:54 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #15244: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092917 (0x6715df5) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:27:24 2016 Not After : Fri Jan 08 15:27:24 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 10:a4:18:73:c0:66:aa:73:08:46:88:4e:68:ad:fd:4a: b0:a3:1e:5a:c5:5f:21:82:5d:2f:e0:e9:0f:2b:5b:f9: 6c:7a:77:7d:85:74:45:15:d3:9f:0f:22:67:7b:14:36: c7:61:0e:ee:16:c4:ad:54:40:41:a8:48:17:77:80:f8: ba:f2:47:2d:30:56:6f:df:da:5d:c3:64:49:d8:f0:a0: 04:6d:a6:a2:8e:5c:80:b6:a4:58:f7:54:35:60:a7:88: ff:ad:f3:43:e2:42:88:4b:9b:51:01:1b:14:a6:e4:2c: a9:31:5f:a6:84:a1:f8:96:c5:43:35:63:ee:ec:88:87: c9:80:a9:6f:a9:75:ca:e3:ee:39:c9:d2:33:37:2b:10: 4f:fe:03:27:95:ba:40:25:f7:7d:72:85:d1:3c:f4:39: 5e:55:b3:aa:cc:57:49:50:7d:26:7b:58:62:00:e3:0f: de:ee:4e:63:92:d2:a3:db:aa:1e:62:0a:f0:2a:36:f3: 46:62:5d:21:34:68:46:87:a6:17:d9:9b:da:c7:05:9f: 49:3e:77:d6:e9:56:65:85:b4:5e:30:ae:ab:94:f3:13: b7:a5:25:2f:f7:f2:2f:e2:1b:f4:1c:94:2d:17:cc:00: de:69:3c:34:74:0e:a7:bc:48:d0:1d:95:10:55:e2:c7 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:6a:18:0b:dd:36:5c:a0:38:28:a2:4f:db: 71:e9:77:45:3e:b7:67:6b:7a:8c:29:aa:9d:ff:b1:5e: 02:1d:00:c9:d0:61:93:88:64:18:61:c4:95:64:e0:93: a5:39:98:2a:8a:1e:70:03:12:a2:3a:6f:4f:80:b9 Fingerprint (SHA-256): 19:F9:9B:26:C7:11:8B:D7:9D:88:91:90:74:B5:3E:C7:36:F3:8B:5B:60:F8:D3:91:47:B7:9C:6A:2B:2B:E1:84 Fingerprint (SHA1): E9:2E:94:58:CC:12:68:2D:F0:A9:9D:C3:3F:E2:64:16:FE:A2:84:54 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #15245: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092917 (0x6715df5) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:27:24 2016 Not After : Fri Jan 08 15:27:24 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 10:a4:18:73:c0:66:aa:73:08:46:88:4e:68:ad:fd:4a: b0:a3:1e:5a:c5:5f:21:82:5d:2f:e0:e9:0f:2b:5b:f9: 6c:7a:77:7d:85:74:45:15:d3:9f:0f:22:67:7b:14:36: c7:61:0e:ee:16:c4:ad:54:40:41:a8:48:17:77:80:f8: ba:f2:47:2d:30:56:6f:df:da:5d:c3:64:49:d8:f0:a0: 04:6d:a6:a2:8e:5c:80:b6:a4:58:f7:54:35:60:a7:88: ff:ad:f3:43:e2:42:88:4b:9b:51:01:1b:14:a6:e4:2c: a9:31:5f:a6:84:a1:f8:96:c5:43:35:63:ee:ec:88:87: c9:80:a9:6f:a9:75:ca:e3:ee:39:c9:d2:33:37:2b:10: 4f:fe:03:27:95:ba:40:25:f7:7d:72:85:d1:3c:f4:39: 5e:55:b3:aa:cc:57:49:50:7d:26:7b:58:62:00:e3:0f: de:ee:4e:63:92:d2:a3:db:aa:1e:62:0a:f0:2a:36:f3: 46:62:5d:21:34:68:46:87:a6:17:d9:9b:da:c7:05:9f: 49:3e:77:d6:e9:56:65:85:b4:5e:30:ae:ab:94:f3:13: b7:a5:25:2f:f7:f2:2f:e2:1b:f4:1c:94:2d:17:cc:00: de:69:3c:34:74:0e:a7:bc:48:d0:1d:95:10:55:e2:c7 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:6a:18:0b:dd:36:5c:a0:38:28:a2:4f:db: 71:e9:77:45:3e:b7:67:6b:7a:8c:29:aa:9d:ff:b1:5e: 02:1d:00:c9:d0:61:93:88:64:18:61:c4:95:64:e0:93: a5:39:98:2a:8a:1e:70:03:12:a2:3a:6f:4f:80:b9 Fingerprint (SHA-256): 19:F9:9B:26:C7:11:8B:D7:9D:88:91:90:74:B5:3E:C7:36:F3:8B:5B:60:F8:D3:91:47:B7:9C:6A:2B:2B:E1:84 Fingerprint (SHA1): E9:2E:94:58:CC:12:68:2D:F0:A9:9D:C3:3F:E2:64:16:FE:A2:84:54 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #15246: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15247: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15248: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15249: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #15250: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15251: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15252: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15253: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15254: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15255: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15256: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15257: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #15258: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15259: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15260: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15261: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #15262: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15263: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15264: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15265: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15266: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15267: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15268: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15269: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #15270: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15271: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15272: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15273: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108153026Z nextupdate=20170108153026Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 15:30:26 2016 Next Update: Sun Jan 08 15:30:26 2017 CRL Extensions: chains.sh: #15274: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108153027Z nextupdate=20170108153027Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 15:30:27 2016 Next Update: Sun Jan 08 15:30:27 2017 CRL Extensions: chains.sh: #15275: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108153027Z nextupdate=20170108153027Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 15:30:27 2016 Next Update: Sun Jan 08 15:30:27 2017 CRL Extensions: chains.sh: #15276: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108153028Z nextupdate=20170108153028Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 15:30:28 2016 Next Update: Sun Jan 08 15:30:28 2017 CRL Extensions: chains.sh: #15277: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108153029Z addcert 14 20160108153029Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 15:30:29 2016 Next Update: Sun Jan 08 15:30:27 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Jan 08 15:30:29 2016 CRL Extensions: chains.sh: #15278: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108153030Z addcert 15 20160108153030Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 15:30:30 2016 Next Update: Sun Jan 08 15:30:27 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Jan 08 15:30:30 2016 CRL Extensions: chains.sh: #15279: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15280: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15281: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #15282: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #15283: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #15284: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #15285: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #15286: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #15287: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #15288: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:29:05 2016 Not After : Fri Jan 08 15:29:05 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:a4:25:3a:a0:9c:c0:71:e4:83:b0:b6:f6:62:eb:e1: 41:77:54:a0:3c:b3:98:8f:24:3e:ef:00:f3:8d:91:19: fa:14:d0:c0:93:67:41:21:8b:11:ce:ef:97:d6:c5:55: 5e:e6:57:ad:40:54:43:d2:4d:3c:c8:9f:0d:fa:56:c1: e3:24:a4:f6:d1:3d:19:60:d7:20:de:6a:57:35:e6:5b: d6:d5:97:d5:e9:d8:f5:4b:b5:9a:0e:39:76:39:0e:23: 5e:f5:60:ab:05:66:d4:d3:c8:7f:dd:ea:9b:c6:fa:9a: f9:a1:39:1b:0e:e2:c5:6e:93:f3:f9:e6:a4:7e:87:3d: 4b:20:ed:0f:a5:4b:82:36:2f:cb:fe:65:d0:06:87:65: 0b:19:a8:82:1f:80:d6:71:ed:fa:14:41:b6:94:68:af: 13:8f:3d:9d:54:e2:a0:f2:f1:b6:2b:1b:ff:a8:5f:7c: e0:f6:8a:4d:05:45:1b:97:7e:eb:4b:a8:58:9d:6c:38: 89:27:95:2e:9f:70:35:06:68:3c:8d:46:d5:e9:cc:20: c6:1d:24:89:45:6e:4d:64:aa:76:ea:e3:0c:70:e7:3c: dd:96:a4:a2:9a:d9:04:99:f8:48:81:bd:bf:4f:fe:ac: e6:da:af:15:08:4b:e5:2d:39:b4:e0:27:1e:f7:df:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cb:94:63:bc:10:7f:94:45:15:11:56:a4:5a:5d:e0:50: c0:8c:0a:6d:23:63:31:82:82:b9:c8:41:6b:4c:53:46: 23:d9:42:9f:d0:71:60:d5:43:97:d8:75:c7:53:bb:23: dd:39:77:4b:d8:cd:95:36:6a:9d:f7:8d:38:7d:26:82: d4:4d:5c:a6:28:d0:75:86:aa:16:95:5e:6f:64:33:82: 97:ff:83:c8:07:1a:e5:a8:b6:f8:47:4b:9e:0a:82:50: 3d:94:f5:5d:b3:83:00:05:8d:9f:e8:f4:b0:d9:66:7c: 17:c1:48:75:08:3d:2a:d2:2e:40:58:6d:5f:1b:ef:da: 93:40:28:bc:51:d4:06:f0:86:39:5d:96:09:5c:d9:6e: e3:95:15:1e:a3:6a:03:50:d2:e1:cf:ad:8d:42:08:23: 60:87:75:9d:51:1c:dc:94:25:3a:93:66:d1:0e:a3:5e: 8f:fa:0b:15:cb:c2:a6:22:25:a2:3d:5e:7f:95:37:ea: 07:42:d2:d0:c9:b2:62:30:1c:a2:e7:42:84:86:bb:9a: 98:af:bc:66:ab:0b:a3:ef:a0:af:c6:d3:3a:c6:12:ef: ac:79:ed:b7:04:3e:ed:2e:32:47:50:65:7f:d3:4c:81: fa:ca:a7:27:8b:37:be:56:d2:50:49:6e:ff:29:97:1e Fingerprint (SHA-256): 13:80:55:D8:30:CF:1B:13:1F:61:52:D0:EA:70:31:D3:A0:76:15:40:06:C1:BA:D0:94:09:57:47:EC:14:D3:02 Fingerprint (SHA1): 56:37:C4:0A:B7:79:B4:CA:06:5E:D0:48:A7:34:10:9E:43:38:63:50 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #15289: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #15290: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:29:05 2016 Not After : Fri Jan 08 15:29:05 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:a4:25:3a:a0:9c:c0:71:e4:83:b0:b6:f6:62:eb:e1: 41:77:54:a0:3c:b3:98:8f:24:3e:ef:00:f3:8d:91:19: fa:14:d0:c0:93:67:41:21:8b:11:ce:ef:97:d6:c5:55: 5e:e6:57:ad:40:54:43:d2:4d:3c:c8:9f:0d:fa:56:c1: e3:24:a4:f6:d1:3d:19:60:d7:20:de:6a:57:35:e6:5b: d6:d5:97:d5:e9:d8:f5:4b:b5:9a:0e:39:76:39:0e:23: 5e:f5:60:ab:05:66:d4:d3:c8:7f:dd:ea:9b:c6:fa:9a: f9:a1:39:1b:0e:e2:c5:6e:93:f3:f9:e6:a4:7e:87:3d: 4b:20:ed:0f:a5:4b:82:36:2f:cb:fe:65:d0:06:87:65: 0b:19:a8:82:1f:80:d6:71:ed:fa:14:41:b6:94:68:af: 13:8f:3d:9d:54:e2:a0:f2:f1:b6:2b:1b:ff:a8:5f:7c: e0:f6:8a:4d:05:45:1b:97:7e:eb:4b:a8:58:9d:6c:38: 89:27:95:2e:9f:70:35:06:68:3c:8d:46:d5:e9:cc:20: c6:1d:24:89:45:6e:4d:64:aa:76:ea:e3:0c:70:e7:3c: dd:96:a4:a2:9a:d9:04:99:f8:48:81:bd:bf:4f:fe:ac: e6:da:af:15:08:4b:e5:2d:39:b4:e0:27:1e:f7:df:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cb:94:63:bc:10:7f:94:45:15:11:56:a4:5a:5d:e0:50: c0:8c:0a:6d:23:63:31:82:82:b9:c8:41:6b:4c:53:46: 23:d9:42:9f:d0:71:60:d5:43:97:d8:75:c7:53:bb:23: dd:39:77:4b:d8:cd:95:36:6a:9d:f7:8d:38:7d:26:82: d4:4d:5c:a6:28:d0:75:86:aa:16:95:5e:6f:64:33:82: 97:ff:83:c8:07:1a:e5:a8:b6:f8:47:4b:9e:0a:82:50: 3d:94:f5:5d:b3:83:00:05:8d:9f:e8:f4:b0:d9:66:7c: 17:c1:48:75:08:3d:2a:d2:2e:40:58:6d:5f:1b:ef:da: 93:40:28:bc:51:d4:06:f0:86:39:5d:96:09:5c:d9:6e: e3:95:15:1e:a3:6a:03:50:d2:e1:cf:ad:8d:42:08:23: 60:87:75:9d:51:1c:dc:94:25:3a:93:66:d1:0e:a3:5e: 8f:fa:0b:15:cb:c2:a6:22:25:a2:3d:5e:7f:95:37:ea: 07:42:d2:d0:c9:b2:62:30:1c:a2:e7:42:84:86:bb:9a: 98:af:bc:66:ab:0b:a3:ef:a0:af:c6:d3:3a:c6:12:ef: ac:79:ed:b7:04:3e:ed:2e:32:47:50:65:7f:d3:4c:81: fa:ca:a7:27:8b:37:be:56:d2:50:49:6e:ff:29:97:1e Fingerprint (SHA-256): 13:80:55:D8:30:CF:1B:13:1F:61:52:D0:EA:70:31:D3:A0:76:15:40:06:C1:BA:D0:94:09:57:47:EC:14:D3:02 Fingerprint (SHA1): 56:37:C4:0A:B7:79:B4:CA:06:5E:D0:48:A7:34:10:9E:43:38:63:50 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #15291: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #15292: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15293: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092926 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15294: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15295: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #15296: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15297: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 108092927 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15298: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15299: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15300: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108092698.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15301: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108092672.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15302: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15303: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #15304: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108092698.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15305: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 108092928 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15306: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15307: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15308: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108092698.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15309: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108092673.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15310: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15311: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #15312: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15313: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 108092929 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15314: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15315: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15316: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108092698.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15317: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108092674.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15318: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15319: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15320: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0-108092698.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15321: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9601/localhost-18586-CA0Root-108092675.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15322: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15323: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108153240Z nextupdate=20170108153240Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 15:32:40 2016 Next Update: Sun Jan 08 15:32:40 2017 CRL Extensions: chains.sh: #15324: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108153240Z nextupdate=20170108153240Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 15:32:40 2016 Next Update: Sun Jan 08 15:32:40 2017 CRL Extensions: chains.sh: #15325: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108153241Z nextupdate=20170108153241Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 15:32:41 2016 Next Update: Sun Jan 08 15:32:41 2017 CRL Extensions: chains.sh: #15326: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108153242Z nextupdate=20170108153242Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 15:32:42 2016 Next Update: Sun Jan 08 15:32:42 2017 CRL Extensions: chains.sh: #15327: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108153243Z addcert 20 20160108153243Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 15:32:43 2016 Next Update: Sun Jan 08 15:32:40 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 15:32:43 2016 CRL Extensions: chains.sh: #15328: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108153244Z addcert 40 20160108153244Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 15:32:44 2016 Next Update: Sun Jan 08 15:32:40 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 15:32:43 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 15:32:44 2016 CRL Extensions: chains.sh: #15329: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15330: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15331: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #15332: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092926 (0x6715dfe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:30:50 2016 Not After : Fri Jan 08 15:30:50 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:62:18:b8:53:64:4d:aa:4a:73:bc:8e:7d:2c:cf:bb: e0:f6:45:43:d8:87:a2:a6:06:2c:12:48:c5:d8:07:50: da:72:80:55:5f:7e:1d:1d:e7:85:be:a5:52:14:fc:5f: 69:70:f8:0f:b4:ce:7c:1d:2a:e5:38:93:0b:06:f3:f1: 81:12:77:53:ba:95:de:c7:86:7b:a1:14:bf:77:ad:fd: be:d2:d6:9e:30:df:83:99:0f:72:26:da:b7:70:6a:58: 5b:c2:ef:64:64:0d:65:48:15:ef:cc:71:a5:e2:a1:88: 45:48:bc:3a:b2:43:da:8d:f6:b9:80:df:b0:bb:64:1f: 80:30:4a:13:42:c8:09:14:b4:b1:d8:b1:08:bc:8c:d7: ee:ec:c9:ed:54:59:75:3c:4a:80:84:f2:1e:09:c1:a2: 2b:24:e0:a5:86:ce:c3:db:8d:b3:82:a4:7a:b9:23:c8: 9e:a0:a4:a0:f8:b9:bc:44:04:8a:be:50:cd:17:cb:20: 06:a4:2d:86:af:68:d3:89:84:7c:cb:6e:6f:27:f4:bf: cd:b8:a1:0e:61:a0:20:94:fd:dc:60:3f:05:fb:23:ed: 6e:b5:67:c6:2b:82:d2:49:93:fb:5c:ad:8d:37:3a:08: 3e:5f:59:c9:2c:17:f1:e9:b0:31:bc:5a:23:40:c5:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:1d:03:47:fd:27:7e:29:97:be:47:d3:87:0f:25:3c: 5f:65:c7:cc:fd:eb:a9:52:5b:48:6b:4e:1c:91:93:be: 97:4b:8d:6c:e9:57:c1:d3:a4:5e:9e:d5:41:ba:e7:29: 8f:8d:f5:46:86:93:e3:a0:4c:5e:fa:23:8d:59:9b:18: 5e:78:ad:f5:24:c2:7f:94:39:24:ae:4f:1d:3b:ee:1a: bb:cd:f8:64:0c:70:c6:bf:a4:e2:47:6d:63:dd:2c:44: 40:07:46:6b:27:c2:62:7b:9a:eb:b6:2f:02:f6:ef:d5: ce:87:6d:1d:b4:72:d2:09:8e:4c:86:0d:b7:3a:4d:54: 9d:6f:cd:4c:8c:62:8a:72:df:d9:09:24:ca:de:04:b0: 31:c6:70:ed:79:5c:3a:76:d3:1f:51:77:52:bf:1f:4c: 2c:d7:a7:9e:92:c9:cf:ff:0e:dc:8c:77:50:6a:41:be: d7:ec:31:49:99:07:f0:9a:4f:fd:35:24:23:58:32:13: 55:cb:f6:25:62:44:0f:10:15:f1:62:a8:38:1e:31:92: 9b:90:8f:35:46:28:c1:1a:f6:ec:35:b2:8b:56:37:32: 1d:7f:6f:13:2f:e1:55:27:91:3c:5c:99:6b:a8:7f:58: b0:fc:96:54:61:14:d4:54:ae:dd:7a:5d:be:44:88:d6 Fingerprint (SHA-256): 8A:39:22:FD:C4:38:E6:18:5E:EF:3E:F2:E4:60:EC:BF:15:59:DC:EA:20:F0:5B:08:1D:E3:29:59:7E:2A:D8:31 Fingerprint (SHA1): DE:D3:09:2B:60:D0:51:82:33:49:2D:19:54:84:AE:CE:E6:84:17:53 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #15333: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #15334: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092926 (0x6715dfe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 15:30:50 2016 Not After : Fri Jan 08 15:30:50 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:62:18:b8:53:64:4d:aa:4a:73:bc:8e:7d:2c:cf:bb: e0:f6:45:43:d8:87:a2:a6:06:2c:12:48:c5:d8:07:50: da:72:80:55:5f:7e:1d:1d:e7:85:be:a5:52:14:fc:5f: 69:70:f8:0f:b4:ce:7c:1d:2a:e5:38:93:0b:06:f3:f1: 81:12:77:53:ba:95:de:c7:86:7b:a1:14:bf:77:ad:fd: be:d2:d6:9e:30:df:83:99:0f:72:26:da:b7:70:6a:58: 5b:c2:ef:64:64:0d:65:48:15:ef:cc:71:a5:e2:a1:88: 45:48:bc:3a:b2:43:da:8d:f6:b9:80:df:b0:bb:64:1f: 80:30:4a:13:42:c8:09:14:b4:b1:d8:b1:08:bc:8c:d7: ee:ec:c9:ed:54:59:75:3c:4a:80:84:f2:1e:09:c1:a2: 2b:24:e0:a5:86:ce:c3:db:8d:b3:82:a4:7a:b9:23:c8: 9e:a0:a4:a0:f8:b9:bc:44:04:8a:be:50:cd:17:cb:20: 06:a4:2d:86:af:68:d3:89:84:7c:cb:6e:6f:27:f4:bf: cd:b8:a1:0e:61:a0:20:94:fd:dc:60:3f:05:fb:23:ed: 6e:b5:67:c6:2b:82:d2:49:93:fb:5c:ad:8d:37:3a:08: 3e:5f:59:c9:2c:17:f1:e9:b0:31:bc:5a:23:40:c5:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:1d:03:47:fd:27:7e:29:97:be:47:d3:87:0f:25:3c: 5f:65:c7:cc:fd:eb:a9:52:5b:48:6b:4e:1c:91:93:be: 97:4b:8d:6c:e9:57:c1:d3:a4:5e:9e:d5:41:ba:e7:29: 8f:8d:f5:46:86:93:e3:a0:4c:5e:fa:23:8d:59:9b:18: 5e:78:ad:f5:24:c2:7f:94:39:24:ae:4f:1d:3b:ee:1a: bb:cd:f8:64:0c:70:c6:bf:a4:e2:47:6d:63:dd:2c:44: 40:07:46:6b:27:c2:62:7b:9a:eb:b6:2f:02:f6:ef:d5: ce:87:6d:1d:b4:72:d2:09:8e:4c:86:0d:b7:3a:4d:54: 9d:6f:cd:4c:8c:62:8a:72:df:d9:09:24:ca:de:04:b0: 31:c6:70:ed:79:5c:3a:76:d3:1f:51:77:52:bf:1f:4c: 2c:d7:a7:9e:92:c9:cf:ff:0e:dc:8c:77:50:6a:41:be: d7:ec:31:49:99:07:f0:9a:4f:fd:35:24:23:58:32:13: 55:cb:f6:25:62:44:0f:10:15:f1:62:a8:38:1e:31:92: 9b:90:8f:35:46:28:c1:1a:f6:ec:35:b2:8b:56:37:32: 1d:7f:6f:13:2f:e1:55:27:91:3c:5c:99:6b:a8:7f:58: b0:fc:96:54:61:14:d4:54:ae:dd:7a:5d:be:44:88:d6 Fingerprint (SHA-256): 8A:39:22:FD:C4:38:E6:18:5E:EF:3E:F2:E4:60:EC:BF:15:59:DC:EA:20:F0:5B:08:1D:E3:29:59:7E:2A:D8:31 Fingerprint (SHA1): DE:D3:09:2B:60:D0:51:82:33:49:2D:19:54:84:AE:CE:E6:84:17:53 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #15335: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #15336: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #15337: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092930 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15338: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #15339: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15340: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15341: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108092931 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15342: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15343: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15344: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15345: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108092932 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15346: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15347: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15348: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15349: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 108092933 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15350: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15351: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #15352: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108092934 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15353: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #15354: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #15355: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15356: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 108092935 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15357: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15358: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15359: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15360: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 108092936 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15361: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15362: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #15363: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #15364: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #15365: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092930 (0x6715e02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:32:58 2016 Not After : Fri Jan 08 15:32:58 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:89:77:3b:22:1d:33:fa:4e:2d:4c:c3:fc:98:3f:21: 7b:d2:7b:14:27:be:3c:fc:50:6b:a7:b8:38:ce:4c:d8: 50:c6:94:f1:52:ce:70:72:04:9e:bb:4e:c9:08:54:58: cc:ca:e3:ab:e6:2b:51:16:e6:ae:44:96:03:d6:c1:a0: 5b:15:8a:7b:17:7b:75:6b:45:a6:1b:bc:27:7a:a0:13: 0c:72:df:2e:09:f2:44:3b:3e:06:34:c2:6d:0d:64:38: 64:90:68:e8:f0:31:4d:96:49:34:46:77:66:a0:5f:69: 33:9b:fc:91:2c:f3:3d:20:37:53:7f:cb:32:e7:fa:33: de:35:8f:b1:7a:18:27:10:39:ff:15:02:6b:ca:4d:6d: 35:39:82:92:4d:48:4f:b2:a3:e7:20:5c:04:99:89:fd: 94:15:46:1d:3f:90:33:61:3b:ff:3c:7e:aa:45:b7:1b: f7:44:61:a7:e8:6c:c3:9b:7c:17:8e:f9:9c:46:63:67: 17:70:a2:39:d2:f3:a5:4b:b8:43:5b:df:5e:72:03:d9: 23:eb:de:5b:be:27:3a:72:e8:d3:9a:2b:aa:28:c5:58: 14:75:d4:7b:bf:0e:57:f6:da:a5:e7:6e:2c:5c:2f:d1: f4:40:40:d6:32:97:1e:ee:79:3f:18:9b:45:0b:3d:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:e7:2c:30:b9:96:7e:2d:32:0c:62:8b:90:5d:ae:fa: c9:a1:29:e4:e1:66:f1:bb:fc:58:23:87:c1:f7:ae:fb: 50:b2:c4:40:86:63:60:86:ca:3a:85:c8:3d:f3:24:43: 36:fd:b6:00:80:fe:5e:ae:89:fc:da:19:fc:3b:72:9e: 37:bb:3a:be:93:29:a2:5a:b5:90:45:95:f3:00:dd:ad: 99:1c:e1:0e:2b:6f:1e:93:0b:27:8e:da:0b:95:ca:68: 1f:b3:32:23:d6:a7:61:12:23:6e:71:66:5b:a5:ba:fb: b2:1e:6a:8e:a8:56:22:4d:08:61:04:8e:9f:46:c8:4d: 92:50:41:77:6f:a9:ef:97:d5:f8:92:1e:cb:e2:9d:35: e7:4c:85:57:72:e2:17:24:98:cf:4d:41:ef:bf:44:4f: 89:4f:0c:82:9c:fc:55:92:b3:ff:a3:e0:d4:57:a8:8f: b0:23:3d:d4:bb:b1:5a:58:21:9a:ed:22:74:eb:52:cc: b8:75:07:97:67:54:26:9c:22:cb:f6:02:04:05:2c:e0: b4:54:4f:09:28:da:df:2e:f1:84:af:14:48:44:bb:01: 58:76:e5:76:48:68:b4:40:c7:55:66:99:9f:8c:53:d8: a4:49:ca:82:d4:5c:43:42:e7:5d:b9:be:fb:cf:e3:98 Fingerprint (SHA-256): 90:41:F3:A4:7B:BC:ED:5B:3E:04:50:0B:A5:F6:B3:FC:3D:93:95:73:2A:A6:34:7A:3A:CA:D8:36:82:D9:92:72 Fingerprint (SHA1): 04:56:DD:27:CB:64:BC:86:22:71:B4:31:72:30:B8:66:C7:09:EF:71 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15366: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092932 (0x6715e04) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 15:33:19 2016 Not After : Fri Jan 08 15:33:19 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4d:68:97:95:46:fd:7f:eb:7a:df:20:6c:c8:6a:0d: 54:63:85:e2:6f:d1:fe:93:37:f5:03:5d:34:dc:b1:e6: d2:ac:6a:b3:22:55:c1:85:07:95:05:34:21:d9:01:9c: da:b7:0b:e5:42:fb:ea:7c:f1:2d:a7:fc:5b:ca:35:38: ef:ff:07:8b:d3:a3:70:b8:9c:b0:a6:4a:d3:9a:29:bb: bf:6f:f6:07:ce:22:10:5d:56:27:ee:26:38:2a:4b:b8: f4:84:74:bd:4d:75:3b:70:35:17:0a:77:45:cd:7b:d6: 88:1e:e0:70:d0:b7:5f:23:6b:11:fa:ea:78:44:c7:28: 04:e0:14:25:51:70:c4:7d:94:99:6e:4e:fb:f9:d8:d3: 66:fd:f8:9e:cf:37:ab:20:18:47:0f:9f:44:5b:8b:f9: 98:a3:8b:4c:d9:c6:13:99:62:d9:01:91:d4:33:67:f2: 16:5b:de:b2:92:7e:51:c3:1a:d2:f0:ec:b1:73:bd:52: 51:17:04:c5:44:f8:de:4b:00:81:78:3d:4e:83:dd:e7: d8:5f:2b:8e:63:fa:3a:51:f5:bf:b5:ef:f1:ca:34:ba: fe:e8:84:f4:7c:d7:90:f0:79:b4:9f:24:98:cb:77:fa: fe:06:5b:4f:de:81:e4:fc:e1:2a:aa:5c:2c:29:58:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:ea:08:39:9a:77:38:db:6d:b4:62:f5:51:46:c5:95: 63:e6:2b:a9:7b:41:11:3c:cc:c8:02:3f:f1:94:73:55: 47:b3:37:85:6a:0c:24:97:5b:e8:39:93:c2:9c:58:92: e4:54:db:1b:ad:39:34:78:08:93:8d:f8:6e:a6:a7:23: 40:33:e8:94:83:d7:6b:bd:aa:fd:d2:9f:0c:78:3b:54: 8b:bc:56:20:6d:2b:ce:b9:cc:6f:01:9b:4a:5e:e6:f6: fc:f5:4b:e8:c5:d1:53:53:88:67:8c:3a:d2:c8:3c:63: 5d:ca:e2:a7:b9:91:c4:4c:80:a5:2c:16:4c:89:f4:3d: 47:79:f2:c0:20:ba:70:68:6a:3d:14:b2:94:59:20:99: ec:d0:e9:ba:db:30:14:35:dc:23:70:4d:cf:74:e3:04: 3f:53:de:82:76:0c:b4:f6:5b:0f:bf:5f:b9:96:ad:4b: 24:ac:19:19:a3:dc:74:6e:f5:28:0f:99:5b:02:10:d0: 76:d7:f1:24:62:7d:32:3b:29:f3:d7:84:dd:3b:9a:81: a0:ba:fa:81:d2:c0:e1:19:a6:05:56:44:e1:17:4c:01: 16:f8:2d:0a:20:05:dc:32:37:04:e1:33:10:bd:39:62: 03:2a:ef:4e:cf:ed:13:ab:8f:38:2c:68:db:40:43:81 Fingerprint (SHA-256): 6D:62:23:82:1B:AD:53:0F:91:65:1F:3F:A5:39:26:A8:6D:8C:4A:AB:FD:1D:CE:3B:B1:E4:73:D3:5A:D6:91:E8 Fingerprint (SHA1): 91:EA:11:14:8C:24:BD:E7:9E:86:A5:C8:0B:6E:CC:E0:60:72:4F:C7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #15367: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092930 (0x6715e02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:32:58 2016 Not After : Fri Jan 08 15:32:58 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:89:77:3b:22:1d:33:fa:4e:2d:4c:c3:fc:98:3f:21: 7b:d2:7b:14:27:be:3c:fc:50:6b:a7:b8:38:ce:4c:d8: 50:c6:94:f1:52:ce:70:72:04:9e:bb:4e:c9:08:54:58: cc:ca:e3:ab:e6:2b:51:16:e6:ae:44:96:03:d6:c1:a0: 5b:15:8a:7b:17:7b:75:6b:45:a6:1b:bc:27:7a:a0:13: 0c:72:df:2e:09:f2:44:3b:3e:06:34:c2:6d:0d:64:38: 64:90:68:e8:f0:31:4d:96:49:34:46:77:66:a0:5f:69: 33:9b:fc:91:2c:f3:3d:20:37:53:7f:cb:32:e7:fa:33: de:35:8f:b1:7a:18:27:10:39:ff:15:02:6b:ca:4d:6d: 35:39:82:92:4d:48:4f:b2:a3:e7:20:5c:04:99:89:fd: 94:15:46:1d:3f:90:33:61:3b:ff:3c:7e:aa:45:b7:1b: f7:44:61:a7:e8:6c:c3:9b:7c:17:8e:f9:9c:46:63:67: 17:70:a2:39:d2:f3:a5:4b:b8:43:5b:df:5e:72:03:d9: 23:eb:de:5b:be:27:3a:72:e8:d3:9a:2b:aa:28:c5:58: 14:75:d4:7b:bf:0e:57:f6:da:a5:e7:6e:2c:5c:2f:d1: f4:40:40:d6:32:97:1e:ee:79:3f:18:9b:45:0b:3d:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:e7:2c:30:b9:96:7e:2d:32:0c:62:8b:90:5d:ae:fa: c9:a1:29:e4:e1:66:f1:bb:fc:58:23:87:c1:f7:ae:fb: 50:b2:c4:40:86:63:60:86:ca:3a:85:c8:3d:f3:24:43: 36:fd:b6:00:80:fe:5e:ae:89:fc:da:19:fc:3b:72:9e: 37:bb:3a:be:93:29:a2:5a:b5:90:45:95:f3:00:dd:ad: 99:1c:e1:0e:2b:6f:1e:93:0b:27:8e:da:0b:95:ca:68: 1f:b3:32:23:d6:a7:61:12:23:6e:71:66:5b:a5:ba:fb: b2:1e:6a:8e:a8:56:22:4d:08:61:04:8e:9f:46:c8:4d: 92:50:41:77:6f:a9:ef:97:d5:f8:92:1e:cb:e2:9d:35: e7:4c:85:57:72:e2:17:24:98:cf:4d:41:ef:bf:44:4f: 89:4f:0c:82:9c:fc:55:92:b3:ff:a3:e0:d4:57:a8:8f: b0:23:3d:d4:bb:b1:5a:58:21:9a:ed:22:74:eb:52:cc: b8:75:07:97:67:54:26:9c:22:cb:f6:02:04:05:2c:e0: b4:54:4f:09:28:da:df:2e:f1:84:af:14:48:44:bb:01: 58:76:e5:76:48:68:b4:40:c7:55:66:99:9f:8c:53:d8: a4:49:ca:82:d4:5c:43:42:e7:5d:b9:be:fb:cf:e3:98 Fingerprint (SHA-256): 90:41:F3:A4:7B:BC:ED:5B:3E:04:50:0B:A5:F6:B3:FC:3D:93:95:73:2A:A6:34:7A:3A:CA:D8:36:82:D9:92:72 Fingerprint (SHA1): 04:56:DD:27:CB:64:BC:86:22:71:B4:31:72:30:B8:66:C7:09:EF:71 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15368: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #15369: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092930 (0x6715e02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:32:58 2016 Not After : Fri Jan 08 15:32:58 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:89:77:3b:22:1d:33:fa:4e:2d:4c:c3:fc:98:3f:21: 7b:d2:7b:14:27:be:3c:fc:50:6b:a7:b8:38:ce:4c:d8: 50:c6:94:f1:52:ce:70:72:04:9e:bb:4e:c9:08:54:58: cc:ca:e3:ab:e6:2b:51:16:e6:ae:44:96:03:d6:c1:a0: 5b:15:8a:7b:17:7b:75:6b:45:a6:1b:bc:27:7a:a0:13: 0c:72:df:2e:09:f2:44:3b:3e:06:34:c2:6d:0d:64:38: 64:90:68:e8:f0:31:4d:96:49:34:46:77:66:a0:5f:69: 33:9b:fc:91:2c:f3:3d:20:37:53:7f:cb:32:e7:fa:33: de:35:8f:b1:7a:18:27:10:39:ff:15:02:6b:ca:4d:6d: 35:39:82:92:4d:48:4f:b2:a3:e7:20:5c:04:99:89:fd: 94:15:46:1d:3f:90:33:61:3b:ff:3c:7e:aa:45:b7:1b: f7:44:61:a7:e8:6c:c3:9b:7c:17:8e:f9:9c:46:63:67: 17:70:a2:39:d2:f3:a5:4b:b8:43:5b:df:5e:72:03:d9: 23:eb:de:5b:be:27:3a:72:e8:d3:9a:2b:aa:28:c5:58: 14:75:d4:7b:bf:0e:57:f6:da:a5:e7:6e:2c:5c:2f:d1: f4:40:40:d6:32:97:1e:ee:79:3f:18:9b:45:0b:3d:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:e7:2c:30:b9:96:7e:2d:32:0c:62:8b:90:5d:ae:fa: c9:a1:29:e4:e1:66:f1:bb:fc:58:23:87:c1:f7:ae:fb: 50:b2:c4:40:86:63:60:86:ca:3a:85:c8:3d:f3:24:43: 36:fd:b6:00:80:fe:5e:ae:89:fc:da:19:fc:3b:72:9e: 37:bb:3a:be:93:29:a2:5a:b5:90:45:95:f3:00:dd:ad: 99:1c:e1:0e:2b:6f:1e:93:0b:27:8e:da:0b:95:ca:68: 1f:b3:32:23:d6:a7:61:12:23:6e:71:66:5b:a5:ba:fb: b2:1e:6a:8e:a8:56:22:4d:08:61:04:8e:9f:46:c8:4d: 92:50:41:77:6f:a9:ef:97:d5:f8:92:1e:cb:e2:9d:35: e7:4c:85:57:72:e2:17:24:98:cf:4d:41:ef:bf:44:4f: 89:4f:0c:82:9c:fc:55:92:b3:ff:a3:e0:d4:57:a8:8f: b0:23:3d:d4:bb:b1:5a:58:21:9a:ed:22:74:eb:52:cc: b8:75:07:97:67:54:26:9c:22:cb:f6:02:04:05:2c:e0: b4:54:4f:09:28:da:df:2e:f1:84:af:14:48:44:bb:01: 58:76:e5:76:48:68:b4:40:c7:55:66:99:9f:8c:53:d8: a4:49:ca:82:d4:5c:43:42:e7:5d:b9:be:fb:cf:e3:98 Fingerprint (SHA-256): 90:41:F3:A4:7B:BC:ED:5B:3E:04:50:0B:A5:F6:B3:FC:3D:93:95:73:2A:A6:34:7A:3A:CA:D8:36:82:D9:92:72 Fingerprint (SHA1): 04:56:DD:27:CB:64:BC:86:22:71:B4:31:72:30:B8:66:C7:09:EF:71 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15370: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092932 (0x6715e04) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 15:33:19 2016 Not After : Fri Jan 08 15:33:19 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4d:68:97:95:46:fd:7f:eb:7a:df:20:6c:c8:6a:0d: 54:63:85:e2:6f:d1:fe:93:37:f5:03:5d:34:dc:b1:e6: d2:ac:6a:b3:22:55:c1:85:07:95:05:34:21:d9:01:9c: da:b7:0b:e5:42:fb:ea:7c:f1:2d:a7:fc:5b:ca:35:38: ef:ff:07:8b:d3:a3:70:b8:9c:b0:a6:4a:d3:9a:29:bb: bf:6f:f6:07:ce:22:10:5d:56:27:ee:26:38:2a:4b:b8: f4:84:74:bd:4d:75:3b:70:35:17:0a:77:45:cd:7b:d6: 88:1e:e0:70:d0:b7:5f:23:6b:11:fa:ea:78:44:c7:28: 04:e0:14:25:51:70:c4:7d:94:99:6e:4e:fb:f9:d8:d3: 66:fd:f8:9e:cf:37:ab:20:18:47:0f:9f:44:5b:8b:f9: 98:a3:8b:4c:d9:c6:13:99:62:d9:01:91:d4:33:67:f2: 16:5b:de:b2:92:7e:51:c3:1a:d2:f0:ec:b1:73:bd:52: 51:17:04:c5:44:f8:de:4b:00:81:78:3d:4e:83:dd:e7: d8:5f:2b:8e:63:fa:3a:51:f5:bf:b5:ef:f1:ca:34:ba: fe:e8:84:f4:7c:d7:90:f0:79:b4:9f:24:98:cb:77:fa: fe:06:5b:4f:de:81:e4:fc:e1:2a:aa:5c:2c:29:58:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:ea:08:39:9a:77:38:db:6d:b4:62:f5:51:46:c5:95: 63:e6:2b:a9:7b:41:11:3c:cc:c8:02:3f:f1:94:73:55: 47:b3:37:85:6a:0c:24:97:5b:e8:39:93:c2:9c:58:92: e4:54:db:1b:ad:39:34:78:08:93:8d:f8:6e:a6:a7:23: 40:33:e8:94:83:d7:6b:bd:aa:fd:d2:9f:0c:78:3b:54: 8b:bc:56:20:6d:2b:ce:b9:cc:6f:01:9b:4a:5e:e6:f6: fc:f5:4b:e8:c5:d1:53:53:88:67:8c:3a:d2:c8:3c:63: 5d:ca:e2:a7:b9:91:c4:4c:80:a5:2c:16:4c:89:f4:3d: 47:79:f2:c0:20:ba:70:68:6a:3d:14:b2:94:59:20:99: ec:d0:e9:ba:db:30:14:35:dc:23:70:4d:cf:74:e3:04: 3f:53:de:82:76:0c:b4:f6:5b:0f:bf:5f:b9:96:ad:4b: 24:ac:19:19:a3:dc:74:6e:f5:28:0f:99:5b:02:10:d0: 76:d7:f1:24:62:7d:32:3b:29:f3:d7:84:dd:3b:9a:81: a0:ba:fa:81:d2:c0:e1:19:a6:05:56:44:e1:17:4c:01: 16:f8:2d:0a:20:05:dc:32:37:04:e1:33:10:bd:39:62: 03:2a:ef:4e:cf:ed:13:ab:8f:38:2c:68:db:40:43:81 Fingerprint (SHA-256): 6D:62:23:82:1B:AD:53:0F:91:65:1F:3F:A5:39:26:A8:6D:8C:4A:AB:FD:1D:CE:3B:B1:E4:73:D3:5A:D6:91:E8 Fingerprint (SHA1): 91:EA:11:14:8C:24:BD:E7:9E:86:A5:C8:0B:6E:CC:E0:60:72:4F:C7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #15371: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #15372: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #15373: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #15374: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092930 (0x6715e02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:32:58 2016 Not After : Fri Jan 08 15:32:58 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:89:77:3b:22:1d:33:fa:4e:2d:4c:c3:fc:98:3f:21: 7b:d2:7b:14:27:be:3c:fc:50:6b:a7:b8:38:ce:4c:d8: 50:c6:94:f1:52:ce:70:72:04:9e:bb:4e:c9:08:54:58: cc:ca:e3:ab:e6:2b:51:16:e6:ae:44:96:03:d6:c1:a0: 5b:15:8a:7b:17:7b:75:6b:45:a6:1b:bc:27:7a:a0:13: 0c:72:df:2e:09:f2:44:3b:3e:06:34:c2:6d:0d:64:38: 64:90:68:e8:f0:31:4d:96:49:34:46:77:66:a0:5f:69: 33:9b:fc:91:2c:f3:3d:20:37:53:7f:cb:32:e7:fa:33: de:35:8f:b1:7a:18:27:10:39:ff:15:02:6b:ca:4d:6d: 35:39:82:92:4d:48:4f:b2:a3:e7:20:5c:04:99:89:fd: 94:15:46:1d:3f:90:33:61:3b:ff:3c:7e:aa:45:b7:1b: f7:44:61:a7:e8:6c:c3:9b:7c:17:8e:f9:9c:46:63:67: 17:70:a2:39:d2:f3:a5:4b:b8:43:5b:df:5e:72:03:d9: 23:eb:de:5b:be:27:3a:72:e8:d3:9a:2b:aa:28:c5:58: 14:75:d4:7b:bf:0e:57:f6:da:a5:e7:6e:2c:5c:2f:d1: f4:40:40:d6:32:97:1e:ee:79:3f:18:9b:45:0b:3d:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:e7:2c:30:b9:96:7e:2d:32:0c:62:8b:90:5d:ae:fa: c9:a1:29:e4:e1:66:f1:bb:fc:58:23:87:c1:f7:ae:fb: 50:b2:c4:40:86:63:60:86:ca:3a:85:c8:3d:f3:24:43: 36:fd:b6:00:80:fe:5e:ae:89:fc:da:19:fc:3b:72:9e: 37:bb:3a:be:93:29:a2:5a:b5:90:45:95:f3:00:dd:ad: 99:1c:e1:0e:2b:6f:1e:93:0b:27:8e:da:0b:95:ca:68: 1f:b3:32:23:d6:a7:61:12:23:6e:71:66:5b:a5:ba:fb: b2:1e:6a:8e:a8:56:22:4d:08:61:04:8e:9f:46:c8:4d: 92:50:41:77:6f:a9:ef:97:d5:f8:92:1e:cb:e2:9d:35: e7:4c:85:57:72:e2:17:24:98:cf:4d:41:ef:bf:44:4f: 89:4f:0c:82:9c:fc:55:92:b3:ff:a3:e0:d4:57:a8:8f: b0:23:3d:d4:bb:b1:5a:58:21:9a:ed:22:74:eb:52:cc: b8:75:07:97:67:54:26:9c:22:cb:f6:02:04:05:2c:e0: b4:54:4f:09:28:da:df:2e:f1:84:af:14:48:44:bb:01: 58:76:e5:76:48:68:b4:40:c7:55:66:99:9f:8c:53:d8: a4:49:ca:82:d4:5c:43:42:e7:5d:b9:be:fb:cf:e3:98 Fingerprint (SHA-256): 90:41:F3:A4:7B:BC:ED:5B:3E:04:50:0B:A5:F6:B3:FC:3D:93:95:73:2A:A6:34:7A:3A:CA:D8:36:82:D9:92:72 Fingerprint (SHA1): 04:56:DD:27:CB:64:BC:86:22:71:B4:31:72:30:B8:66:C7:09:EF:71 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15375: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092934 (0x6715e06) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 15:33:40 2016 Not After : Fri Jan 08 15:33:40 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:38:b1:01:69:98:9a:f1:3a:a1:dd:19:82:b3:b9:2a: a8:02:51:fa:15:56:99:f1:2b:a5:c6:82:f8:47:02:58: 13:a0:02:ea:a6:b5:e7:88:96:a4:77:40:0b:a5:53:27: 2a:1d:01:34:8b:a9:a3:14:69:33:a7:fb:1e:84:1c:58: 5f:96:dc:0a:eb:c4:4f:cf:03:b2:bf:34:76:b8:39:38: 62:cd:80:82:2e:95:56:ea:9b:ee:db:6c:ec:c8:7d:c7: a9:a7:1e:1b:4b:da:19:66:47:b1:fd:6a:e7:f6:a5:2a: aa:4c:5e:c7:ae:62:29:e1:15:3a:96:71:27:eb:c2:31: a1:0d:13:16:71:53:1a:d8:c9:65:2f:00:c6:41:d6:0d: b0:de:d6:0c:39:d4:9e:b7:5b:c7:d3:2e:e9:e0:c4:d1: 1e:89:9c:5b:5c:5f:32:4a:c8:3f:34:1e:35:c1:a0:c0: c4:34:0f:da:5c:f1:23:24:9d:59:05:b0:c1:c4:5b:e8: 3b:f0:7e:54:96:4b:a9:9b:0a:49:76:20:70:1b:47:7d: 43:1d:74:1a:3a:c4:74:3a:87:97:d5:e6:f9:5d:0a:5e: 5a:d1:eb:b9:17:f9:ea:2d:0a:9f:8c:13:63:b6:57:d4: df:dc:a5:93:09:c1:26:1d:12:5c:55:83:95:f7:88:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:4f:23:6b:28:41:1a:89:c0:31:94:d4:f7:9d:1e:39: c8:3a:d9:ff:a9:10:f9:57:2a:28:e4:d8:b2:b1:1b:bf: b5:bb:57:b8:d4:01:3b:26:2d:f7:b9:3c:4c:ff:dd:36: 35:fe:20:46:65:30:9e:29:ab:56:9b:9f:11:47:10:60: 8e:16:cd:fe:14:30:3e:77:3b:86:e1:a5:bc:ee:08:33: 62:82:28:4a:49:6f:24:b3:eb:74:4f:d1:eb:16:8b:75: 58:9d:d0:c4:66:5c:57:53:db:88:f1:a0:18:2f:42:d2: 29:2e:86:47:57:af:ce:ee:33:ff:aa:73:5b:8f:f3:c2: 8e:d6:c2:51:ab:b0:a3:0d:bf:77:02:8e:39:a9:e4:70: a3:42:8f:cf:23:bd:3b:0f:20:c3:af:62:4e:07:34:1a: 91:29:53:8e:b9:a2:04:eb:f7:34:d4:24:59:e7:76:43: 3f:db:23:15:94:83:68:e5:48:21:4c:e9:0b:2f:b5:08: 3c:09:a2:b4:d7:95:84:1a:94:26:67:ad:b3:87:57:84: ac:58:01:e5:0a:23:c7:17:c5:84:c1:44:9f:bc:16:24: ce:ac:74:09:96:6d:40:2b:f9:fb:b7:e0:ae:e2:d1:6b: 87:a0:f9:c5:7c:3e:96:dd:55:5c:3e:66:54:98:7d:c6 Fingerprint (SHA-256): C1:67:07:5B:3E:84:E9:03:C9:C2:C8:2B:5D:16:36:C7:B7:CE:7D:85:4F:B8:3A:FF:A0:0F:32:56:5B:8A:D5:54 Fingerprint (SHA1): C3:47:12:FC:96:A8:F0:8F:C5:BC:6B:DA:81:25:BD:1D:5A:87:B1:D9 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #15376: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092930 (0x6715e02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 15:32:58 2016 Not After : Fri Jan 08 15:32:58 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:89:77:3b:22:1d:33:fa:4e:2d:4c:c3:fc:98:3f:21: 7b:d2:7b:14:27:be:3c:fc:50:6b:a7:b8:38:ce:4c:d8: 50:c6:94:f1:52:ce:70:72:04:9e:bb:4e:c9:08:54:58: cc:ca:e3:ab:e6:2b:51:16:e6:ae:44:96:03:d6:c1:a0: 5b:15:8a:7b:17:7b:75:6b:45:a6:1b:bc:27:7a:a0:13: 0c:72:df:2e:09:f2:44:3b:3e:06:34:c2:6d:0d:64:38: 64:90:68:e8:f0:31:4d:96:49:34:46:77:66:a0:5f:69: 33:9b:fc:91:2c:f3:3d:20:37:53:7f:cb:32:e7:fa:33: de:35:8f:b1:7a:18:27:10:39:ff:15:02:6b:ca:4d:6d: 35:39:82:92:4d:48:4f:b2:a3:e7:20:5c:04:99:89:fd: 94:15:46:1d:3f:90:33:61:3b:ff:3c:7e:aa:45:b7:1b: f7:44:61:a7:e8:6c:c3:9b:7c:17:8e:f9:9c:46:63:67: 17:70:a2:39:d2:f3:a5:4b:b8:43:5b:df:5e:72:03:d9: 23:eb:de:5b:be:27:3a:72:e8:d3:9a:2b:aa:28:c5:58: 14:75:d4:7b:bf:0e:57:f6:da:a5:e7:6e:2c:5c:2f:d1: f4:40:40:d6:32:97:1e:ee:79:3f:18:9b:45:0b:3d:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:e7:2c:30:b9:96:7e:2d:32:0c:62:8b:90:5d:ae:fa: c9:a1:29:e4:e1:66:f1:bb:fc:58:23:87:c1:f7:ae:fb: 50:b2:c4:40:86:63:60:86:ca:3a:85:c8:3d:f3:24:43: 36:fd:b6:00:80:fe:5e:ae:89:fc:da:19:fc:3b:72:9e: 37:bb:3a:be:93:29:a2:5a:b5:90:45:95:f3:00:dd:ad: 99:1c:e1:0e:2b:6f:1e:93:0b:27:8e:da:0b:95:ca:68: 1f:b3:32:23:d6:a7:61:12:23:6e:71:66:5b:a5:ba:fb: b2:1e:6a:8e:a8:56:22:4d:08:61:04:8e:9f:46:c8:4d: 92:50:41:77:6f:a9:ef:97:d5:f8:92:1e:cb:e2:9d:35: e7:4c:85:57:72:e2:17:24:98:cf:4d:41:ef:bf:44:4f: 89:4f:0c:82:9c:fc:55:92:b3:ff:a3:e0:d4:57:a8:8f: b0:23:3d:d4:bb:b1:5a:58:21:9a:ed:22:74:eb:52:cc: b8:75:07:97:67:54:26:9c:22:cb:f6:02:04:05:2c:e0: b4:54:4f:09:28:da:df:2e:f1:84:af:14:48:44:bb:01: 58:76:e5:76:48:68:b4:40:c7:55:66:99:9f:8c:53:d8: a4:49:ca:82:d4:5c:43:42:e7:5d:b9:be:fb:cf:e3:98 Fingerprint (SHA-256): 90:41:F3:A4:7B:BC:ED:5B:3E:04:50:0B:A5:F6:B3:FC:3D:93:95:73:2A:A6:34:7A:3A:CA:D8:36:82:D9:92:72 Fingerprint (SHA1): 04:56:DD:27:CB:64:BC:86:22:71:B4:31:72:30:B8:66:C7:09:EF:71 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15377: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #15378: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #15379: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #15380: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #15381: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #15382: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108092935 (0x6715e07) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 15:33:56 2016 Not After : Fri Jan 08 15:33:56 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:43:64:a6:74:7d:46:df:36:69:3b:78:ce:6b:20:b2: af:c1:7f:2d:7c:58:03:92:60:59:65:12:9d:93:a8:14: 46:e0:10:ea:e5:c2:ee:08:20:68:e2:2b:e6:07:35:34: 4b:12:06:47:90:10:53:aa:73:18:a4:78:f4:22:a1:c1: b1:9a:0b:3d:ef:92:f8:d5:e6:cf:9c:f1:c2:79:a8:92: ca:f6:bd:4c:b6:38:c0:73:2d:55:31:8d:f6:8e:ce:f1: 6f:fc:43:71:05:89:7b:b9:4b:a4:c1:3f:ef:96:88:ce: b6:6f:d5:0e:91:ca:cf:fc:93:6e:65:01:f0:ab:25:d7: 1b:98:31:fe:dc:d1:79:0b:3e:cc:53:09:4e:b5:aa:61: 9d:55:80:b7:e0:bc:9d:6e:ad:33:22:d3:a9:be:5f:bb: b2:4a:e9:99:ca:3a:19:c6:51:16:78:b5:14:62:6d:9b: cc:2b:dc:30:fe:56:80:a6:de:43:4b:b2:e2:13:f2:dc: db:7e:3a:1b:8c:88:8e:1b:ca:09:9e:e6:bf:64:c7:19: 02:dc:75:26:c8:2a:08:09:ea:21:e6:55:f9:73:4c:90: 6d:6d:dc:69:6b:53:0f:65:f6:10:0f:cc:21:06:5d:fa: cc:c5:4f:d2:f1:97:86:9c:b8:f3:6c:71:d8:96:ef:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:83:84:75:f1:93:b2:90:c2:54:63:2b:37:a4:a5:03: 3c:c6:cc:fc:5e:17:20:72:90:9b:04:01:11:d8:0d:34: 6a:e1:83:38:8c:7d:fc:cc:aa:96:63:c6:0f:65:ef:da: 07:3f:97:86:c3:d7:60:f6:7c:2f:25:0b:d7:ca:97:bc: ba:8b:11:0e:99:af:6a:53:f1:5f:08:19:9c:69:4a:6c: 02:a8:2f:ce:6b:01:d6:88:e8:51:ff:09:e2:af:52:31: 21:78:f5:ee:4a:fa:ab:7e:c6:7c:78:a1:f0:fb:f4:13: c5:46:92:52:6b:81:45:ad:7d:0c:c2:46:cb:2b:bd:c0: 46:86:e8:27:3b:7f:8a:e5:2d:b3:99:47:6a:18:38:1b: eb:67:82:95:50:fa:1d:7a:22:b5:fc:93:c5:94:4a:b5: ab:ef:5a:e5:02:4d:6a:64:f6:3e:dc:9c:29:d5:53:95: c6:7e:0c:f1:3f:02:97:4f:8f:c2:bc:9e:5d:69:cf:74: 12:18:a4:83:96:9e:31:24:61:23:5b:1a:ab:0f:e6:88: 8e:69:e5:4d:81:9b:07:2a:44:55:ed:48:34:24:33:52: 44:b0:61:c2:52:a0:9c:d8:41:2b:d7:d0:f2:b1:84:f1: be:8e:05:7c:77:58:ac:fb:c8:0c:33:8f:81:d0:61:ad Fingerprint (SHA-256): C9:61:9C:CB:80:31:CC:48:88:AE:21:51:21:7E:D8:AA:99:ED:11:36:68:0A:58:F5:2F:EB:E4:D8:18:5E:D1:CA Fingerprint (SHA1): AA:75:D9:61:65:40:9D:A8:9C:38:7C:0C:FA:CD:53:1B:2E:48:B5:D5 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #15383: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #15384: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #15385: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #15386: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #15387: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15388: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15389: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #15390: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15391: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15392: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #15393: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #15394: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #15395: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15396: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15397: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #15398: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15399: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15400: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15401: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15402: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15403: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #15404: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15405: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #15406: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 2598 at Fri Jan 8 10:34:46 EST 2016 kill -USR1 2598 httpserv: normal termination httpserv -b -p 9601 2>/dev/null; httpserv with PID 2598 killed at Fri Jan 8 10:34:47 EST 2016 TIMESTAMP chains END: Fri Jan 8 10:34:47 EST 2016 SUMMARY: ======== NSS variables: -------------- HOST=localhost DOMSUF=localdomain BUILD_OPT=1 USE_X32= USE_64= NSS_CYCLES="" NSS_TESTS="libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains" NSS_SSL_TESTS="crl bypass_normal normal_bypass fips_normal normal_fips iopr" NSS_SSL_RUN="cov auth stapling stress" NSS_AIA_PATH= NSS_AIA_HTTP= NSS_AIA_OCSP= IOPR_HOSTADDR_LIST= PKITS_DATA= Tests summary: -------------- Passed: 9575 Failed: 5831 Failed with core: 0 Unknown status: 0 ~/build/BUILD/nss-3.19.1 + popd + killall selfserv_9591 selfserv_9591: no process found + : ++ grep -c FAILED ./tests_results/security/localhost.1/output.log + TEST_FAILURES=5831 /var/tmp/rpm-tmp.YjC1gl: line 120: syntax error near unexpected token `fi' RPM build errors: error: Bad exit status from /var/tmp/rpm-tmp.YjC1gl (%check) Bad exit status from /var/tmp/rpm-tmp.YjC1gl (%check) Child return code was: 1 EXCEPTION: Command failed. See logs for output. # ['bash', '--login', '-c', 'rpmbuild -bb --target armv7hl --nodeps builddir/build/SPECS/nss.spec'] Traceback (most recent call last): File "/usr/lib/python2.7/site-packages/mockbuild/trace_decorator.py", line 70, in trace result = func(*args, **kw) File "/usr/lib/python2.7/site-packages/mockbuild/util.py", line 378, in do raise mockbuild.exception.Error, ("Command failed. See logs for output.\n # %s" % (command,), child.returncode) Error: Command failed. See logs for output. # ['bash', '--login', '-c', 'rpmbuild -bb --target armv7hl --nodeps builddir/build/SPECS/nss.spec'] LEAVE do --> EXCEPTION RAISED